Feeds

France blames China for hack attacks

Chinese whispers

Securing Web Applications Made Simple and Scalable

Updated Three more western nations have blamed China for an upsurge in hacking attacks against government computers.

Germany, the USA and the UK have all become the subject of targeted attacks originating from China, with many observers pointing the finger of blame towards China's Peoples Liberation Army (PLA). France, Australia and New Zealand joined the growing list this week.

The Chinese government has denied any involvement in the attacks, with officials painting the Asian giant as a victim of unidentified hackers.

Zut Alors

Earlier this week, Francis Delon, the secretary general of France's National Defence Office, confirmed that France had recently become the target of similar attacks.

Delon said Chinese hackers had "penetrated outer levels" of state computer systems. "We have proof that there is involvement with China. But I am prudent. When I say China, this does not mean the Chinese government. We don't have any indication now that it it was done by the Chinese People's Liberation Army," he added, France 24 reports.

Cyber door rattling

Targets of the attack against France reportedly include the French defence ministry's internet site. French sources are portraying that attacks, described as more of a reconnaissance effort than the frontal assault, as a nuisance rather than a threat.

Australian news wire reports suggest the Chinese also attempted to hack into systems run by the Australian and New Zealand governments. New Zealand Prime Minister Helen Clark said that "foreign intelligence agencies" had attempted to hack into its systems. "What I can stress is that absolutely no classified information has ever been penetrated by these attacks," She added.

Although the Austrlian government is neither confirming or denying the reports unnamed government sources told ANI that the country was indeed under cyberattack from China.

China denies involvement

Chinese government has denied that its army was involved in the attacks. "Saying that the Chinese military has made cyber attacks on the networks of foreign governments is groundless and irresponsible and are a result of ulterior motives," said foreign ministry spokeswoman Jiang Yu.

Senior Chinese officials are suggesting it is even more of victim of cyberespionage than western nations. China has sustained "massive" and "shocking" losses of state and military secrets via the internet, according to Lou Qinjian, Vice Minister of Information Industry.

"The Internet has become the main technological channel for external espionage activities against our core, vital departments," he wrote in the magazine Chinese Cadres Tribune, Reuters reports

Whodunit

Security observers reckon it's very difficult to trace cyber attacks back to government agencies in foreign countries with any certainty.

Giacomo Paoni, CTO of WSLabi, which runs an online auction site for security vulnerabilities, said part of the difficulty is that China is famous for offering so-called "bulletproof hosting". The availability of gray-market services, popular with online ne'er do wells, creates a rogues gallery of potential suspects, Paoni argues.

"Internet service providers offering bulletproof hosting - aka bulk-friendly hosting - have a high degree of tolerance as to what actions their customers can carry out, therefore they are usually used by attackers and spammers from all over the world as a good way to hide their tracks."

Whether or not the Chinese Government itself is behind the attacks one thing is sure: western governments are under attack by organised groups of malicious hackers based in China. Paoni suggests that, at minimum, the Chinese Government is tolerant of this activity. "Regardless of who is really responsible for the hacker attacks being processed via the Chinese servers, the level of sophistication involved is quite high," he added. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.