Skip to main content

Chinese hacking explained

The Wall Street Journal and The New York Times have recently asserted that they were hacked - by the Chinese.    It would seem that there is substance to the allegation.    But how do the Chinese do it?       Mother Jones comes to to rescue to explain it all.



"On Monday, an American cybersecurity firm called Mandiant released a report accusing the Chinese government of systematically hacking into American computer networks and targeting state secrets, weapons programs, businesses, and even the nation's gas pipelines. The New York Times vetted the story and concluded that a growing body of evidence "leaves little doubt" that these attacks are originating from a secret Chinese army base. Adam Segal, senior fellow for China studies at the Council on Foreign Relations (an organization that, in the past, has also been targeted by hackers that appeared to be China-based), tells Mother Jones that this "raises the pressure on the increasing drum beat on the US to do something."

So just how freaked out do you need to be? Here's everything you need to know:

How do cyberattacks and cyberwarfare work? A cyberattack is what happens when a hacker penetrates computers or networks for the purpose of maliciously exploiting systems and information. This can lead to identity theft, viruses, theft of intellectual property, or full-on system infiltration (i.e., the hacker can watch your every move). Cyberwarfare is what happens when countries are the ones employing those hackers, often with the goal of stealing state secrets and/or causing damage.

The scheme that Chinese hackers employ to gain footholds on victims' computers is known in computer-speak as spear phishing, according to Mandiant, and it's a scam that's been around for years. The sabotage begins when a victim receives an innocuous work-related email about a meeting or a project from what appears to be a colleague's email address. If the target takes the bait, he or she will click on a hyperlink or download an attachment from the message. In some cases, suspicious recipients have responded to phishing emails with questions about the file's authenticity. The Chinese hackers have responded: "It's legit." When the target downloads the files, they'll be unwittingly installing remote-access software (sometimes referred to as a "backdoor") that allows the hacker to assume control of the victim's computer."

Comments

Popular posts from this blog

Robert Fisk's predictions for the Middle East in 2013

There is no gain-saying that Robert Fisk, fiercely independent and feisty to boot, is the veteran journalist and author covering the Middle East. Who doesn't he know or hasn't he met over the years in reporting from Beirut - where he lives?  In his latest op-ed piece for The Independent he lays out his predictions for the Middle East for 2013. Read the piece in full, here - well worthwhile - but an extract... "Never make predictions in the Middle East. My crystal ball broke long ago. But predicting the region has an honourable pedigree. “An Arab movement, newly-risen, is looming in the distance,” a French traveller to the Gulf and Baghdad wrote in 1883, “and a race hitherto downtrodden will presently claim its due place in the destinies of Islam.” A year earlier, a British diplomat in Jeddah confided that “it is within my knowledge... that the idea of freedom does at present agitate some minds even in Mecca...” So let’s say this for 2013: the “Arab Awakening” (the t...

The NPT (Nuclear Non-Proliferation Treaty) goes on hold.....because of one non-Treaty member (Israel)

Isn't there something radically wrong here?    Israel, a non-signatory to the NPT has, evidently, been the cause for those countries that are Treaty members, notably Canada, the US and the UK, after 4 weeks of negotiation, effectively blocking off any meaningful progress in ensuring the non-proliferation of nuclear weapons.    IPS reports ..... "After nearly four weeks of negotiations, the Nuclear Non-Proliferation Treaty (NPT) Review Conference ended in a predictable outcome: a text overwhelmingly reflecting the views and interests of the nuclear-armed states and some of their nuclear-dependent allies. “The process to develop the draft Review Conference outcome document was anti-democratic and nontransparent,” Ray Acheson, director, Reaching Critical Will, Women’s International League for Peace and Freedom (WILPF), told IPS. “This Review Conference has demonstrated beyond any doubt that continuing to rely on the nuclear-armed states or their nuclear-de...

#1 Prize for a bizarre story.....and lying!

No comment called for in this piece from CommonDreams: Another young black man: The strange sad case of 21-year-old Chavis Carter. Police in Jonesboro, Arkansas  stopped  him and two friends, found some marijuana, searched put Carter, then put him handcuffed  behind his back  into their patrol car, where they say he  shot himself  in the head with a gun they failed to find. The FBI is investigating. Police Chief Michael Yates, who stands behind his officers' story,  says in an interview  that the death is "definitely bizarre and defies logic at first glance." You think?