Cyber Warfare II News, Pics, Views

Ultra

Junior Member
.


I think this is the first time I have heard of a Chinese anti-virus company actually doing something.



China responds to report on cyber attack

2015-06-02 17:16:39

BEIJING, June 2 (Xinhua) -- If overseas hacking organization OceanLotus is proven guilty for stealing government information, it will further evidence that China falls victim to hacker attacks, a Chinese spokeswoman said on Tuesday.


Foreign Ministry spokeswoman Hua Chunying's comment came after a report released Friday by Chinese Internet company Qihoo 360's SkyEye Labs accused OceanLotus of launching "elaborately organized" online attacks on China's marine agencies, scientific research institutions and shipping companies since April 2012.


"If this is true, it will just prove that China is a victim to hacker attacks," Hua said at a daily news briefing.


She reiterated China's opposition to hacking in any form and said the most effective way to cope with them is international cooperation.


China is willing to better cooperate with the international community on cyber space security on the basis of mutual respect and trust, formulate national norms to jointly combat cyber attacks and foster a peaceful, secure, open and cooperative cyber space.


Please, Log in or Register to view URLs content!
 

Blackstone

Brigadier
There's a report of a massive cyber attack against the US, supposedly originated in China. If the facts show private Chinese hacking groups did the deed, then US should press CCP hard to crack down on their criminals. And if it turns out to be Beijing sponsored, then US should retaliate in kind, plus interest, or risk more abuse.

Please, Log in or Register to view URLs content!


WASHINGTON (AP) — China-based hackers are suspected of breaking into the computer networks of the U.S. government personnel office and stealing identifying information of at least 4 million federal workers, American officials said Thursday.

The Department of Homeland Security said in a statement that data from the Office of Personnel Management and the Interior Department had been compromised.

"The FBI is conducting an investigation to identify how and why this occurred," the statement said.

The hackers were believed to be based in China, said Sen. Susan Collins, a Maine Republican.

Collins, a member of the Senate intelligence committee, said the breach was "yet another indication of a foreign power probing successfully and focusing on what appears to be data that would identify people with security clearances."

A U.S. official who declined to be identified said the data breach could potentially affect every federal agency. One key question is whether intelligence agency employee information was stolen. Former government employees are affected as well.

"This is an attack against the nation," said Ken Ammon, chief strategy officer of Xceedium, who said the attack fit the pattern of those carried out by nation states for the purpose of espionage.

The information stolen could be used to impersonate or blackmail federal employees with access to sensitive information, he said.

The Office of Personnel Management is the human resources department for the federal government, and it conducts background checks for security clearances. The OPM conducts more than 90 percent of federal background investigations, according to its website.

The agency said it is offering credit monitoring and identity theft insurance for 18 months to individuals potentially affected. The National Treasury Employees Union, which represents workers in 31 federal agencies, said it is encouraging members to sign up for the monitoring as soon as possible.

In November, a former DHS contractor disclosed another cyberbreach that compromised the private files of more than 25,000 DHS workers and thousands of other federal employees.

DHS said its intrusion detection system, known as EINSTEIN, which screens federal Internet traffic to identify potential cyber threats, identified the hack of OPM's systems and the Interior Department's data center, which is shared by other federal agencies.

It was unclear why the EINSTEIN system didn't detect the breach until after so many records had been copied and removed.

"DHS is continuing to monitor federal networks for any suspicious activity and is working aggressively with the affected agencies to conduct investigative analysis to assess the extent of this alleged intrusion," the statement said.

Rep. Adam Schiff, ranking Democrat on the House intelligence committee, called the hack "shocking, because Americans may expect that federal computer networks are maintained with state of the art defenses."

Ammon said federal agencies are rushing to install two-factor authentication with smart cards, a system designed to make it harder for intruders to access networks. But implementing that technology takes time.

Senate Intelligence Committee Chairman Richard Burr, R-N.C., said the government must overhaul its cybersecurity defenses. "Our response to these attacks can no longer simply be notifying people after their personal information has been stolen," he said. "We must start to prevent these breaches in the first place."
 

JayBird

Junior Member
The last attack on the White House unclassified system they blamed China at first. Then weeks later all the of the sudden the Russians were responsible. And these are the same people who said North Korea was behind the Sony hack.

The problem is the US credibility is suspect after crying wolf too many times of China Hacking. I won't believe it unless they have solid proof that China did it.
 

Blackstone

Brigadier
I couched my post with "if" precisely because we need all the relevant facts to come out before taking hard actions. But make no mistake about it, any nation that allows cyber attacks on itself without responding in kind deserves what it gets. If China is found to be guilty, then US must take appropriate actions.

Moderation in pursue of justice in no virtue- Barry Goldwater
 

shen

Senior Member
look at the post right above you. is the timing coincidence? looks like both sides trading accusation and playing the victim card.
 

AssassinsMace

Lieutenant General
There doesn't need to be proof. There was a story recently about the new San Francisco Bay Bridge where previously rods that anchored the bridge failed because of they were made poorly. Well news tests showed more rods have since failed. It was reported previously that the rods were made in the US but of course read the comments and they were blaming made in China. Someone posted multiple times an article that said the rods were made in the US. Even with proof people didn't believe it and one guy argued without proof that it may have came from the US but shipped from China. There can be proof China didn't do it, and people will still believe China did it. Remember the good ole days where China was criminal for forcing internet companies like Google to hand over data of their China users only to find out Google was doing the very same thing for the US government? If you're willing to punish countries for something you do too, truth and justice doesn't matter.

Of course bugging the Chinese Air force One is not a crime but charging China gathering personal data on government workers is a punishable crime. In that case there was irrefutable proof who bugged the Chinese Air Force One.
 

Equation

Lieutenant General
I couched my post with "if" precisely because we need all the relevant facts to come out before taking hard actions. But make no mistake about it, any nation that allows cyber attacks on itself without responding in kind deserves what it gets. If China is found to be guilty, then US must take appropriate actions.

Moderation in pursue of justice in no virtue- Barry Goldwater
So did the Germans take any action after founding out the NSA had hacked into their government system?:rolleyes:
 

Blackstone

Brigadier
So did the Germans take any action after founding out the NSA had hacked into their government system?:rolleyes:
Don't know; don't care.

As Thucydides said to the Melians, "for ourselves, we shall not trouble you with specious pretenses—either of how we have a right to our empire because we overthrew the Mede, or are now attacking you because of wrong that you have done us—and make a long speech which would not be believed; and in return we hope that you, instead of thinking to influence us by saying that you did not join the Spartans, although their colonists, or that you have done us no wrong, will aim at what is feasible, holding in view the real sentiments of us both; since you know as well as we do that right, as the world goes, is only in question between equals in power, while the strong do what they can and the weak suffer what they must."

If we could prove the Communist plutocrats attacked us, then we must show them what for. Realpolitik 101.
 

Equation

Lieutenant General
Don't know; don't care.

As Thucydides said to the Melians, "for ourselves, we shall not trouble you with specious pretenses—either of how we have a right to our empire because we overthrew the Mede, or are now attacking you because of wrong that you have done us—and make a long speech which would not be believed; and in return we hope that you, instead of thinking to influence us by saying that you did not join the Spartans, although their colonists, or that you have done us no wrong, will aim at what is feasible, holding in view the real sentiments of us both; since you know as well as we do that right, as the world goes, is only in question between equals in power, while the strong do what they can and the weak suffer what they must."

If we could prove the Communist plutocrats attacked us, then we must show them what for. Realpolitik 101.

So that means China can do the same to those who cyber attacked them as well.

“Don't do unto others what you don't want others to do unto you.” - Confucius
 
Top