Hacker claims breach of Chinese defense contractor

AssassinsMace

Lieutenant General
Please, Log in or Register to view URLs content!



Hacker claims breach of Chinese defense contractor
By Joseph Menn | Reuters – 21 hrs ago...


(Reuters) - A hacker has posted thousands of internal documents he says he obtained by breaking into the network of a Chinese company with defense contracts, an unusual extension of the phenomenon of activist hacking into the world's most populous country.

The hacker, who uses the name Hardcore Charlie and said he was a friend of Hector Xavier Monsegur, the leader-turned- informant of the activist hacking group, LulzSec, told Reuters he got inside Beijing-based China National Import & Export Corp (CEIEC).

He posted documents ranging from purported U.S. military transport information to internal reports about business matters on several file-sharing sites, but the authenticity of the documents could not be independently confirmed.

The Beijing company, better known by the acronym, CEIEC, did not respond to a request for comment. U.S. intelligence and Department of Defense officials had no immediate comment.

CEIEC's website says the company performs systems integration work for the Chinese military.

Cyber-spying, both economic and political, is a growing concern for companies and governments around the world. The Chinese government is often accused of promoting, or at least tolerating, hacking attacks aimed at Western targets. But Chinese institutions have rarely been publicly identified as victims of such attacks.

Hackers associated with LulzSec have largely targeted Western defense contractors and law enforcement, although some of their attacks may have been driven by FBI informants. LulzSec is a spin-off of Anonymous, an amorphous collective that uses computer break-ins to promote social causes and expose what members see as wrongdoing by governments and corporations.

Hardcore Charlie said in email and Twitter conversations with Reuters that he had worked with others to crack the email passwords that got him inside CEIEC.

In particular, the hacker said he worked with an associate who calls himself YamaTough on Twitter, another former ally of Monsegur who recently released stolen source code for old versions of security products made by Symantec Corp .

YamaTough had also been involved in an incident in which fake documents, purportedly from Indian military intelligence, were mixed with genuinely purloined documents, raising the possibility Hardcore Charlie had pursued a similar strategy in posting the alleged CEIEC documents.

Hardcore Charlie described himself as a 40-year-old Hispanic man in a country close to the United States. He said he did not have strong political leanings, but was concerned the Chinese company had access to material about the U.S. war effort in Afghanistan, as some of the documents suggest.

He said he planned to "explore" the computer networks of other Chinese companies.

(Reporting by Joseph Menn in San Francisco; additional reporting by Mark Hosenball in Washington; editing by Jonathan Weber and Andre Grenon)


----------------------------------------------------------------------------------------------------------------------------------------

What I find suspect is the one document I've seen being displayed is in English. It reminds me when some activists supposedly snuck into a disputed region of China after Brad Pitt made a certain movie critical of China, they showed video footage of them sneaking into a supposed Chinese police station that looked like a lounge and absolutely no one was in there. Strange for an authoritarian police state. They showed a plain piece of paper taped to the wall with Brad Pitt's name on it where it was supposedly evidence that Brad Pitt was being looked out for like there was a manhunt for him in China or he was persona non grata. Back then when Brad Pitt made that movie, most of China probably never heard of him so why wasn't there a photo too instead of just his name printed in English and nothing else on a plain piece of paper taped to a wall.
 

Blitzo

Lieutenant General
Staff member
Super Moderator
Registered Member
Lol apparently anonymous are moving against chinese websites as well..

Please, Log in or Register to view URLs content!


Personally I don't think it is an issue at the moment but hopefully will be a wake up call for the government/military to invest more into cyber defense rather than only cyber "offense" which we've heard so much about in the media.
Although their call for a collapse of the regime makes me facepalm rather strongly.
 

AssassinsMace

Lieutenant General
These people act like this is new. Like hackers in the West had a hands-off policy for China until now? Like Western governments aren't sponsoring hacking into Chinese systems. All it is is an excuse to do what they've always been doing but trying to make it look like China was the one that started it.
 

