元器件交易网讯 5月20日消息,据外媒Bits发文称,
“我们所跟踪的中国团队仅是冰山一角,”私人安全公司Crowdstrike合伙人乔治·库尔兹(George Kurtz)表示一直在跟踪解放军61398部队及其他中国黑客团体。
除61398部队外,美国国家安全局及其情报伙伴还在跟踪20多个中国黑客团队,其中半数属于中国军队及海军部门。他们侵入美国政府机构及公司,涉足无人驾驶飞机、核武器制造技术。
安全部官员称起诉的目的在于让中国控制自己的行为,以及说服被入侵却害怕失去中国市场的公司挺身而出。
华盛顿战略研究中心(the Center for Strategic Studies)网络安全专家詹姆斯·刘易斯(JamesA. Lewis)表示,此事无关美国政府如何处置这些黑客,更重要的是中国政府将如何处理此事。“起诉书是向中国表明他们应该采取行动,中国应该控制好这些军方人员。”
美国国家安全局及合作伙伴正在追踪涉嫌窃取信息的解放军第二部队及第三部队,其中61398部队属于解放军总参谋部三部二局。自2004年起美国国家安全局开始跟踪解放军三部一局入侵五角大楼网络事件,此后该组织涉嫌多次侵入电信及信息技术公司、特别是思科、瞻博、博通这样的公司。
路易斯表示:“中方的反馈将左右事件的发展方向,如果他们不理会此事,美国财政部可能会采取措施,旅游、学业签证也会被限制。”
他还补充道:“中国的损失要比我们的损失多得多。”(元器件交易网毛毛 译)
以下为原文:
The indictments of five Chinese militaryhackers by the Justice Department on Monday has raised questions of whatactions, if any, American officials plan to take against members of the morethan 20 other hacking units that American officials and their partners arecurrently tracking inside China.
“If you look at all the groups that we track in China, this is justthe very tip of the iceberg,” said George Kurtz, a co-founder of Crowdstrike, aprivate security firm that has been tracking the People’s Liberation Army Unit61398 and other hacking groups in China. “The indictments are just one piece ofa broader puzzle.”
Beyond Unit 61398, the National SecurityAgency and its intelligence partners are currently tracking more than 20Chinese hacking groups — over half of them Chinese military and naval units —as they break into an array of American government agencies and companies,ranging from drone and nuclear weapon parts makers to technology, retail andenergy firms and nonprofit research organizations, according to a half-dozenUnited States officials who declined to be named because of the classified andongoing nature of the investigations.
Security officials said that theindictments were intended to push China to get serious about reining in variousP.L.A. hacking units and that they have been in the works for two years. One ofthe major challenges, officials said, was persuading the victim corporations —which feared a loss of sales in China or state retaliation — to come forward.
“They had to gather really strong evidence that these companies hadbeen hacked, and then had to convince the companies to go public, despite fearof retaliation,” said James A. Lewis, a cybersecurity expert at the Center forStrategic Studies in Washington, who has participated in several officialSino-American discussions on cyberespionage.
The indictments, Mr. Lewis said, are notabout what the United States will do with these hackers, but what the Chinesegovernment will do with them. “The indictment is meant to send a clear publicmessage to China that they need to take action,” he said. “They need to getthese P.L.A. entities under control.”
While the majority of the groups the N.S.A.has been tracking, including Unit 61398, are P.L.A. units, officials say manyof them are murky collectives of hackers from privately owed Chinese companiesand state-funded universities that officials believe have been contracted bythe Ministry of State Security, China’s civilian spy agency, to hack victims —such as clean energy firms — that help China meet its economic objectives.
Officials say it is unclear how the Chinesegovernment tasks such missions, a quandary that has taken on more urgency afteranalysts were able to trace sophisticated cyberattacks against a disconcertinglist of victims — drone and missile makers and nuclear technology developersamong them — to three privately contracted groups of Chinese hackers.
Officials say one of these privatelycontracted groups, based in Guangzhou, China, has been tied to attacks againstdefense contractors — including missile, satellite and space technologies andnuclear propulsion technology developers — in the United States, Britain andRussia. More recently, two officials said that the group has expanded itstargets to include law firms, which hold valuable intellectual property fortheir clients but often lack the security defenses of a larger corporation.
Separately, officials say, the N.S.A. andits partners have been tracking a group of privately employed technologyworkers based in the industrial city of Tianjin. Since 2005, officials say,they have tied attacks on defense contractors and technology and energy firms,as well as Chinese separatists, to the group.
One of these groups of privately employedChinese hackers that have officials most concerned is also one of the leastprolific.<<< Since 2008, officials say members of this group havesurgically struck a number of companies that develop drones and satellitetechnology.
Officials say that they believe thesegroups work at the behest of the Ministry of State Security and that the factthat they are contracted but not directly employed by the state gives Beijing adegree of deniability.
But the vast majority of groups the N.S.A.and its partners are tracking are units of the People’s Liberation Army’sSecond and Third Departments, which maintain eavesdropping posts across China.They say Unit 61398 — formally the Second Bureau of the People’s LiberationArmy’s Third Department — accounts for only a slice of the attacks orchestratedby the P.L.A.’s Third Department.
According to interviews with three formergovernment officials, the N.S.A. began tracking the PLA’s Third Department in2004 after its First Bureau hacked into the Pentagon’s networks, two formergovernment officials said. Since then, the unit has been tied to numerouscyberattacks on foreign telecom and technology companies that specialize innetworking and encryption equipment, like the types manufactured by Americancompanies including Cisco, Juniper and Broadcom.
Judging by their victims, officials sayother P.L.A. bureaus are assigned to targets — including politicians anddiplomats at government agencies — in specific geographies. For example, oneP.L.A. bureau has been tied to several attacks against diplomats andpoliticians in South Asia, while another has been linked to attacks on targetsin Central Asia, including the foreign ministries of Afghanistan, India andPakistan.
Officials also say that thousands ofattacks against the military networks of the United States and a number ofAsian countries, including South Korea and Japan, have been attributed to the Chinese Navy’s First and SecondTechnical Reconnaissance Bureaus.
After Monday’s indictments, Americanofficials say that they will be looking to see what, if any, steps Beijingtakes to curb cyberespionage.
“A lot of this will depend on how the Chinese react to this inprivate,” said Mr. Lewis, the cybersecurity expert. “If they blow this off, youcould imagine actions by the Treasury, visa restrictions on travel orrestrictions on study.”
He added: “The Chinese have more to lose inthis than we do.”
关注我们
公众号:china_tp
微信名称:亚威资讯
显示行业顶级新媒体
扫一扫即可关注我们