Almost half of the nearly 500,000 cyberattacks aimed at computers in China in 2010 originated overseas, according to government officials who reportedly said the vast majority of the attacks a Chinese monitoring agency reported were in the form of Trojan horse malware that installs on computers.
The Trojan horse malware allows cybercriminals to monitor usage and access personal information, the Associated Press reported.
The news comes just days after computer security firm McAfee said it had “uncovered a massive global cyber spying campaign it described as a five-year targeted operation by one unnamed actor – which several analysts have indicated was China,” the AFP reported Tuesday.
The findings were reported on the website of the National Computer Network Emergency Response Coordination Center of China, according to the AP, which said that “of those Trojan horse attacks, 14.7 percent of those were traced to IP addresses in the United States and 8 percent in India.”
CNCERT/CC is a national level CERT organization responsible for the coordination of activities among all Computer Emergency Response Teams within China concerning incidents on national public networks, according to CNCERT /CC officials.
Dmitri Alperovitch, vice president, threat research at McAfee and author of the Aug. 5 report, said McAfee is “publishing the most comprehensive analysis ever revealed of victim profiles from a five-year targeted operation by one specific actor, ‘Operation Shady RAT,’ as I have named it at McAfee (RAT is a common acronym in the industry that stands for remote access tool).”
McAfee said it had identified “72 targeted intrusions” – 49 of them American, including 14 federal, state and county agencies and 11 defense contractors – and also informed law enforcement agencies, which it said were investigating.
With broad suspicion falling on China, recent reports have suggested Beijing might be behind long-term security attacks internationally.
“McAfee Inc. reported in early August that cyberattacks lasting at least five years targeted more than 70 entities,” the AP reported. Those entities include national governments; targets identified by the firm include the United Nations, the International Olympic Committee and many American companies
China has not responded officially but state media has said the speculation of a Chinese link was irresponsible, the AP said. Instead, China has denied charges of hacking and claims that its own country is a victim of hacking.
Jeff Moss, an Internet security expert, defended the country, saying it would be difficult to narrow down the suspects in a broad campaign. “China is a pretty convenient punching bag,” he told The New York Times.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.
Executive Editor, Strategic Initiatives
SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…
Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …
In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…
In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…
To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…