Blitzo

Lieutenant General
Staff member
Super Moderator
Registered Member
^ True, but anonymous have shown themselves to be relatively organized and quite capable in the past. Possibly the only reason they constitute an annoyance is that there is no one to hold accountable, unless China organizes some sort of counter hacking force to ID and seek culprits and expose them to whatever laws could be brought down.

Of course defacing a few websites is a bit more than a stone's throw away from trying to bring down an entire country LOL
 

RedMercury

Junior Member
Some of the anons were arrested or identified recently. Probably given an ultimatum: work for the CIA, or go to jail. Now the CIA can get some free hackers with plausible deniability (as long as they publicly post some of the supposed loot). Win win for them I guess.
I'm sure Chinese "cyber command" is aware of these obvious links and are working on appropriate counter action.
 

hmmwv

Junior Member
Well CEIEC primarily handles weapon systems exports so the hackers don't really have to hack to get the weapon's details, they can try easier routes, say, I don't know, maybe subscribing to a catalog? :)
 

Red___Sword

Junior Member
Some of the anons were arrested or identified recently. Probably given an ultimatum: work for the CIA, or go to jail. Now the CIA can get some free hackers with plausible deniability (as long as they publicly post some of the supposed loot). Win win for them I guess.
I'm sure Chinese "cyber command" is aware of these obvious links and are working on appropriate counter action.

Exactly man, I was trying to bring out that we have had news post at world news thread that the top anons boss being rat for the CIA for months before the organization was publicly raided and arrested. And now the supposed "in custody" cyber crime orginization stands out for the greater good and try to bring down the evil red China?

I consider this a troll to people's IQ, by you-know-who's deniability.
 

escobar

Brigadier
Please, Log in or Register to view URLs content!


The high-profile intrusion into the e-mail server of China Electronics Import & Export Corporation by "Hardcore Charlie" may mark the coming out party for America's own band of patriotic hackers.

Documents obtained through the hack were posted on file-sharing sites. For the most part, they are a bewildering grab bag of seemingly inconsequential documents. One folder contains regulations concerning the privatization of public universities in Vietnam; another reveals the monthly salary of an English teacher working for Ivanhoe Copper in Myanmar.

Then there are the somewhat more disturbing documents: pages and pages of spreadsheets and US military Acrobat files detailing the recent movements of the quaintly-named "jingle trucks" operated by local companies delivering supplies to the network of US facilities inside Afghanistan. The documents are not marked secret, and the US government has apparently still not taken steps to remove them from the file-sharing services a week after they were posted.

In a web statement, Hardcore Charlie justified his hack with the assertion that China was passing sensitive information to America's enemies, including the Taliban. In a pastiche of English, Spanish, obscenities and racist references, he stated:

Hola comradezz, Today us prezenta recently owneed chino military kontraktor CEIEC Us be shoked porque their shiiit was packed with goodiez cummin froma USA Military brigadezz in Afghanistan, them lulz hablando mucho puneta sam slit eyed dudz in Vietnam and Philiez doing bizness in Ukraine and Russia selling goodiez to Taliban terrorists.

CEIEC, for its part, issued a denial equally deficient in grammatical polish, stating:

CEIEC solemnly declares as below:
The information reported is totally groundless, highly subjective and defamatory. It is believed that rumors stop at wiser.

CEIEC reserves the right to take legal action against the relevant responsible individuals and institutions. [1]

Observers noted the apparent incongruity of CEIEC asserting it had not been hacked ... but reserving the right to take legal action.

The Chinese version is somewhat less incoherent, but only slightly. It appears that CEIEC may be trying to say that it is taking issue with the allegations - for instance, that CEIEC is passing on the information to bad guys in Ukraine, Syria, Russia and the Taliban - while skating past the question of whether it was actually hacked. [2]

CEIEC is described as a "defense contractor" in foreign coverage. However, this may be overstating the case somewhat. CEIEC is one of the ancient import/export corporations set up under the Ministry of Foreign Trade 30 years ago. It did a booming business when international trade was a monopoly of the government import/export corporations, and still benefits from its government ties in handling foreign aid projects and administering international tenders.

