Feeds

India and Belgium decry Chinese cyber attacks

Join the ranks

Secure remote control for conventional and virtual desktops

Belgium and India have joined the growing ranks of countries voicing concerns about cyber attacks originating from China. Earlier this week, officials from both countries said computer networks inside their borders are routinely targeted by hackers trying to ferret information that could benefit the Chinese government.

Belgian Justice Minister Jo Vandeurzen said he had evidence that the Communist Party of China is behind recent espionage attacks against his country. They were carried out by sending spyware attached to emails addressed to Belgian state departments, according to news reports here and here.

Chinese hackers are targeting Belgium because the European Union and NATO have their headquarters in Brussels, officials said. Belgium's ties to Africa, which China increasingly relies on for energy exports, also makes it attractive.

Indian officials, meanwhile, said that over the past year and a half, China has mounted almost daily attacks on networks belonging to the government and India's private sector. "The core of the assault is that the Chinese are constantly scanning and mapping India’s official networks," The Times of India reports. "This gives them a very good idea of not only the content but also of how to disable the networks or distract them during a conflict."

Other countries claiming they are under sustained attacks by China include the US, the UK, France and Germany. According to some reports, hackers who stole a large amount of sensitive information from the US Pentagon last June were based in China. An assessment released by the Department of Defense in March said espionage is a key tool used to improve China's technology might.

Last month the FBI was report to be investigating the possibility Chinese hackers have installed backdoors in sensitive government networks using counterfeit Cisco routers.

More recently, researchers have uncovered evidence that patriotic Chinese citizens are spontaneously volunteering to mount distributed denial-of-service attacks on CNN following its coverage of people protesting the Olympic torch relay.

So far, the countries have provided little proof that Chinese hacking is any different from cyber operations being conducted by other governments. ®

The essential guide to IT transformation

More from The Register

next story
Hello, police, El Reg here. Are we a bunch of terrorists now?
Do Brits risk arrest for watching beheading video nasty? We asked the fuzz
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.