Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

US Hacker attacks linked to Chinese military("China Prohibits Internet Attacks, Says FM Spokesman")
AFP-SAPA, ^ | 12/13/05 | AFP-SAPA,

Posted on 12/13/2005 6:39:53 AM PST by Diddle E. Squat

A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, a security institute says.

A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, the head of a leading security institute has said.

The attacks have been traced to the Chinese province of Guangdong, and the techniques used make it appear unlikely to come from any other source than the military, said Alan Paller, the director of the SANS Institute, an education and research organization focusing on cybersecurity.

?These attacks come from someone with intense discipline. No other organization could do this if they were not a military organization,? Paller said in a conference call.

In the attacks, Paller said, the perpetrators ?were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?"

Paller said that despite what appears to be a systematic effort to target government agencies and defence contractors, defences have remained weak in many areas.

"We know about major penetrations of defence contractors," he said.

Moreover, he said the US government strategy appears to be to downplay the attacks, which has not helped the situation.

"We have a problem that our computer networks have been terribly and deeply penetrated throughout the US ... and we've been keeping it secret," he said. "The people who benefit from keeping it secret are the attackers."


TOPICS: Crime/Corruption; Front Page News
KEYWORDS: china; chinesemilitary; clintonlegacy; communism; dod; espionage; guangdong; hacker; hacking; taiwan; war; yue
http://en.chinabroadcast.cn/2238/2005-12-13/138@287341.htm

China Prohibits Internet Attacks, Says FM Spokesman

CRIENGLISH.com

The Chinese government has always prohibited attacks on the Internet, Foreign Ministry spokesman Qin Gang said on Tuesday.

"Any work units and individuals are not permitted to use the internet to be engaged in illegal activities or commit crimes," Qin told a regular press conference Thursday afternoon.

Qin made the remarks when commenting on a recent report by a US research institute which says that the Chinese military is probably behind an organized hacker attack on US government computers.

It is illegal to assault the Internet, Qin said, adding that China currently has promulgated several laws on the protection of the internet security, and the relevant regulations are stipulated in the criminal law.

Qin said Chinese public security organs would make laws to deal with those who uses the Internet to commit crimes, including those who assault the Internet itself.

"What grounds does the U.S. have for this accusation," Qin queried,, asking the US side to present its proven evidence if it has any.

1 posted on 12/13/2005 6:39:54 AM PST by Diddle E. Squat
[ Post Reply | Private Reply | View Replies]

To: Diddle E. Squat
Friends of Bill (Clintoon that is . . .)
2 posted on 12/13/2005 6:41:32 AM PST by BenLurkin (O beautiful for patriot dream - that sees beyond the years)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diddle E. Squat
"What grounds does the U.S. have for this accusation," Qin queried,, asking the US side to present its proven evidence if it has any.

Yes, we would love to give you detailed evidence of what we know and how we know it just so you can improve your methods.

/sarcasm

3 posted on 12/13/2005 6:46:47 AM PST by edpc
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diddle E. Squat
China overtakes U.S. as high-tech supplier
China trumps US as top PC, phone exporter
4 posted on 12/13/2005 6:50:21 AM PST by Willie Green (Go Pat Go!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diddle E. Squat

Good Article on Titan Rain, another Chinese attack with consequences more serious than we'd like to admit back in fall of '03.

http://www.securityteam.us/article.php/20050829200849601/print


5 posted on 12/13/2005 6:55:16 AM PST by Sax
[ Post Reply | Private Reply | To 1 | View Replies]

To: edpc
I think part of the whole thing is an effort by the Chinese gov. to get server admins to block the ips from Asia so the people in Asia can't get info from the rest of the world.

I get hammered constantly , I finally just started banning whole ip ranges as soon as an attack is started.

There is really no reason for the attacks other then to get the ips banned.

But once the ips are banned , no one from that area, using that range can get to anything on my servers.... I really think it's more of an effort to keep the Chinese people isolated by their own government.
6 posted on 12/13/2005 6:55:43 AM PST by THEUPMAN (#### comment deleted by moderator)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Diddle E. Squat

"Any work units and individuals are not permitted to use the internet to be engaged in illegal activities or commit crimes,"

What is illegal or a crime is always defined by law - the law in that country.

Where is the Chinese law to this effect? And what laws do the Chinese military operate under?

And of course -- can we trust them to be honest?


