Just in:
NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Quality HealthCare Partners with eHealth to Enhance Patient Treatment Efficiency // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // Oman Seeks Growth Through Strategic Economic Alliances // AVPN Charts Path Forward at 2024 Global Conference // Central Bank of Nigeria Debunks Rumors of Crypto Account Freeze // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // Booming Region Fuels Innovation Surge // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Astana International Exchange Connects with Regional Markets Through Tabadul Hub // Etihad Airways Announces Paris Service with A380 // Sharjah Census Gears Up for Final Enumeration Phase // Election Commission Has A Dismal Record On Acting Against Modi’s Breaches Of Poll Code //

Big U.S. data breaches offer treasure trove for hackers

Plastic caution tape marks a small construction area on the exterior of the U.S. Internal Revenue Service (IRS) building in Washington May 27, 2015.

Reuters/Jonathan Ernst

ADVERTISEMENT

WASHINGTON A massive breach of U.S. federal computer networks disclosed this week is the latest in a flood of attacks by suspected Chinese hackers aimed at grabbing personal data, industrial secrets and weapons plans from government and private computers.

The Obama administration on Thursday disclosed the breach of computer systems at the Office of Personnel Management and said the records of up to 4 million current and former federal employees may have been compromised.

U.S. officials have said on condition of anonymity they believe the hackers are based in China, but Washington has not publicly blamed Beijing at a time when tensions are high over Chinese territorial claims in the South China Sea.

ADVERTISEMENT

China has denied involvement.

It was the second computer break-in in less than a year at the OPM, the federal government’s personnel office.

The first breach has been linked to earlier thefts of personal data from millions of records at Anthem Inc, the second largest U.S. health insurer, an attack also blamed on Chinese hackers, and Premera Blue Cross, a healthcare services provider.

Guidance Software, a cybersecurity firm, said the first signs of data “exfiltration” were originally detected with Einstein, a U.S. government intrusion detection system. That activity, it said, was eventually traced back to a machine under the control of Chinese intelligence.

“It’s a different form of Cold War at this point,” said Rob Eggebrecht, co-founder and chief executive of Denver-based InteliSecure, a private cybersecurity firm.

Eggebrecht said his firm had seen a spike in attacks on private company networks by Chinese actors over the past three months. The latest was a previously undisclosed breach at a U.S. pharmaceutical group, which cost the firm hundreds of millions of dollars in sensitive research and development work.

Eggebrecht declined to identify the firm, which he said only learned of the major breach within the last 72 hours.

“We’ve seen a huge uptick in opportunistic exfiltration of high-value data,” he said, adding that the attack on the pharma company involved malicious software installed together with the Chinese-language search engine Baidu.

“DIZZYING RATE”

Admiral James Winnefeld, vice chairman of the Joint Chiefs of Staff, told a cyber conference at West Point military academy last month that U.S. adversaries like China and Russia were rapidly increasing their assaults on military networks.

“We’re hemorrhaging information at a dizzying rate, evidenced by the uncanny similarity of some of our potential adversaries’ new platforms to those we’ve been developing,” said Winnefeld.

China has in recent years introduced two new stealth fighters that analysts say bear a striking resemblance to the F-22 and F-35 built by Lockheed Martin Corp. Lockheed redoubled security efforts focused on suppliers after a “significant and tenacious” attack on its computer networks in 2011 that was enabled by lax security at a supplier.

U.S. senators have added $200 million in funding to their proposed fiscal 2016 budget to fund a detailed study of the cyber vulnerabilities of major weapons systems.

The move came after the Pentagon’s chief weapons tester told Congress that nearly every major weapons program tested in 2014 showed “significant vulnerabilities” to cyber attack, including misconfigured and unpatched software.

U.S. government officials and cyber analysts say Chinese hackers are using high-tech tactics to build massive databases that could be used for traditional espionage goals, such as recruiting spies, or gaining access to secure data on other networks.

The latest incident gives hackers access to a treasure trove of personal information, including birth dates, Social Security numbers, previous addresses, and security clearances.

All that data could help hackers identify information about specific targets, including potential passwords for websites that may be portals to information about weapons systems or other research data.

“They can dig down into that data and learn more about the individuals, what their hobbies are, what their vices are, what skeletons they have in their closet,” said Babak Pasdar, president and chief executive of Bat Blue Network, a cybersecurity firm.

He said he was involved in a recent case in which hackers gained access to private data of a website administrator by finding passwords on a public website linked to the person’s hobby.

“This empowers the malevolent cyber actor to target a huge number of people with phishing and other schemes to reel in information,” said one U.S. defense official. “The more targets you have, the more likely you are to score.”

(Editing by Doina Chiacu, Mark Trevelyan & Kim Coghill)

This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.

ADVERTISEMENT

ADVERTISEMENT
Just in:
Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // Prince Holding Group’s Chen Zhi Scholarship Clinches Silver Stevie for CSR Excellence at Asia-Pacific Stevie Awards // Booming Region Fuels Innovation Surge // Oman Seeks Growth Through Strategic Economic Alliances // DIFC Courts Cement Role as Top English Dispute Resolution Choice // ESG Achievement Awards 2023/2024 is Open for Application, Celebrating Innovative Sustainable Practices and Responsible Risk Management // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // UAE Scrutinizes Report on Racial Discrimination Treaty // Dubai Gears Up for Second FinTech Summit as Funding Surges // UAE President, Spanish Prime Minister Hold Phone Talks // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // Etihad Airways Announces Paris Service with A380 // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Sharjah Census Gears Up for Final Enumeration Phase // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // Astana International Exchange Connects with Regional Markets Through Tabadul Hub // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Telecom Giant Du Eyes Crypto Integration for FinTech Platform //