Cyber-espionage against U.S. firms more widespread than previously thought.

AuthorMagnuson, Stew
PositionHomeland Security News

That foreign adversaries are using computer network vulnerabilities to steal military data from the U.S. government and its contractors is well known and hardly surprising.

Nations for centuries have long sought to steal such secrets from one another and spy-craft has simply moved into cyberspace.

However, the unveiling of a massive cyber-espionage network in August goes well beyond the unwritten rules that informally govern nations when it comes to the theft of technical data or insights into the minds of leaders and their intentions, said Dmitri Alperovitch, vice president of threat research at network security firm, McAfee.

Alperovitch analyzed one command-and-control server that had been used to spread malware for five years before McAfee exposed it.

"Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators," he wrote in a blog.

Examining the logs to determine who the victims were, and how long the intrusion lasted before it was detected, Alperovitch found 30 different industries on the list.

Many were, indeed military contractors and information technology companies, but the list revealed a U.S. real estate firm that had its data laid bare for 8 months, a U.S. agricultural trade organization for three months, a U.S. natural gas wholesaler for seven months, a German accounting firm for 20 months and a U.S. insurance association for three months.

A U.S. news organization's Hong Kong bureau was infiltrated for a whopping 21 months and a U.S. satellite company for 25 months. Other entities that had been penetrated included think tanks, nonprofits involved in democracy building programs overseas, U.S., Canadian and Indian local governments, several U.S. and South Korean construction companies and Olympic committees.

Such organizations rarely tell the public when they have been hacked, which is why the analysis of the server...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT