PDA

View Full Version : Chinese Military Hackers Infiltrate US Corporations


Richard
05-21-2014, 07:07
Cyber Wars - a run-down of exactly what "trade secrets" Chinese hackers are accused of stealing from U.S. metals and solar power companies, and a labor union.

Richard

Here’s What Chinese Hackers Actually Stole From U.S. Companies
Time, 20 May 2014

Five Chinese military hackers employed by the Chinese government were accused yesterday of infiltrating American companies and stealing trade secrets. By charging the men with economic espionage and identity theft, among other crimes, the Department of Justice has set the stage for a tense standoff with the Chinese government.

If the allegations are true, the Chinese government has aimed at the very heart of American enterprise. The apparent victims of the hacking are American titans: U.S. Steel, the nation’s oldest and biggest steel manufacturer and the lovechild of tycoons Andrew Carnegie and J.P. Morgan; Alcoa, the world’s third-largest aluminum maker; Westinghouse Electrical Company, one of the world’s leading nuclear power developers; SolarWorld AG a leading solar technology company ; and the United Steelworkers, among America’s most iconic labor unions.

The Chinese foreign ministry spokesman Qin Gang called the claims baseless, “made-up” and hypocritical, but the Justice Department is adamant.

But what exactly are the Chinese accused of stealing from these American corporations? And does it matter? Here’s exactly what the Department of Justice alleges the Chinese have actually taken:

1. Solar power technology

The hackers allegedly stole solar panel technological innovations and manufacturing metrics from Germany-based SolarWorld AG, enabling Chinese solar panel makers to hawk American- and German-developed research that had taken scientists years to bring to fruition. According to the Justice Department, the Chinese hacker Wen Xinyu stole thousands of emails and other files from three senior SolarWorld executives in 2012. Besides giving Chinese companies access to American technology, the information may have allowed the Chinese them to anticipate American regulators. “There were thousands of emails exfiltrated, many with sensitive data that would pose to serve all kinds of unfair advantages,” says Ben Santarris, director of strategic affairs at Solarworld AG.

2. Nuclear power plant technology

The Justice Department said the Chinese stole nuclear technology from electrical provider Westinghouse Electric Company, a Pennsylvania-based company that was negotiating technology to hand over to a Chinese state-owned enterprise. The hacker Sun Kailing supposedly gained access to the company’s computers and stole technical and design specifications on pipes, pipe supports and pipe routing, enabling Chinese competitors to build world-class nuclear power plant without doing the research themselves.

3. Inside information on U.S. business strategy

The hacking at Westinghouse began in 2010 and continued through 2011, even reaching the company’s CEO, according to the Justice Department. Some stolen emails also included information on the nuclear power company’s business strategy to reach a deal with the Chinese company. It’s a strategy that experts say Chinese hackers have used before, and it gives Chinese companies an advantage in negotiations. “If you had the ability to walk around the table to see what your competitor was going to bid and look at their notes and then go back and outbid them, that’s basically what they’ve done in the virtual world,” says George Kurtz, the CEO of CrowdStrike, a private security firm that tracks Chinese government-backed hackers.

4. Data enabling the Chinese to outwit U.S. regulators

U.S. companies, particularly in heavy industry and manufacturing, have faced a deluge of Chinese competing imports, much of which has been ruled “dumped” on U.S. shores, or unfairly imported at a below-market price. U.S. Steel, the largest steel company in the United States, has filed trade suits against the Chinese in order to impose tariffs and protect their markets.

In early 2010, just as U.S. Steel was participating in two international trade disputes with China over unfair steel imports, Sun Kailing allegedly sent a phishing email that installed malware on U.S. Steel employees’ computers, including its CEO at the time, John Surma. It could have given access to U.S. Steel’s litigation plans.

The United Steelworkers, a major U.S. labor union, saw their computers hack and had emails stolen from employees—including its president—that included sensitive strategic information, including internal discussions of how the USW would push its strategy to slow unfairly traded Chinese imports.

But these alleged crimes are only the tip of the iceberg, experts say. Hackers in China, Iran and Russia have repeatedly targeted broad swathes of the American economy, sucking up intellectual property and battling to outbid American corporations. “Pick a Fortune 1000 and they’ve all had it happen. They’ve all been targeted in one form or another or had an incident,” says Kurtz. “There are two types of companies: ones that know they’ve been hacked and the ones that just haven’t figured it out yet.”

http://time.com/#106319/heres-what-chinese-hackers-actually-stole-from-u-s-companies/

harrythewriter
05-24-2014, 23:55
hahaha rook at the shiwy americans and their reaky information security. Serves you right for shtearing our gunpowder.

(-_-)

SF_BHT
05-25-2014, 08:00
Richard

Good read. Most people do not understand that you go after the infrastructure which will be more vulnerable than directly against the Government. Those targets are classic right out of some play books out there.






hahaha rook at the shiwy americans and their reaky information security. Serves you right for shtearing our gunpowder.

(-_-)


For someone claiming to be a writer you come of as quite a buffoon!!!!

Badger52
06-13-2014, 16:28
Just catching up to this thread, thanks Sir for posting.

I recall a CSPAN session over breakfast a few weeks back, some congresscritters had several of the "big names" in from NSA, Cybercom, et al, discussing cyber security and threats therefrom. Questioned about whether they would ever conduct operations that could end up affecting US business in a positive way, the word "economic" stuck in their craw as to types of operations they might conduct. No matter what numerous other countries might do in targeting us, they took a very Chamberlain-like approach, almost sounded like the 70+ year old lament of "gentlemen don't read other people's mail."

Nice to know their heads are firmly in the sand, publicly anyway.

MtnGoat
06-13-2014, 20:52
Nothing new here IMO. PLA has been Phishing, Probing and social engineering so many different CDC and US Coorprations for years.

Sad thing is, many of these CDC fight the USG in that USG REQUIRES CDC to report when they have had a breach in the systems. I feel that the should have to report when the had a volition.

USG and military needs to change the way we do thing also. US Big Business needs to make this mandatory reading for all of their employees.

FlagDayNCO
06-24-2014, 07:10
What is not reported is the number of American Citizens that knowingly welcome this activity.

Kind of funny when the tour bus pulls up and a couple dozen PLA types come in on a guided tour, set up by the Operations Managers. The IT and Security people go nuts.

As mentioned, there are enough Citizens, Round Eyes, that are only too happy to undermine America.

Noslack71
06-24-2014, 08:37
The US has been hemorrhaging intellectual property for 25 years. For the first 15 the PLA were not stealing it as we were giving it away by not protecting it. There is a third category of businesses, those that deny they have been breeched, think banks , other financial institutions.
Go onto Dept of Labor and Education websites and see who has been getting the lions share of Bachelors and advance degrees in Science, Technology, Engineer ing and Math and it is not our people. Steve Jobs told Obama to staple a Green Card to the diploma s of all the foreign students getting thes degrees. Obama ignored him..
I have been in the Cyber security-related business for thirty years and the industry has been talking about this as long as I remember. The people in the have up to now placed higher values on convenience than on security.

Noslack71