Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/3/2016
05:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Agriculture, Alternative Energy Could Be Chinese Hackers' Next Targets

Perhaps Anthem and Premera breaches were not just about stealing PII, but about researching the ins and outs of Western healthcare systems, CrowdStrike's annual global threat report says.

The official Five-Year Plans laid out by the government of the People's Republic of China guide Chinese hackers' attack campaigns and could be related to the recent burst of breaches at American health insurers, according to researchers at CrowdStrike.

When the Community Health Systems breach of 4.5 million patients' PII was attributed to Chinese attackers in August 2014, it raised eyebrows because at the time it didn't fit the Chinese hackers' profile at all. Since then, Chinese sources have been blamed for similar breaches at Anthem, CareFirst, and Premera Blue Cross Blue Shield health insurers. The trend caused some security researchers to posit that these PII thefts were just the first stage of some other attacks, and that the true targets and objectives were not yet known.

CrowdStrike researchers presented an additional theory in its Global Threat Report released today. "An alternate hypothesis is that the intrusions were executed in an effort to better understand western healthcare systems in order to satisfy the healthcare objectives of China’s 12th Five-Year Plan (FYP)," they wrote.

As the report explains:

...an important element of the 12th Plan is the concept of 'inclusive sustainable
growth.' This includes specific considerations for welfare of the populace, including a commitment to boosting growth in social security, private pensions, and medical insurance. Drilling down into the medical sector, priorities include improvement in medical technology, provision and management of a basic healthcare service for the entire population, and the creation of a healthcare database for 70 percent of urban residents. It also emphasizes foreign investment in developing the Chinese healthcare sector during this time.

With these requirements in mind, it is possible that the network compromises detailed here may have been executed to better understand how other countries have structured their systems and to obtain an understanding of large, multinational healthcare providers to support negotiations for foreign investment. 

But CrowdStrike says the theft of the data could be interpreted differently. The focus on Blue Cross Blue Shield was noteworthy because BCBS operates US Federal Employees Health Benefit Plan. The information from those databases could be particularly dangerous when combined with the data stolen from the US Office of Personnel Management -- a crime also attributed to Chinese sources, who have since been arrested by Chinese law enforcement.

"It is likely that a combination of these two datasets would be extremely valuable to gain deeper insight into the lives and vulnerabilities of federal employees" states the report.

If, however, Chinese threat groups were guided by the 12th Five-Year Plan to attack healthcare organizations, then different sectors need to start preparing for the priorities issued in China's 13th Five-Year Plan, which was released in November and still being finalized.

According to the CrowdStrike report:

These plans typically provide a roadmap for what China will target using cyber means. Alternative energy and domestic technological innovations will have a renewed focus as China looks to transform its standard of living and become less reliant on foreign technology. ...

The combination of China becoming increasingly untrusting of western information technology and a desire to promote its own sectors of industrial manufacturing and retail may lead to a gradual tapering off of targeting against these sectors. However, it will also likely mean increased cyber targeting in areas like agriculture, healthcare, and alternative energy that China deems crucial to promoting the wellbeing of its growing middle class, and where it has the most technological gaps.

CrowdStrike's complete report further details the threat landscape from China, Russia, Iran, North Korea, and assorted hacktivists and cyber-extortionists. See the full report here.

Interop 2016 Las VegasLearn more about APT threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).