老向, 发个贴子让你高兴一下 (转贴)

  • 主题发起人 主题发起人 9981
  • 开始时间 开始时间

9981

Nanoriver
VIP
注册
2004-12-11
消息
18,965
荣誉分数
4,268
声望点数
373
http://finance.yahoo.com/blogs/dail...bably-hacked-your-company--too-175016269.html


China may have hacked your company, too
By Rick Newman 18 hours ago Daily Ticker
Done
By charging five Chinese officials with hacking into U.S. companies and stealing trade secrets, the Justice Dept. has added a new dimension to America’s national-security strategy. Yet the danger posed to the nation and its business sector may be far greater than even the government lets on.

The indictment issued by a federal grand-jury identifies six U.S. organizations allegedly victimized by Chinese hackers: Westinghouse Electric, Alcoa (AA), U.S. Steel (X), Allegheny Technologies (ATI), U.S. subsidiaries of the German firm Solar World, and a tradeworkers’ union. The indictment highlights numerous incidents in which the hackers supposedly broke into corporate computer systems and stole files, email messages and other documents containing valuable trade secrets. That information allowed Chinese competitors to underprice the U.S. firms, build comparable capabilities and develop other advantages.

While the indictment focuses on industrial firms, however, cybersecurity experts say most U.S. companies are vulnerable to foreign hacking, and many have proprietary data stolen without even knowing it.
“What companies have to realize is, while we’re waiting for a cyber Pearl Harbor that may become a national problem, companies have a problem every day,” Richard Clarke, CEO of Good Harbor Security Risk Management and a former U.S. counterterrorism official, said at a recent Milken Institute conference. “What you’re losing every day is intellectual property, research and development, and business intelligence, and you’re losing money because they create accounts payable and send money offshore.”

Foreign spy agencies have always played cat-and-mouse with their American counterparts, using any means available. What’s relatively new is the effort by China to use military cyberspies — especially a group known as Unit 61398 of the People’s Liberation Army, based in Shanghai — to steal gargantuan amounts of data from U.S. and Western firms. The PLA unit passes such information to Chinese companies — many controlled by the ruling communist party — so they can rapidly build their own capabilities in defense, aerospace, energy, technology and many other sectors as China strives to become a global superpower on par with the United States.

From traditional espionage to cyber theft
A 2013 White House report identified the shift from traditional corporate espionage to cyber-based theft, while identifying U.S. firms such as Ford (F), General Motors (GM), DuPont (DD), Goldman Sachs (GS) and Motorala (MSI) as victims. Another 2013 report, by the private security firm Mandiant, was the first big public accounting of Chinese corporate espionage efforts emanating from the PLA and Unit 61398. At the time, Mandiant said it had identified at least 150 U.S. business organizations targeted by Chinese hackers — but that only included firms it had done business with. A complete tally is probably much higher. Such attacks are stealthy by nature, and therefore hard to quantify, in contrast to cybersabotage carried out by groups such as Anonymous, which are typically meant to generate publicity for a cause.

Mandiant says a typical corporate cyberattack goes on for about 230 days before the company realizes something is wrong. In one case, spies spent more than six years lurking inside a company’s computer network before being discovered. A recent survey by the Secret Service found three-quarters of U.S. companies that had been hacked didn’t know about it until the government told them. Clarke says one company, which he won’t identify, spent eight years doing $1.2 billion worth of R&D work — which Chinese spies vacuumed up in one day.
“That’s not atypical, it’s typical,” he warns. “How are you going to win when you pay for the R&D and your competitor gets it for nothing?”

There seems to be a careful rationale determining which western companies Chinese hackers target. “The government calls out specific areas they want to invest in,” says Jen Weedon of FireEye (FEYE), a cybersecurity firm that acquired Mandiant last year. “Their targeting generally dovetails with industries they deem of strategic importance.”

After the Japanese nuclear disaster in 2011, for instance, Chinese authorities emphasized a need for greater safety at the country’s own nuclear plants — and FireEye noticed an increase in hacking attacks on Western companies that specialize in such technology. In addition to Fortune 500 firms, Chinese hackers have also targeted nonprofits, news organizations and smaller research outfits when they’re doing work that might relate to China.
For any CEO, it’s worth keeping in mind that firms selling cybersecurity services have an interest in making the threat sound dire. Yet reports of Chinese cyberstealing mesh with the nation’s well-known disregard for intellectual property rights and the piracy of everything from military aircraft to Microsoft software to Hollywood movies. The Chinese, for their part, routinely deny they engage in cyberspying and sometimes point out that America itself stole many trade secrets from Britain and elsewhere in the 1800s, as it was growing into a world power much like China is today.

In a statement responding to the federal indictment, China's foreign ministry also claimed that China itself is a "victim of U.S. cyber surveillance and theft." That may very well be true.
Yet Chinese hackers have become so proficient that many Western firms are already outmatched. One common mistake, cyberdefenders say, is spending heavily to protect a company’s entire network instead of layering protection where it’s needed most.

“What companies do is look for attacks at the perimeter, but the adversaries are inside the perimeter,” Chris Ingliss, who retired this year as deputy director of the National Security Agency, said at the Milken conference. “Start with the premise that security is impossible. Then develop your strategy to defend [the company].”
The indictment of the five Chinese officials is risky for the Obama administration, since China could retaliate in some way, threatening a vital trade relationship. Yet it’s hard to foresee how five Chinese military officials would ever end up in the United States facing trial. In that regard, the Justice Dept. action may be targeted as much at American CEOs as it is at Chinese spies.
The message: Even though you may never see them, thieves are everywhere.
Rick Newman’s latest book is Rebounders: How Winners Pivot From Setback To Success. Follow him on Twitter: @rickjnewman.
 
