Skip to main content

Chinese cyber attacks on West are widespread, experts say

STORY HIGHLIGHTS
  • Report: One in every three observed computer attacks in Q3 2012 came from China
  • The New York Times and the Wall Street Journal claim to be victims of Chinese attacks
  • Chinese officials say there are no state-sponsored hacking attacks on Western companies
  • Experts say the number of attacks coming out of China has risen in recent years

Hong Kong (CNN) -- Allegations that Chinese hackers infiltrated the computers of two leading U.S. newspapers add to a growing number of cyber attacks on Western companies, governments and foreign-based dissidents that are believed to originate in China, experts say.

According to one recent report, one in every three observed computer attacks in the third quarter of 2012 emanated from China.

Chinese officials have denied that Beijing has supported any cyber attacks, stressing that hacking is illegal in the country.

The New York Times reported Wednesday it had been the target of four months of cyber assaults, which started during an investigation by the newspaper into the wealth reportedly accumulated by relatives of the Chinese premier, Wen Jiabao. The Wall Street Journal said Thursday that its computer systems also had been infiltrated by Chinese hackers.

Cyber security experts say the alleged attack on The New York Times appeared to be similar to previously reported attacks that were linked to China.

"To do a spear-phishing attack of this kind is a well-established move in attacks against Google and various U.S. defense contractors from China," said Thomas Parenty, a former employee of the U.S. National Security Agency who now advises foreign firms in China on computer security.

NYT attack a wake-up call, security experts say

China denies NY Times hack attack
China denies NY Times hack attack
New York Times: We were hacked

"You could say the tools are sort of stock-in-trade" for Chinese hackers, he said.

"Spear-phishing" is a technique of disguising an email so that it appears to be from a trusted source, luring the victim to open an attachment or link that unleashes malicious software on the computer.

Investigators for The Times say they suspect the technique was used by the hackers to break into the newspaper's system where they were able collect passwords of every Times employee and gain access to the personal computers of 53 employees.

Security experts who helped the newspaper to counter the attacks accumulated evidence that the hackers used methods "associated with the Chinese military in the past" to breach the network, The Times said.

Chinese denials

Asked about The Times's allegations on Thursday, a spokesman for the Chinese Foreign Ministry said that "all such alleged attacks are groundless, irresponsible accusations lacking solid proof or reliable research results." China has been the victim of cyberattacks and "has laws and regulations prohibiting such actions," the spokesman, Hong Lei, said at a regular news briefing.

A separate statement from the Chinese Ministry of National Defense said the country's military "has never supported any hacker activities."

But data reported by Western companies suggest that even though Chinese authorities say they prohibit hacking, they are struggling to keep it under control.

One-third of all observed computer attacks from July through September last year came from China, according to a report last month from Akamai Technologies, an Internet services company.

The United States was a distant second, originating 13% of observed attacks, followed by Russia with 4.7%.

"China has been consistently responsible for the largest percentage of observed attacks since (the fourth quarter of) 2011," the report said.

The most recent report shows a dramatic upswing in incidents from the Asian country. In the second quarter, 16% of observed cyber attacks came from China, the company said.

The executive summary of the report didn't specify from which groups or individuals in China the attacks might have come.

Google had a very public spat with the Chinese government in 2010 after it claimed China had led a hacking attack against Google, other technology companies, defense corporations and Chinese dissidents.

"In the past they've been pretty much focused on either intellectual properties, such as the hacking of defense companies, or dissidents they want to get at, like the Google Gmail attacks," Parenty said. "In this case, it appears they were trying to be able to get to people who talked to The New York Times -- they could make their lives miserable and send the message: Don't do this.

"They love to instill fear so people self censor or limit what they would say or do with the media," he added.

Compromised computers

Mandiant, the security firm that led the investigation at The New York Times, says there is good reason for concern in the United States.

"There are thousands of computers compromising the United States at universities, at Mom and Pop shops -- small organizations without a big cyber security program -- and those computers serve as the beachhead to hack blue-chip American companies," Kevin Mandia, the chief executive of Mandiant, told CNN.

"The majority of victims, well over 90% of the victims we have responded to, really don't disclose that these attacks occur" for fear of losing customer trust, Mandia said.

"The folks that perpetrated this intrusion have done it to hundreds of other organizations and usually they are very successful," Mandia said. "What's really unique here is the fact that the victim organization, The New York Times, has decided to share this information with the public, so people can be more aware of the problem -- because it's a very pervasive problem."