At the same time, it has successfully reinvented itself as a prime contractor on overseas projects and, in terms of gross revenue, is one of China's bigger companies.

CEIEC is not an industrial enterprise with its own manufacturing capability. It has targeted the defense electronics sector, as an integrator and prime contractor, apparently hoping to supply systems to China's allies overseas. Whatever it has on its servers, it is probably not the crown jewels of China's defense establishment.

But the question of how the minutiae of US military truck transport in Afghanistan ended up on CEIEC's servers remains a mystery. The CEIEC case does highlight a remarkable trend in international hacking - the appearance of non-government auxiliaries in cyber-war battles.

China is notorious for its interest in cyber-war as an asymmetric counter to the conventional military superiority of the United States ... and for its apparent willingness to farm out, encourage, or benefit from private hacker initiatives.

On 2010, Mara Hvistendahl wrote in Foreign Policy:

[T]he hacking scene in China probably looks more like a few intelligence officers overseeing a jumble of talented - and sometimes unruly - patriotic hackers. Since the 1990s, China has had an intelligence program targeting foreign technology, says James A Lewis, senior fellow for cyber-security and Internet policy at the Center for Strategic and International Studies. Beyond that, however, things get complicated. "The hacking scene can be chaotic," he says. "There are many actors, some directed by the government and others tolerated by it. These actors can include civilian agencies, companies, and individuals." [3]

Patriotic hackers in China are called "hong ke" or "red guest", a pun on the phonetic rendering "hei ke" or "black guest" for hacker.

Their patriotic cyber-duties included destroying the online presence of South Korean boy band Super Junior after an unruly and undignified crowd of Chinese fans clamored to hear the band at the Shanghai World Expo and embarrassed Chinese nationalists. [4]

They also weigh in on foreign issues of greater moment, mixing it up with their Japanese counterparts when Sino-Japanese passions are inflamed by visits to the Yasukuni Shrine or the collision between a Chinese fishing boat and Japanese coast guard vessel off Diaoyutai/Senkaku in 2011.

But their major utility to the Chinese government may be their ability to generate chaff - a barrage of cyber-attacks to distract and overwhelm US security specialists trying to cope with China's pervasive, professional program of industrial and military espionage - and give the People's Republic of China (PRC) government deniability when hacking is traced to a Chinese source.

Chinese industrial cyber-espionage has emerged as a dominant near-term security concern of the United States.

The Barack Obama administration went public with its case against China in November 2011, with a report on industrial espionage titled Foreign Economic Collection. It described China rather generously as a "Persistent Collector" given the PRC's implication in several high-profile industrial espionage cases and soft-pedaled the issue of official Chinese government involvement. The report stated:

US corporations and cyber-security specialists also have reported an onslaught of computer network intrusions originating from Internet Protocol (IP) addresses in China, which private sector specialists call "advanced persistent threats." Some of these reports have alleged a Chinese corporate or government sponsor of the activity, but the IC [intelligence community] has not been able to attribute many of these private sector data breaches to a state sponsor. Attribution is especially difficult when the event occurs weeks or months before the victims request IC or law enforcement help. [5]

A month later, in December 2011, US criticism of China became a lot more pointed. Business Week published an exhaustive report on Chinese cyber-espionage, clearly prepared with the cooperation of federal law enforcement authorities as it named and described several investigations:

The hackers are part of a massive espionage ring codenamed Byzantine Foothold by US investigators, according to a person familiar with efforts to track the group. They specialize in infiltrating networks using phishing e-mails laden with spyware, often passing on the task of exfiltrating data to others.

Segmented tasking among various groups and sophisticated support infrastructure are among the tactics intelligence officials have revealed to Congress to show the hacking is centrally coordinated, the person said. US investigators estimate Byzantine Foothold is made up of anywhere from several dozen hackers to more than one hundred, said the person, who declined to be identified because the matter is secret. [6]

United States security boffin Richard Clarke had this to say about Chinese cyber-espionage in an interview with Smithsonian magazine:

"I'm about to say something that people think is an exaggeration, but I think the evidence is pretty strong," he tells me. "Every major company in the United States has already been penetrated by China."

