Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/6/2010
03:22 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Report: Chinese Military Behind Google, Other Cyberattacks

Most attacks traced to Chinese island tourist attraction that also houses state-of-the-art military installation

A new report handed to Congress today concludes that the Chinese military -- the People's Liberation Army -- is behind most cyberattacks on the U.S., including the infamous Operation Aurora attacks that hit Google, Adobe, Intel, and other companies.

The "China, Cyber Espionage and U.S. National Security" white paper, authored by independent research group Medius Research and commissioned by political action organization Patriot Majority, says most cyberattacks out of China originate from Hainan Island, a tourist attraction with a massive high-tech military installation located on the South China Sea.

"Hainan Island is a pretty good showcase of military modernization. It combines several capabilities, including a space launch and a submarine [base]," says Richard Parker, lead researcher for the Medius report. And a recent study by Canadian researchers traced the IP addresses of cyberattacks to four command servers to Hainan Island, he notes.

The Medius report drew its findings from background interviews with government officials, as well as from previous research, such as the 2009 Canadian study that revealed the Hainan Island connection, and a report from the U.S.-China Economic and Security Review Commission.

Chinese officials have denied any government ties to Google and other cyberattacks. Aside from U.S. intelligence community and security industry theories that these attacks are typically state-sponsored, there also have been reports of civilian groups in China conducting their own hacking operations. The Medius report says the line between China's indie hacker culture and the government is blurred, and civilians are "informally contracted."

"The idea that the [Chinese] government is not involved seems a little ludicrous," Medius' Parker says. "I understand that there is an independent hacking culture in China," but the military is the main mechanism for this, he says. Hainan Island has a population of 8 million people; in addition to its underground submarine base and space launch facility, it houses an air force base. These elements "make the island key not only to force projection but also to intelligence gathering and high-technology warfare that combines cyber warfare, space warfare and electronic warfare," according to the report.

The report says the U.S.-China Economic and Security Review Commission report from last year provides key actions for Congress to take -- namely to hold hearings on the commission's recommendations and take any legislative action it can before the commission publishes its next report later this year.

Among the recommendations by the commission: that Congress assess its ability to meet the challenge of cyberattacks out of China and review the effectiveness of how law enforcement and the intelligence community trace the origins of cyberattacks.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3686
PUBLISHED: 2021-01-21
Possible memory out of bound issue during music playback when an incorrect bit stream content is copied into array without checking the length of array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobi...
CVE-2020-3687
PUBLISHED: 2021-01-21
Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue in XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
CVE-2020-3691
PUBLISHED: 2021-01-21
Possible out of bound memory access in audio due to integer underflow while processing modified contents in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon We...
CVE-2020-11167
PUBLISHED: 2021-01-21
Memory corruption while calculating L2CAP packet length in reassembly logic when remote sends more data than expected in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Weara...
CVE-2020-11179
PUBLISHED: 2021-01-21
Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon ...