Security Firms Say Chinese Hackers Behind US Ransomware Attacks (reuters.com) 40
An anonymous reader writes: According to four leading security firms, some of the recent ransomware attacks against U.S. companies have been performed by hacking groups working at the behest of China's government. From the report, "Security firms Attack Research, InGuardians and G-C Partners, said they had separately investigated three other similar ransomware attacks since December. Although they cannot be positive, the companies concluded that all were the work of a known advanced threat group from China."
How does this make sense? (Score:2)
OK...so they get cash money for being a nuisance.
>> hacking groups working at the behest of China's government
But...it's for the communist Chinese government (the evil "ChiComs!!!"), because they what? Hate businesses? Need money? Isn't it more likely that ransom software that delivers money to specific criminals is being used by...mere criminals?
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Reminds me of the late 1990's when there were too many unemployed ex-Soviet nuclear engineers, which worried a lot of people. It may be where Kimmy J. got some of his toys. There are certain kinds of specialists a country shouldn't want idle or broke en-mass. Give them a stipend, for goodness sake, or maybe some make-work little projects to keep them busy.
Re: (Score:2)
Re: (Score:1)
In the late 90's, that country had confusionism.
Re: (Score:2)
A weapon unused can rust. A skill unused can fade away. A samurai unused pines for lost honour
I wonder... (Score:2)
...How many of these "security research companies" are little more than one or two guys with a blog?
Re: (Score:2)
Re: (Score:2)
So in order to validate the claim the government of China is behind those attacks, you have proof that you obtained via conducting criminal espionage activities in China, in which case good luck with that. The other claim is down to IP address and IP address alone with no idea who or how many are involved or even whether the IP was spoofed. Now to turn that around the US government is guilty of every crime committed by a government employee and the US government should be criminally prosecuted for all those
Re: (Score:1)
Sorry, accidentally clicked in the wrong spot and caused a down-mod. I'm hoping this post undoes the mod. Apologies if it doesn't.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Consider the source (Score:1)
Who benefits most from escalating cyberwarfare/diplomatic tensions in this area?
Most people don't understand how impossible attribution is in the case of cyber-warfare. It is trivial to include cultural references/grammar patterns from a foreign language in the code to indicate national affiliation(to say nothing of VPN/Tor exit node location).
The best you can hope for is to infiltrate the attacker PC with a RAT/keylogger and attempt to make conclusions about the nationality of the attacker, but this ignore
Whoever is responsible, they are fucking agressive (Score:1)
I've seen a 30x increase in emails with malicious payloads since the 1st. And that's after blackholes and the usual filtering.
These are messages that have been dropped for having known malware, or attachments that are blacklisted (Anything executable, many office file types, pass-worded zips, etc)
I'm pretty close to blacklisting zip files alltogether.
Makes sense. (Score:2)
The poor cybersecurity stance of US firms puts information that is proprietary to their Chinese trading partners as risk, and thus affects the security of the Chinese state. But what can the Chinese government do about that? Call up the US government and say, "Make those clowns get their act together!"? The US government is paralyzed by even bigger clowns.
So what you do is pick out some of the worst offenders and shake them down. Not for so much money that they go out of business -- they are after al you
Re: (Score:2)
Oh I get it,
evidently not.
Wrong.... (Score:1)
Re: (Score:2)
Re: (Score:2)
All the classic code review shows is all the expected code fragments, ip ranges and time of day results found point back to "expected" nations and their mil and their govs.
The idea that smarter coders are just working for other efforts, mils and govs using this surge of reported activity as cover to mask their own efforts stiff seems to be unimaginable.
Generation
Re: (Score:2)
Where do we go from here? (Score:1)
Over the last few years, there's been an absolute ton of progress made on the hacking side of things (especially cryptoware style viruses), and not really any meaningful defensive measures other than "block all attachments." Corporate AV only seems effective a few days after the virus launches, but that's way too slow.
For example, a client got hit with Feb 16th's locky virus, which managed to get past the firewall AV scanner (Fortigate), the mail server AV scanner (Sophos), the local workstation AV (TrendM
Re: (Score:1)
Mobile Locksmith Services San Diego (Score:1)
Proofs? (Score:2)
"... Although they cannot be positive, the companies concluded that all were the work of a known advanced threat group from China."
They can't be positive and concluded this? Where are the proofs?