"What?"

"The British government actually said [something similar] about their own country."

Clarke claims, for instance, that the manufacturer of the F-35, our next-generation fighter bomber, has been penetrated and F-35 details stolen. And don't get him started on our supply chain of chips, routers and hardware we import from Chinese and other foreign suppliers and what may be implanted in them-"logic bombs," trapdoors and "Trojan horses," all ready to be activated on command so we won't know what hit us. Or what's already hitting us. [7]

Some big numbers are being thrown around to publicize the Chinese threat.

Business Week's report, while admitting the woolliness of its methodology, stated that losses to American companies from international cyber-espionage amounted to US$500 billion in a single year.

Scott Borg, director of a non-profit outfit called the US Cyber Consequences Unit told Business Week:

"We're talking about stealing entire industries ... This may be the biggest transfer of wealth in a short period of time that the world has ever seen."

Beyond these apocalyptic economic and military scenarios, we might also descend to the personal and political and point out that Google, a favorite target of Chinese cyber-attacks, is Obama's friend, indispensable ally, brain trust and source of personnel in the high-tech sector.

Connect the dots, and it is clear that the Obama administration, in its usual meticulous way, is escalating the rhetoric and preparing the public and the behind-the-scenes groundwork for major pushback against China in the cyber-arena.

Beyond moves in the legal arena such as the aggressive prosecution of the DuPont industrial espionage case - alleging that China orchestrated a program to steal DuPont's titanium dioxide technology - it is interesting to speculate what other moves the Obama administration might make.

The United States is undoubtedly already doing its best to penetrate China's government, military and scientific networks.

How could the US escalate, especially in the industrial and commercial sphere, where the US mindset is that everything worthwhile the Chinese have was stolen from us, so what's worth stealing back?

Maybe the answer is cyber-harassment, turning a blind eye - or actively egging on - non-government hackers to embarrass, inconvenience, humiliate and perhaps even destabilize the Chinese regime.

Consider this April 4 report by Emil Prodalinski at ZDNet on an explosion in hacking against China since a Twitter account was launched on March 30:

The hacktivist group Anonymous now has a Chinese branch. An Anonymous China Twitter account was created late last month ... Boy have they been busy. Hundreds of Chinese government, company, and other general websites have been hacked and defaced in the span of a few days. A couple have also had their administrator accounts, phone numbers, and e-mail addresses posted publicly. On the hacked sites, the group even posted tips for how to circumvent the Great Firewall of China.

A long Pastebin post lists all the websites that were targeted. It contains 327 websites in total, but an updated list, also on Pastebin, brings that number to 485. Most of these websites are operational once again, but many have been defaced a second time after they were brought back. Not all of them were hacked and defaced; some were treated with more viciousness than others. [8]

Prodalinski subsequently wrote that the attacks had not abated and China, in an interesting case of public relations jiu jitsu, was using the campaign as evidence that it was one of the world's many victims of cyber-misbehavior (and, by implication, not a major perpetrator):

While Anonymous was not specifically mentioned, it's obvious what China's Ministry of Foreign Affairs was referring to during a briefing on Thursday, given the events during the last week. "First of all, China's Internet is open to all, users enjoy total freedom online. China has gained 500 million netizens and 300 million bloggers in a very short period of time, which shows the attraction and openness of China's Internet," spokesman Hong Lei said in a statement, according to CNN. "Secondly, the Chinese government manages the Internet according to law and regulations. Thirdly, certain reports prove again that China is a victim of Internet hacker attacks." [9]

It will be interesting to see how sympathetic the Obama administration will be if the Chinese government begins squealing to it about this outbreak of anti-PRC hacking.