Marc Frons, chief information officer of The Times, told CNN that the newspaper believed it had prevented this attack from revealing confidential sources.

In the case of the investigation into Wen's family's finances, much of the information came from public records.

But Frons said The Times isn't letting its guard down after expelling the hackers.

"I think we're over this phase of the attack and obviously the types of things they tried to do previously they'll have a more difficult time doing, but this isn't over," he said. "As long as there are computers and networks we're going to be faced with cyber espionage threats."

CNN's Hala Gorani, Jethro Mullen and CNN's Beijing bureau contributed to this report

ADVERTISEMENT
Part of complete coverage on
October 29, 2014 -- Updated 0518 GMT (1318 HKT)
A top retired general has confessed to taking bribes, becoming the highest-profile figure in China's military to be caught up in President Xi Jinping's war on corruption.
October 27, 2014 -- Updated 0507 GMT (1307 HKT)
A group in China escapes from a stuck elevator thanks to one man and his trusty hammer. CNN's Kristie Lu Stout reports.
October 23, 2014 -- Updated 1352 GMT (2152 HKT)
Facebook's founder says he taught himself Mandarin and tested his skills with students in China.
October 24, 2014 -- Updated 0133 GMT (0933 HKT)
China launched an experimental spacecraft that is scheduled to orbit the moon before returning to Earth.
October 28, 2014 -- Updated 1619 GMT (0019 HKT)
Full marks for ingenuity: This was a truly high-tech scam.
October 21, 2014 -- Updated 0526 GMT (1326 HKT)
The rationale behind Confucius Institutes -- an international chain of academic centers run by an arm of the Chinese government -- is understandable.
October 24, 2014 -- Updated 1511 GMT (2311 HKT)
Smooth jazz saxophonist Kenny G wants everyone to know that he's not a foreign agitator trying to defy the Chinese Communist Party.
October 17, 2014 -- Updated 1113 GMT (1913 HKT)
A smuggler in Dandong, a Chinese border town near North Korea, tells CNN about the underground trade with North Korean soldiers
October 28, 2014 -- Updated 0511 GMT (1311 HKT)
Yenn Wong got quite a surprise one morning earlier this month when she found out an exact copy of her Hong Kong restaurant had opened in China.
October 15, 2014 -- Updated 0315 GMT (1115 HKT)
When I first came across a "virtual lover" service on e-commerce site Taobao, China's version of Amazon, I thought it was hype.
October 14, 2014 -- Updated 1315 GMT (2115 HKT)
Each year Yi Jiefeng does what she can to stop China turning into a desert.
October 13, 2014 -- Updated 1454 GMT (2254 HKT)
As its relationship with the West worsen, Russia is pivoting east in an attempt to secure business with China.
October 8, 2014 -- Updated 0229 GMT (1029 HKT)
Aspiring Chinese comics performing in Shanghai's underground comedy scene hope to bring stand-up to the masses.
September 30, 2014 -- Updated 1654 GMT (0054 HKT)
Liu Wen is one of the world's highest-paid models and the first Chinese face to crack the top five in Forbes' annual list of top earners.
October 3, 2014 -- Updated 1144 GMT (1944 HKT)
Cunning wolf? Working class hero? Or bland Beijing loyalist? C.Y. Leung was a relative unknown when he came to power in 2012.
October 2, 2014 -- Updated 1125 GMT (1925 HKT)
 A man uses his smartphone on July 16, 2014 in Tokyo, Japan. Only 53.5% of Japanese owned smartphones in March, according to a white paper released by the Ministry of Communications on July 15, 2014. The survey of a thousand participants each from Japan, the U.S., Britain, France, South Korea and Singapore, demonstrated that Japan had the fewest rate of the six; Singapore had the highest at 93.1%, followed by South Korea at 88.7%, UK at 80%, and France at 71.6%, and U.S. at 69.6% in the U.S. On the other hand, Japan had the highest percentage of regular mobile phone owners with 28.7%. (Photo by Atsushi Tomura/Getty Images)
App hopes to help those seeking a way out of China's overstrained public health system.
October 3, 2014 -- Updated 0020 GMT (0820 HKT)
Yards from pro-democracy protests, stands the Hong Kong garrison of the People's Liberation Army (PLA), China's armed forces.
ADVERTISEMENT