Skip to main content

Chinese hacking explained

The Wall Street Journal and The New York Times have recently asserted that they were hacked - by the Chinese.    It would seem that there is substance to the allegation.    But how do the Chinese do it?       Mother Jones comes to to rescue to explain it all.

"On Monday, an American cybersecurity firm called Mandiant released a report accusing the Chinese government of systematically hacking into American computer networks and targeting state secrets, weapons programs, businesses, and even the nation's gas pipelines. The New York Times vetted the story and concluded that a growing body of evidence "leaves little doubt" that these attacks are originating from a secret Chinese army base. Adam Segal, senior fellow for China studies at the Council on Foreign Relations (an organization that, in the past, has also been targeted by hackers that appeared to be China-based), tells Mother Jones that this "raises the pressure on the increasing drum beat on the US to do something."

So just how freaked out do you need to be? Here's everything you need to know:

How do cyberattacks and cyberwarfare work? A cyberattack is what happens when a hacker penetrates computers or networks for the purpose of maliciously exploiting systems and information. This can lead to identity theft, viruses, theft of intellectual property, or full-on system infiltration (i.e., the hacker can watch your every move). Cyberwarfare is what happens when countries are the ones employing those hackers, often with the goal of stealing state secrets and/or causing damage.

The scheme that Chinese hackers employ to gain footholds on victims' computers is known in computer-speak as spear phishing, according to Mandiant, and it's a scam that's been around for years. The sabotage begins when a victim receives an innocuous work-related email about a meeting or a project from what appears to be a colleague's email address. If the target takes the bait, he or she will click on a hyperlink or download an attachment from the message. In some cases, suspicious recipients have responded to phishing emails with questions about the file's authenticity. The Chinese hackers have responded: "It's legit." When the target downloads the files, they'll be unwittingly installing remote-access software (sometimes referred to as a "backdoor") that allows the hacker to assume control of the victim's computer."


Popular posts from this blog

Donald T: First seduced..... then betrayed!

All those supporters of Trump - who, heaven's only knows, got him headed for the White House - are in a for more than a rude awakening and shock.   Whatever Trump "promised" is just not going to Paul Krugman so clearly spells out in his latest op-ed piece "Seduced and Betrayed by Donald Trump" in The New York Times.

"Donald Trump won the Electoral College (though not the popular vote) on the strength of overwhelming support from working-class whites, who feel left behind by a changing economy and society. And they’re about to get their reward — the same reward that, throughout Mr. Trump’s career, has come to everyone who trusted his good intentions. Think Trump University.

Yes, the white working class is about to be betrayed.

The evidence of that coming betrayal is obvious in the choice of an array of pro-corporate, anti-labor figures for key positions. In particular, the most important story of the week — seriously, people, stop focusing on Trum…

Snooping..... at its worst

The Brits have just brought in legislation which allows for unprecedented "snooping" in a Western democracy - says Edward Snowden.   Let truthdig explain....

"On Tuesday, the United Kingdom instated the Investigatory Powers Act 2016, a piece of legislation described by whistleblower Edward Snowden as “the most extreme surveillance in the history of western democracy.”

The law, informally known as the “Snooper’s Charter,” spent over a year in Parliament before it was passed. The Guardian reported:

"The new surveillance law requires web and phone companies to store everyone’s web browsing histories for 12 months and give the police, security services and official agencies unprecedented access to the data.

It also provides the security services and police with new powers to hack into computers and phones and to collect communications data in bulk. The law requires judges to sign off police requests to view journalists’ call and web records, but the measure has been descri…

A "Muslim Register"

Outrageous is the word which immediately comes to mind - the idea of a  Muslim Register which Trump has floated.     And how and by or through whom would this Registry comes into being?    Let The Intercept explain.....

"Every American corporation, from the largest conglomerate to the smallest firm, should ask itself right now: Will we do business with the Trump administration to further its most extreme, draconian goals? Or will we resist?

This question is perhaps most important for the country’s tech companies, which are particularly valuable partners for a budding authoritarian. The Intercept contacted nine of the most prominent such firms, from Facebook to Booz Allen Hamilton, to ask if they would sell their services to help create a national Muslim registry, an idea recently resurfaced by Donald Trump’s transition team. Only Twitter said no.

Shortly after the election, IBM CEO Ginni Rometty wrote a personal letter to President-elect Trump in which she offered her congratulation…