The current Anonymous hacks have been of remarkably unimpressive and uninteresting Chinese sites - like the Taoyuan Bureau of Land and Resources. One can wonder if escalation to more tempting, juicier and more sensational targets is in the future. [10]

My speculation is that the campaign of cyber-attacks against Chinese targets was seeded by the US government, but has gathered its own momentum and is drawing in freelance foreign and some Chinese hackers searching for lulz - the hacker term for giggles or detached/callous amusement.

Let us now return to the perpetrator of the most spectacular hack to date - Hardcore Charlie - and if his postings reveal anything about his motivations.

Hardcore Charlie's web persona displays a military bent. His web alias derives from a death card (a specially printed playing card with an intimidating message sometimes placed on an enemy corpse by US servicemen) associated with the US Army's 101st Airborne Division: "Compliments of Hardcore Charlie - 3rd BN 502 Infantry - When you care enough to send the very best - AIR ASSAULT." [11]

Hardcore Charlie's postings also quote lyrics on a military theme, from "Marines" by the German thrash metal band Sodom. He recommends reading the files to the accompaniment of a Youtube videomontage of Francis Ford Coppola's Vietnam epic film Apocalypse Now, using Sodom's "Napalm in the Morning" as the soundtrack.

But perhaps there's something more going on here than pro-military pro-freedom enthusiasm. Sodom is an avowedly anti-war band that toured Vietnam, even though it was denied permission to play there, so it could learn more about the war and its aftermath.

Two more bumpers in the postings quote KMFDM, German industrial rockers (and, unfortunately sometimes a favorite band of alienated and murderous high-schoolers such as Eric Harris, the Columbine shooter) with what one could characterize as a vigorous anti-American government stance.

From KMFDM's anti-George W Bush anthem "Stars and Stripes" (whose video includes a Bush/Hitler juxtaposition) , Hardcore Charlie pulled the quote: ... Cut back civil rights / Make no mistake / Tell 'em homeland security is now at stake / Whip up a frenzy / keep 'em suspended / Don't let 'em know that their liberty's ended ... [12]

From another KMFDM song, New American Century, another quote: ... LOVE THY NEIGHBOR TURN HIM IN.. its called PATRIOTISM ...

Interesting, especially when one considers how Hardcore Charlie, in apparently his only media availability, with Reuters, was described: The hacker, who uses the name Hardcore Charlie and said he was a friend of Hector Xavier Monsegur, the leader-turned- informant of the activist hacking group, LulzSec ... [13]

Rewind to March 2012: Key members of the hacking collective known as LulzSec were arrested Tuesday morning, a move authorities are calling "devastating to the organization". According to an exclusive report by Foxnews.com LulzSec's alleged ringleader, Hector Xavier Monsegur of New York City, helped authorities with the arrest. [14]

As for LulzSec, it was an ad hoc hacker collective spun off from Anonymous (the same grouping bedeviling China under the Anonymous China hashtag) by Monsegur. Its sensational 50-day career in 2011 was described by PC Magazine:

May 7 - Lulz Security [claims] to have gotten ahold of a database of contestants from the Fox TV show X Factor. Lulzsec follows up a few days later with more sales and internal data gleaned from Fox.com.

May 30 - After hacks of Sony in Japan and a British ATM database, Lulzsec scores its first big publicity coup by posting a fake story on the PBS website, which claimed that Tupac Shakur was alive and well in New Zealand.

June 2 - Lulzsec posts personal data for more than a million users from a handful of Sony websites, …

June 3 - The "Lulz Boat" sets a course for the government, targeting security organizations that work with the FBI and other agencies …

June 13-20 - Lulzsec appears to be hitting its stride, with a busy week hacking into the US. Senate's website, stealing the account information of more than 200,000 users from video game maker Bethesda, claiming to have temporarily brought down the CIA's website, and going after more security agencies in the US. and UK.

June 23 - In protest of Arizona's controversial anti-immigration law, Lulzsec posts internal documents and information from the state's Department of Public Security. [15]

Lulzsec closed shop at the end of June 2011, when an asset in England was arrested. It appears that was not enough to elude the bloodhounds of the Federal Bureau of Investigation or forestall Monsegur's betrayal of his associates.

Careful readers may find their interest piqued by the fact that Fox News, which got the exclusive on the arrests in 2012, were the first hacked in 2011.

Pattern-oriented readers might consider whether the sudden eruption of Lulzsec resembles the cyber flashmob that is currently swarming Chinese sites.

Contrarian readers might find it interesting that the focus of hacking seems to have done a 180-degree turn away from American government, security and corporate targets to tormenting their Chinese equivalents (despite the limited lulz obtainable when hacking a site whose language one does not understand).

Curious readers might also wonder if information from Monsegur has helped the authorities get "Hardcore Charlie" in their sights and he is hacking into Chinese websites either at their behest to help get the Anonymous China ball rolling or is pre-emptively demonstrating his utility and eagerness to please.

In any case, the cat's out of the bag.

The order of battle in the cyber-armies of China and the United States has been completed by the arrival of the volunteer militias to serve next to the professionals.
 

plawolf

Lieutenant General
Well I think this is all part of a much larger game, where the Chinese and Americans are drawing battle lines and establishing rules of engagement over cyber warfare.

The two sides are
Please, Log in or Register to view URLs content!
to try and work out a common set of rules, and you can see a much more aggressive attitude from the west as it tries to gain as much leverage as possible to use as bargaining chips to help them set the rules to best represent their own interests.

Or that is the over story at least.

But if you read between the lines in
Please, Log in or Register to view URLs content!
, you can easily see that China is far ahead in this game, and that was gotten the Americans desperately worried. The American cyber warfare departments see the reason for that gap is because that for the average American, cyber warfare seems such an abstract and dislocated concept that the general American public simply does not respond to the fear mongering as much as hype about WMD or terrorist attacks.

So what better way for American cyber warfare departments to boost their profile, budget and influence than a massive foreign backed attack that causes major disruption/damage to American civilian infrastructure? And who better to launch that attack than the favourate American bogeyman of China?

The articles above already pretty much spelt out American intent to 'get tough' on China and laying the groundwork to launch 'preemptive' cyber strikes. No prizes for guessing who is most likely to be on the receiving end of those 'self defense' attacks. :rolleyes:

But the main goal is not to disable or dissuade Chinese cyber activities, the true aim is to provoke a Chinese push back, that the cyber agencies could then point to and use as evidence of Chinese hostility and the need for a bottomless pit of money for themselves and their industrial supporters.

And notice the conditioning already being applied in all western media outlets whereby all Chinese hacking are universally implied as the work of Chinese intelligence agencies, whereas the same authors are going out of their way to paint the picture that all western hacking is done by individuals and have never suggested a single instance of western intelligence agencies launching cyber attacks against China.

Even in cases where it is virtually certain that cyber attacks have been carried out by western intelligence agencies such as the case with the various worms that has plagued Iran's nuclear programme (and actually caused physical damage and casualties by causing centrifuges to spin out of control and explode - the very definition Americans are now suggesting as the equivalent of declaring war in real life), the western media has gone out of it's way to stress how the links to western intelligence agencies is only implied. But they have no problem with all but stating as fact that the Chinese intelligence agencies are launching attacks with far less/compelling evidence.

It is ironic that the articles harp on about China 'preparing the battlefield', when their very only articles are far more tangible steps to preparing the battlefield for a western cyber offensive on China by painting a picture of Chinese aggression in cyberspace with no clear evidence that the Chinese intelligence agencies are responsible for any cyber attacks at all.

In the west, facts seldom get in the way of common misconceptions, and these articles are the first steps towards building those misconceptions.
 

kyanges

Junior Member
This is incredibly interesting, but I just could not ignore this.

"Lulz" is a "hacker term" now! :rofl: .

My speculation is that the campaign of cyber-attacks against Chinese targets was seeded by the US government, but has gathered its own momentum and is drawing in freelance foreign and some Chinese hackers searching for lulz - the hacker term for giggles or detached/callous amusement.
 
Top