Risk
11/20/2009
02:23 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

China Cyber Espionage Threatens U.S., Report Says

A Congressional advisory report warns that cyber attacks against defense computers are on the rise.

China has increased its cyber espionage efforts to acquire U.S. secrets and technology, a Congressional advisory group warned in a report issued on Thursday.

Echoing its 2008 and 2007 reports, which labeled China's espionage efforts "the single greatest risk to the security of American technologies," the U.S.-China Economic and Security Review Commission (USCC) said in its 2009 annual report that "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems."

Testifying before the Senate Subcommittee on Terrorism and Homeland Security on Tuesday, USCC vice chairman Larry M. Wortzel said that cyber attacks on Department of Defense information systems went from 43,880 in 2007 to 54,640 in 2008, an increase of almost 20%. If attack trends from the first half of 2009 continue at the same pace throughout the year, he said, approximately 87,570 cyber attacks will be recorded, an increase of 60% from 2008.

Responding to these attacks can be problematic because, as the report states, Chinese espionage and cyber espionage activities may be carried out by individuals without obvious government ties.

These "nonprofessional collectors may be motivated by profit, patriotism, feelings of ethnic kinship, or coercion," the report states. "Even in many cases where there is no obvious direct state involvement in the theft or illegal export of controlled technology, the Chinese government encourages such efforts and has benefited from them."

The report also refers to these individuals as "espionage entrepreneurs."

Wang Baodong, spokesperson for the Chinese Embassy in Washington, told the BBC that the report's claims about Chinese espionage are "baseless, unwarranted and irresponsible."

In April, the White House said that it would establish Cyber Security Coordinator position to manage cybersecurity activities across government agencies. That position has yet to be filled.

InformationWeek Analytics has published an in-depth report on the state of enterprise storage. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant