How China transformed into a prime cyber threat 

0
63

By Gideon Adonai

About ten years ago, the United States began naming and stigmatising China for an onslaught of online espionage.
A huge portion of this was marshalled using low-level phishing emails against American companies for intellectual property theft.
On Monday, the United States again accused China of cyber attacks.
But these attacks were highly aggressive, and they reveal that China has transformed into a far more sophisticated and mature digital adversary than the one that flummoxed U.S. officials a decade ago.
According to New York Times, Nicole Perlroth, the President Joe Biden administration’s indictment for the cyber attacks, along with interviews with dozens of current and former American officials, shows that China has reorganised its hacking operations in the intervening years.
While it once conducted relatively unsophisticated hacks of foreign companies, think tanks and government agencies, China is now perpetrating stealthy, decentralised digital assaults of American companies and interests around the world.
Hacks that were conducted via sloppily worded spearphishing emails by units of the People’s Liberation Army are now carried out by an elite satellite network of contractors at front companies and universities that work at the direction of China’s Ministry of State Security, according to U.S. officials and the indictment.

READ ALSO: Gunmen kidnap medical doctor in Kogi

While phishing attacks remain, the espionage campaigns have gone underground and employ sophisticated techniques.
Those include exploiting “zero-days,” or unknown security holes in widely used software like Microsoft’s Exchange email service and Pulse VPN security devices, which are harder to defend against and allow China’s hackers to operate undetected for longer periods.
“What we’ve seen over the past two or three years is an upleveling” by China, said George Kurtz, the chief executive of the cybersecurity firm CrowdStrike. “They operate more like a professional intelligence service than the smash-and-grab operators we saw in the past.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here