Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
United States China

Chinese Hackers Hit US Firms Linked To South China Sea Dispute (bloomberg.com) 52

Chinese hackers have launched a wave of attacks on mainly U.S. engineering and defense companies linked to the disputed South China Sea, the cybersecurity firm FireEye Inc. said. From a report: The suspected Chinese cyber-espionage group dubbed TEMP.Periscope appeared to be seeking information that would benefit the Chinese government, said FireEye, a U.S.-based provider network protection systems. The hackers have focused on U.S. maritime entities that were either linked to -- or have clients operating in -- the South China Sea, said Fred Plan, senior analyst at FireEye in Los Angeles.

"They are going after data that can be used strategically, so it is line with state espionage," said Plan, whose firm has tracked the group since 2013. "A private entity probably wouldn't benefit from the sort of data that is being stolen." The TEMP.Periscope hackers were seeking information in areas like radar range or how precisely a system in development could detect activity at sea, Plan said. The surge in attacks picked up pace last month and was ongoing.

This discussion has been archived. No new comments can be posted.

Chinese Hackers Hit US Firms Linked To South China Sea Dispute

Comments Filter:
  • by Virtucon ( 127420 ) on Friday March 16, 2018 @11:00AM (#56269531)

    I get hit thousands of times a day from port scanners, http/SSH vulnerability probes daily from IP addresses all pointing back to China, Korea, the Middle East and Amazon.. You're just now noticing?

    • Amazon?! (Score:2, Funny)

      by Anonymous Coward

      So Amazon, LLC is part of the Chinese hack?

      Or are you talking Amazon Women who are attacking the US?

      The latter may not be bad especially if there's an invasion and I'll be rounded up and executed by Snu Snu.

    • by CodeHog ( 666724 )
      What do you use to monitor the scanning / probing?
      • by CodeHog ( 666724 )
        so basically dump the log file into spreadsheet and review, got it. I thought maybe someone had an app that could do some smart graphing for you. Might have to look into it more, need a side project to keep from being bored.
  • The cost of Trump (Score:2, Flamebait)

    by Carewolf ( 581105 )

    You allow Russia to hack you and don't retaliate, you can't really expect other people from not doing some consequence free hacking of their own.

    • by Actually, I do RTFA ( 1058596 ) on Friday March 16, 2018 @11:58AM (#56269891)

      China has been hacking the US for longer than Russia and far more pervasively. They just don't bother to monkey in our elections, because they're already winning either way. Russia actually has US politicians who will stand up to them (although they don't seem to have won many elections.)

      • Comment removed based on user account deletion
        • There are a lot of non-kinetic responses that could be effective, ranging from sanctions and embargoes (not even that costly in Russia's case), to confiscating assets of their leaders throughout the western world, to simply cutting them off the Internet. Keep in mind that no one wants to rule a parking lot (Putin, Xi and Kim don't want nuclear war).

      • by Whibla ( 210729 )

        China has been hacking the US for longer than Russia and far more pervasively.

        You might want to look up "Moonlight Maze" [wikipedia.org] before making statements like that.

      • by Whibla ( 210729 )

        I've just realised that the Wikipedia page I linked to in my previous reply was distinctly light on detail. Sorry.

        There's an excellent chapter on Moonlight Maze in Thomas Rid's book Rise of the Machines [wwnorton.com] (The Lost History of Cybernetics). Well worth borrowing from the library, in my opinion.

    • It's cute how you assume you would be privy to US retaliation to their election hacking. Personally I am more disturbed over the Russian nerve agent attack on the soil of a NATO ally than any computer hacking.

    • by tomhath ( 637240 )
      We need to draw a red line in the sand. That'll scare them.
  • by Anonymous Coward

    "They are going after data that can be used strategically, so it is line with state espionage..."

    Keep the parts of your internal network that have "crown jewel level" information unreachable from the outside as much as possible.

    If you have to allow data to be moved to the "outside world - for example, so a manager can compose an email that contains summaries of important information - do it in a way that is heavily controlled and audited and extremely difficult to "penetrate from the outside" without trigge

  • Couldn't something be done to choke off more suspicious incoming traffic? Or does it fan out to non-aligned proxy nations to be disguised and forwarded?

  • by hyades1 ( 1149581 ) <hyades1@hotmail.com> on Friday March 16, 2018 @01:31PM (#56270575)

    It appear's Uncle Sam's recent willingness to drop trou and put his bum in the air for Putin has been noticed elsewhere.

    So now China's trying it on.

    I wonder who will be next to have a go. Pretty soon, US cyberspace is going to look like Gangbang Night at a Hell's Angels clubhouse.

  • by Anonymous Coward

    Had to block 2 more subnets today ... 80.211.128.0/18 out of Italy and 86.49.128.0/17 out of the Czech Republic.

    Already block Chinese mainland the last 8 yrs, but they know how to use VPNs.

    Thousands of attempts against ssh, email and web servers ain't fun.

"If it ain't broke, don't fix it." - Bert Lantz

Working...