看把人给气的

scott 2 hours ago
4
11
china are not our friends,silicon valley is swarming with the little bolegged bugeaters,them and their indian buddies.where in the hell did they all come from ?,every company has been infiltrated,hell they even make parts for some of our highest technology,how stupid can you be?it's college boys outsourcing the jobs and selling out our country while raking in the dough.they have no shame.these people should be exposed for the sell outs and yellow arse lickers they are.chinks have ruined my hometown,they came like a swarm of locusts,in 10 years they have transformed a small American town,into a Chinese Disneyland.they suck up all the jobs coming under affirmative action ,and live in all the best neighborhoods.its enough to make you wonder why they are bringing in so many of these rich bastards?,all driving 60,000 dollar Mercedes or lexus ,living it up in america,laughing in our faces while stealing our years of research and development,it makes my blood boil.as for punishment..i would bullwhip these Chinese thieves within an inch of their lives,or until they gave up every other spy they knew of.i miss the old bay area when there were white people still around,we didn't need those buck toothed bowl haircutted bozos back then and we don't now.
More
Collapse Replies (2)Reply
  • fdbd47df8dd3eefd6fb601489b9495e5_48.png

    Bodhidharma 1 hour ago
    1
    0
    maybe we should get saudis to come and fill our universities. Now those dudes are our real buds.
    More
    • profile_b48.png

      Joe in Texarkana 1 hour ago
      1
      1
      Did you ever consider they are very good at math and have become high paid programmers. Or you could go to New Hampshire and spout off in a restaurant.
 
美国人怎么知道是他们几个干的呢?
 
http://www.syracuse.com/news/index....-mail_attachments_innocent-looking_links.html

US says hacking victims in Chinese attack opened simple e-mail attachments, innocent-looking links
china-us-cyberspying-47745684ab68aaa4.jpg

This May 31, 2013 file photo shows the building housing “Unit 61398” of the People’s Liberation Army, center top, on the outskirts of Shanghai, China. (The Associated Press)
Print
By The Associated Press
Follow on Twitter
on May 20, 2014 at 4:35 PM, updated May 20, 2014 at 4:40 PM
0
Reddit
Email

WASHINGTON -- The victims were their own worst enemies.

The hacking techniques the U.S. government says China used against American companies turned out to be disappointingly mundane, tricking employees into opening email attachments or clicking on innocent-looking website links.

The scariest part might be how successfully the ruses worked. With a mouse click or two, employees at big-name American makers of nuclear and solar technology gave away the keys to their computer networks.

In a 31-count indictment on Monday the Justice Department said five Chinese military officials operating under hacker aliases such as "Ugly Gorilla," ''KandyGoo" and "Jack Sun" stole confidential business information, sensitive trade secrets and internal communications for competitive advantage. The U.S. identified the alleged victims as Alcoa World Alumina, Westinghouse, Allegheny Technologies, U.S. Steel, United Steelworkers Union and SolarWorld.

China denied it all on Tuesday.

"The Chinese government and Chinese military as well as relevant personnel have never engaged and never participated in so-called cybertheft of trade secrets," Foreign Ministry spokesman Hong Lei said in Beijing. "What the United States should do now is withdraw its indictment."

That's unlikely. What the Justice Department is doing is spelling out exactly how it says China pulled it off.

The U.S. says the break-ins were more Austin Powers than James Bond. In some cases, the government says, the hackers used "spear-phishing" -- a well-known scam to trick specific companies or employees into infecting their own computers.

The hackers are said to have created a fake email account under the misspelled name of a then-Alcoa director and fooled an employee into opening an email attachment called "agenda.zip," billed as the agenda to a 2008 shareholders' meeting. It exposed the company's network. At another time, a hacker allegedly emailed company employees with a link to what appeared to be a report about industry observations, but the link instead installed malicious software that created a back door into the company's network.

"We are so used to solving problems by clicking an email link, looking at the information and forwarding it on," said Chris Wysopal, a computer security expert and chief technology officer of the software-security firm Veracode. "And if hackers know about you and your company, they can create really realistic-looking messages."

And use of the rudimentary efforts the Justice Department described doesn't mean foreign governments and others won't use more sophisticated and harder-to-detect techniques, said Joshua Corman, the chief technology officer for Sonatype, which helps businesses make their software development secure. Determined hackers escalate their attacks when necessary, he said, but in the cases cited in Monday's federal indictment they didn't have to escalate very far.

Corman noted that the U.S. has much higher investments in research and intellectual property, making America's risk of loss in such thefts disproportionately higher than China's.

Other security layers failed in the hackings blamed on China, too. More-effective antivirus or security software could have blocked the malicious attachments or prevented users from visiting risky web links. Back-end server filters could have prevented dangerous emails from reaching employees. Intrusion-detection systems on corporate networks could have more quickly raised red flags internally after a successful break-in.

"The problem is the technology hasn't advanced enough to detect malicious code," said Kevin Mitnick, the famous hacker who now works as a corporate security consultant. Tricking someone to let you into the system is far easier than identifying hidden vulnerabilities that can be exploited.

Even worse: Employees, by their nature, are socially conditioned to want to open and respond to an email that purports to be from the boss -- never mind that the message may actually be a trick.

"If you start with an incorrect assumption that every email that comes in is a real email," said Hossein Eslambolchi, chief executive at security company CyberFlow Analytics, "you're putting yourself and your corporation at a major risk."
 
后退
顶部