7 posted on 12/13/2005 6:57:15 AM PST by George from New England
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diddle E. Squat
?These attacks come from someone with intense discipline. No other organization could do this if they were not a military organization,? Paller said in a conference call.

In the attacks, Paller said, the perpetrators ?were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?"

Almsot like the arguements for Intelligent Design...

8 posted on 12/13/2005 7:19:33 AM PST by cryptical
[ Post Reply | Private Reply | To 1 | View Replies]

To: cryptical

2800 subscribers.


9 posted on 12/13/2005 7:22:24 AM PST by Eric in the Ozarks
[ Post Reply | Private Reply | To 8 | View Replies]

To: Diddle E. Squat

Still, The guy mentions a well descipline person with no keystroke errors, a 30 minute attack to open a backdoor ect. The attack could have been scripted, plus 30 minutes??????? is that guy nuts, 30 minutes would be enough to prove the PLA is involved. Plus those who did it really knew what they wanted, so we can split between the pla and hacking groups who will sell the info for some $$$$$.


10 posted on 12/13/2005 7:44:17 AM PST by Petey139
[ Post Reply | Private Reply | To 1 | View Replies]

To: THEUPMAN

Very interesting idea......worth pursuing this angle further. Thanks for the insights.


11 posted on 12/13/2005 8:08:48 AM PST by indcons
[ Post Reply | Private Reply | To 6 | View Replies]

To: Eric in the Ozarks

Surely you meant 2600 subscribers. (lol)


12 posted on 12/13/2005 3:55:45 PM PST by Pagey (The Clintons ARE the true definition of the word WRETCHED!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Diddle E. Squat

Find out who the attackers are, then have them murdered.


13 posted on 12/13/2005 5:57:26 PM PST by furquhart (Took-Took-Tookie-Goodbye)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pagey

You are correct. 2600.


14 posted on 12/13/2005 6:59:37 PM PST by Eric in the Ozarks
[ Post Reply | Private Reply | To 12 | View Replies]

To: Weirdad; enotheisen; Quix; agitator; Ed_in_NJ; 1234; American_Centurion; Centurion2000; dakine; ...


Paging the InfoSec pinglist...
Let me know if you want to be 1 or 0. (That's ON or OFF, for those who are not binary-compliant)


"In the attacks, Paller said, the perpetrators ?were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?""

"The attacks have been traced to the Chinese province of Guangdong, and the techniques used make it appear unlikely to come from any other source than the military, said Alan Paller, the director of the SANS Institute, an education and research organization focusing on cybersecurity."

This is idiotic. SANS should know better!

How did he know they were in and out and made no keystroke errors in 30 minutes, and that they were from Guangdong if they left no traces? Obviously they left some kind of trace or Paller wouldn't be able to say any of this crap.

Not to minimize the threat of Chinese military hackers... but keep in mind that the Chinese networks aren't so hot, either. If anything, they're worse.


15 posted on 12/13/2005 7:53:20 PM PST by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pagey

"Surely you meant 2600 subscribers. (lol)"

These sound more like 2599 subscribers. ;)


16 posted on 12/13/2005 7:53:52 PM PST by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: adam_az
A buddy of mine runs a security company and he tells me when the relations between ChiComs and Free China are especially tense, the crap traffic from ComChina increases exponentially.

Too bad we'd shut down WalMart if we lobbed a few nukes China's way.
17 posted on 12/14/2005 4:51:19 AM PST by Salo (He hath touched me with his noodly appendage. Ramen.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: adam_az

It sounds like they either captured an entire attack on a honeypot server or a complete session's worth of packets from an attack on a real server. No keystroke errors could either be a very experienced attacker or an automated/scripted attack. If they observed the attacker probing and testing various vectors to find a hole, they may have been able to determine that the attack was probably done manually, not scripted. "No fingerprints" is a vague phrase, but might mean simply that they left no obvious "signature" of techniques that could easily associate them with a known group or class of hackers. Obviously, they were able to trace the attack back to Guangdong, but how can they be sure the attack originated there, instead of simply being relayed by a server there? TTL values in some of the packets might indicate that, but they can be altered, and it's possible for an attacker to launch a scripted attack from a compromised system that somebody else owns. Maybe they have more information than has been revealed.


18 posted on 12/14/2005 6:36:38 AM PST by tentmaker
[ Post Reply | Private Reply | To 15 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson