Feeds

France blames China for hack attacks

Chinese whispers

Top 5 reasons to deploy VMware with Tegile

Updated Three more western nations have blamed China for an upsurge in hacking attacks against government computers.

Germany, the USA and the UK have all become the subject of targeted attacks originating from China, with many observers pointing the finger of blame towards China's Peoples Liberation Army (PLA). France, Australia and New Zealand joined the growing list this week.

The Chinese government has denied any involvement in the attacks, with officials painting the Asian giant as a victim of unidentified hackers.

Zut Alors

Earlier this week, Francis Delon, the secretary general of France's National Defence Office, confirmed that France had recently become the target of similar attacks.

Delon said Chinese hackers had "penetrated outer levels" of state computer systems. "We have proof that there is involvement with China. But I am prudent. When I say China, this does not mean the Chinese government. We don't have any indication now that it it was done by the Chinese People's Liberation Army," he added, France 24 reports.

Cyber door rattling

Targets of the attack against France reportedly include the French defence ministry's internet site. French sources are portraying that attacks, described as more of a reconnaissance effort than the frontal assault, as a nuisance rather than a threat.

Australian news wire reports suggest the Chinese also attempted to hack into systems run by the Australian and New Zealand governments. New Zealand Prime Minister Helen Clark said that "foreign intelligence agencies" had attempted to hack into its systems. "What I can stress is that absolutely no classified information has ever been penetrated by these attacks," She added.

Although the Austrlian government is neither confirming or denying the reports unnamed government sources told ANI that the country was indeed under cyberattack from China.

China denies involvement

Chinese government has denied that its army was involved in the attacks. "Saying that the Chinese military has made cyber attacks on the networks of foreign governments is groundless and irresponsible and are a result of ulterior motives," said foreign ministry spokeswoman Jiang Yu.

Senior Chinese officials are suggesting it is even more of victim of cyberespionage than western nations. China has sustained "massive" and "shocking" losses of state and military secrets via the internet, according to Lou Qinjian, Vice Minister of Information Industry.

"The Internet has become the main technological channel for external espionage activities against our core, vital departments," he wrote in the magazine Chinese Cadres Tribune, Reuters reports

Whodunit

Security observers reckon it's very difficult to trace cyber attacks back to government agencies in foreign countries with any certainty.

Giacomo Paoni, CTO of WSLabi, which runs an online auction site for security vulnerabilities, said part of the difficulty is that China is famous for offering so-called "bulletproof hosting". The availability of gray-market services, popular with online ne'er do wells, creates a rogues gallery of potential suspects, Paoni argues.

"Internet service providers offering bulletproof hosting - aka bulk-friendly hosting - have a high degree of tolerance as to what actions their customers can carry out, therefore they are usually used by attackers and spammers from all over the world as a good way to hide their tracks."

Whether or not the Chinese Government itself is behind the attacks one thing is sure: western governments are under attack by organised groups of malicious hackers based in China. Paoni suggests that, at minimum, the Chinese Government is tolerant of this activity. "Regardless of who is really responsible for the hacker attacks being processed via the Chinese servers, the level of sophistication involved is quite high," he added. ®

Beginner's guide to SSL certificates

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.