Skip to main content

Chinese hacking explained

The Wall Street Journal and The New York Times have recently asserted that they were hacked - by the Chinese.    It would seem that there is substance to the allegation.    But how do the Chinese do it?       Mother Jones comes to to rescue to explain it all.



"On Monday, an American cybersecurity firm called Mandiant released a report accusing the Chinese government of systematically hacking into American computer networks and targeting state secrets, weapons programs, businesses, and even the nation's gas pipelines. The New York Times vetted the story and concluded that a growing body of evidence "leaves little doubt" that these attacks are originating from a secret Chinese army base. Adam Segal, senior fellow for China studies at the Council on Foreign Relations (an organization that, in the past, has also been targeted by hackers that appeared to be China-based), tells Mother Jones that this "raises the pressure on the increasing drum beat on the US to do something."

So just how freaked out do you need to be? Here's everything you need to know:

How do cyberattacks and cyberwarfare work? A cyberattack is what happens when a hacker penetrates computers or networks for the purpose of maliciously exploiting systems and information. This can lead to identity theft, viruses, theft of intellectual property, or full-on system infiltration (i.e., the hacker can watch your every move). Cyberwarfare is what happens when countries are the ones employing those hackers, often with the goal of stealing state secrets and/or causing damage.

The scheme that Chinese hackers employ to gain footholds on victims' computers is known in computer-speak as spear phishing, according to Mandiant, and it's a scam that's been around for years. The sabotage begins when a victim receives an innocuous work-related email about a meeting or a project from what appears to be a colleague's email address. If the target takes the bait, he or she will click on a hyperlink or download an attachment from the message. In some cases, suspicious recipients have responded to phishing emails with questions about the file's authenticity. The Chinese hackers have responded: "It's legit." When the target downloads the files, they'll be unwittingly installing remote-access software (sometimes referred to as a "backdoor") that allows the hacker to assume control of the victim's computer."

Comments

Popular posts from this blog

Reading the Chilcot Inquiry Report more closely

Most commentary on the Chilcot Inquiry Report of and associated with the Iraq War, has been "lifted" from the Executive Summary.   The Intercept has actually gone and dug into the Report, with these revelations : "THE CHILCOT REPORT, the U.K.’s official inquiry into its participation in the Iraq War, has finally been released after seven years of investigation. Its executive summary certainly makes former Prime Minister Tony Blair, who led the British push for war, look terrible. According to the report, Blair made statements about Iraq’s nonexistent chemical, biological, and nuclear programs based on “what Mr. Blair believed” rather than the intelligence he had been given. The U.K. went to war despite the fact that “diplomatic options had not been exhausted.” Blair was warned by British intelligence that terrorism would “increase in the event of war, reflecting intensified anti-US/anti-Western sentiment in the Muslim world, including among Muslim communities in the

An unpalatable truth!

Quinoa has for the last years been the "new" food on the block for foodies. Known for its health properties, foodies the world over have taken to it. Many restaurants have added it to their menu. But, as this piece " Can vegans stomach the unpalatable truth about quinoa? " from The Guardian so clearly details, the cost to Bolivians and Peruvians - from where quinoa hails - has been substantial. "Not long ago, quinoa was just an obscure Peruvian grain you could only buy in wholefood shops. We struggled to pronounce it (it's keen-wa, not qui-no-a), yet it was feted by food lovers as a novel addition to the familiar ranks of couscous and rice. Dieticians clucked over quinoa approvingly because it ticked the low-fat box and fitted in with government healthy eating advice to "base your meals on starchy foods". Adventurous eaters liked its slightly bitter taste and the little white curls that formed around the grains. Vegans embraced quinoa as

Climate change: Well-organised hoax?

There are still some - all too sadly people with a voice who are listened to - who assert that climate change is a hoax. Try telling that to the people of Colorado who recently experienced horrendous bushfires, or the people of Croatia suffering with endless days of temps of 40 degrees (and not much less than 30 at night time) some 8-10 degrees above the norm. Bill McKibben, take up the issue of whether climate change is a hoax, on The Daily Beast : Please don’t sweat the 2,132 new high temperature marks in June—remember, climate change is a hoax. The first to figure this out was Oklahoma Senator James Inhofe, who in fact called it “the greatest hoax ever perpetrated on the American people,” apparently topping even the staged moon landing. But others have been catching on. Speaker of the House John Boehner pointed out that the idea that carbon dioxide is “harmful to the environment is almost comical.” The always cautious Mitt Romney scoffed at any damage too: “Scientists will fig