Turned into the number one cyber threat.. How does China use sophisticated stealth attacks against the United States?
Over the past decade, China has
reorganized its hacking operations, turning into a sophisticated and mature
adversary, according to a New York Times report.
Nearly a decade ago, the United
States began accusing China of cyber espionage attacks, the bulk of which were
carried out using low-level phishing emails against American companies to steal
intellectual property.
Last week, the United States again
accused China of launching cyber attacks, but those attacks were very
aggressive, revealing that China had turned into a more sophisticated and
mature digital adversary than the one that stunned American officials a decade
ago.And writer Nikolai Billroth says - in a report published by the New York Times - that the indictment of US President Joe Biden's administration on cyber attacks - along with interviews with dozens of current and former US officials - shows that China reorganized hacking operations during these times. duration.
While phishing attacks remain, espionage campaigns have disappeared and advanced technologies have been used. These techniques include exploiting unknown vulnerabilities in widely used software such as Microsoft's Microsoft Exchange email service and Pulse VPN security devices, which are difficult to defend and allow Chinese hackers to working undetected for longer periods of time.
These and other abuses prompted the Obama administration to bring a series of industrial trade theft indictments to Chinese People's Liberation Army hackers in 2014. A PLA unit in Shanghai, known as Unit 61398, was responsible for hundreds, some thousands, of US corporate abuses. , according to The Times newspaper.
After President Donald Trump took office and bolstered trade disputes and other tensions with China, piracy resumed. By 2018, US intelligence officials noticed a shift; The People's Liberation Army hackers resigned and were replaced by agents working on the orders of the Ministry of State Security, which handles China's intelligence, security, and secret police.
It was not clear how exactly China worked with these loosely linked hackers. Some cybersecurity experts have speculated that the engineers got paid for “moonlighting” the state, while others said those in the network had no choice but to do whatever the state required.
The White House last week provided further clarifications on the indictment; The United States has accused