Skip to main content

Chinese hacking explained

The Wall Street Journal and The New York Times have recently asserted that they were hacked - by the Chinese.    It would seem that there is substance to the allegation.    But how do the Chinese do it?       Mother Jones comes to to rescue to explain it all.

"On Monday, an American cybersecurity firm called Mandiant released a report accusing the Chinese government of systematically hacking into American computer networks and targeting state secrets, weapons programs, businesses, and even the nation's gas pipelines. The New York Times vetted the story and concluded that a growing body of evidence "leaves little doubt" that these attacks are originating from a secret Chinese army base. Adam Segal, senior fellow for China studies at the Council on Foreign Relations (an organization that, in the past, has also been targeted by hackers that appeared to be China-based), tells Mother Jones that this "raises the pressure on the increasing drum beat on the US to do something."

So just how freaked out do you need to be? Here's everything you need to know:

How do cyberattacks and cyberwarfare work? A cyberattack is what happens when a hacker penetrates computers or networks for the purpose of maliciously exploiting systems and information. This can lead to identity theft, viruses, theft of intellectual property, or full-on system infiltration (i.e., the hacker can watch your every move). Cyberwarfare is what happens when countries are the ones employing those hackers, often with the goal of stealing state secrets and/or causing damage.

The scheme that Chinese hackers employ to gain footholds on victims' computers is known in computer-speak as spear phishing, according to Mandiant, and it's a scam that's been around for years. The sabotage begins when a victim receives an innocuous work-related email about a meeting or a project from what appears to be a colleague's email address. If the target takes the bait, he or she will click on a hyperlink or download an attachment from the message. In some cases, suspicious recipients have responded to phishing emails with questions about the file's authenticity. The Chinese hackers have responded: "It's legit." When the target downloads the files, they'll be unwittingly installing remote-access software (sometimes referred to as a "backdoor") that allows the hacker to assume control of the victim's computer."


Popular posts from this blog

Whatever democracy the Palestinians had is dying

Almost a desperate cry from a well-known, respected and sober moderate Palestinian.

Mustafa Barghouthi is secretary-general of the Palestinian National Initiative and a member of the Palestinian Legislative Council. He was a candidate for the Palestinian presidency in 2005.

He writes in a piece "The Slow Death of Palestinian Democracy" on FP:

"Palestinian municipal elections were supposed to be held last week. Instead, they were canceled. A statement released by the Palestinian Authority claimed the cancellation was "in order to pave the way for a successful end to the siege on Gaza and for continued efforts at unity" between Hamas, which governs the Gaza Strip, and the government in the West Bank.

The cancellation of this election was an unjustified, unlawful, and unacceptable act. It damages democratic rights and makes a mockery of the interests of the Palestinian people.

But this is far more than an internal Palestinian issue. The only lasting peace between Isr…

Big Brother alive and well in the USA in 2007

The so-called "war on terror" has shown itself up in a multitude of manifestations. The most dangerous thing has been governments using the "excuse" of the war to restrict certain civil liberties, allowing government agencies to pursue a variety of things that they would otherwise would not - and should not - be allowed to do and gathering, and retaining, a variety of information on its citizens.

The Washington Post reports on the latest incursions into civil liberties of all Americans:

"The U.S. government is collecting electronic records on the travel habits of millions of Americans who fly, drive or take cruises abroad, retaining data on the persons with whom they travel or plan to stay, the personal items they carry during their journeys, and even the books that travelers have carried, according to documents obtained by a group of civil liberties advocates and statements by government officials.

The personal travel records are meant to be stored for as lo…