MY KOLKATA EDUGRAPH
ADVERTISEMENT
regular-article-logo Sunday, 22 December 2024

As China expands its hacking operations, larger than that of 'every major nation combined', a vulnerability emerges

Economic problems in China and rampant corruption there often mean that money intended for the contractors is siphoned off, meaning that contractors have stepped up illegal activity, hacking for hire and ransomware, which has made them targets for retaliation and exposed other issues

Julian E. Barnes, David E. Sanger Washington Published 23.02.24, 11:55 AM
Representational image

Representational image File picture

The Chinese hacking tools made public in recent days illustrate how much Beijing has expanded the reach of its computer infiltration campaigns through the use of a network of contractors, as well as the vulnerabilities of its emerging system.

The new revelations underscore the degree to which China has ignored, or evaded, America’s efforts for more than a decade to curb its extensive hacking operations. Instead, China has built the cyber operations of its intelligence services and developed a web of independent companies to do the work.

ADVERTISEMENT

Last weekend in Munich, Christopher Wray, the FBI director, said that hacking operations from China were now directed against the United States at “a scale greater than we’d seen before.” And at a recent congressional hearing, Wray said China’s hacking program was larger than that of “every major nation combined.”

“In fact, if you took every single one of the FBI’s cyber agents and intelligence analysts and focused them exclusively on the China threat, China’s hackers would still outnumber FBI cyberpersonnel by at least 50-to-1,” he said.

U.S. officials said China had quickly built up that numerical advantage through contracts with firms like I-Soon, whose documents and hacking tools were stolen and placed online in the last week.

The documents showed that I-Soon’s sprawling activities involved targets in South Korea, Taiwan, Hong Kong, Malaysia, India and elsewhere.

But the documents also showed that I-Soon was having financial difficulty and that it used ransomware attacks to bring in money when the Chinese government cut funding.U.S. officials say this shows a critical weakness in the Chinese system. Economic problems in China and rampant corruption there often mean that money intended for the contractors is siphoned off. Strapped for cash, the contractors have stepped up their illegal activity, hacking for hire and ransomware, which has made them targets for retaliation and exposed other issues.

The U.S. government and private cyber security firms have long tracked Chinese espionage and malware threats aimed at stealing information, which have become almost routine, experts say. Far more troubling, however, have been Chinese cyber hacking efforts threatening critical infrastructure.

The intrusions, called Volt Typhoon after the name of a Chinese network of hackers that has penetrated critical infrastructure, set off alarms across the U.S. government. Unlike the I-Soon hacks, those operations have avoided using malware and instead use stolen credentials to stealthily access critical networks.

Intelligence officials believe that intrusions were intended to send a message: that at any point, China could disrupt electrical and water supplies, or communications. Some of the operations have been detected near U.S. military bases that rely on civilian infrastructure — especially bases that would be involved in any rapid response to an attack on Taiwan.

But even as China put resources into the Volt Typhoon effort, its work on more routine malware efforts has continued. China used its intelligence services and contractors tied to them to expand its espionage activity.

I-Soon is most directly connected with China’s Ministry of Public Security, which traditionally has been focused on domestic political threats, not international espionage. But the documents also show that it has ties to the Ministry of State Security, which collects intelligence inside and outside China.

Jon Condra, a threat intelligence analyst at Recorded Future, a security firm, said I-Soon had also been linked to Chinese state-sponsored cyber threats.

“This represents the most significant leak of data linked to a company suspected of providing cyber espionage and targeted intrusion services for the Chinese security services,” Condra said. “The leaked material indicates that I-Soon is likely a private contractor operating on behalf of the Chinese intelligence services.”

The U.S. effort to curb Chinese hacking goes back to the Obama administration, when Unit 61398 of the People’s Liberation Army, the Chinese military, was revealed to be behind intrusions into a wide swath of U.S. industry, looking to steal secrets for Chinese competitors. To China’s outrage, PLA officers were indicted in the United States, their pictures placed on the Justice Department’s “wanted” posters. None has ever stood trial.

Then China was caught in some of the boldest thefts of data from the U.S. government: It stole more than 22 million security clearance files from the Office of Personnel Management. Its hackers were undetected for more than a year, and the information they gleaned gave them a deep understanding into who worked on what inside the U.S. government — and what financial or health or relationship troubles they faced. In the end, the CIA had to pull back officers who were scheduled to enter China.

The result was a 2015 agreement between President Xi Jinping and President Barack Obama aimed at curbing hacking, announced with fanfare in the White House Rose Garden.But within two years, China had begun developing a network of hacking contractors, a tactic that gave its security agencies some deniability.

In an interview last year, Wray said China had grown its espionage resources so large that it no longer had to do much “picking and choosing” about their targets.

“They’re going after everything,” he said.

The New York Times News Service

Follow us on:
ADVERTISEMENT
ADVERTISEMENT