Chinese hackers hit government offices

A cyber-espionage group based in southwest China stole documents from the Indian Defence Ministry and emails from the Dalai Lama’s office, Canadian researchers said in a report.

Chinese hackers hit government offices

The cyber-spies used popular online services, including Twitter, Google Groups and Yahoo Mail, to to gather information on targets and hack into computers, ultimately directing them to communicate with command and control servers in China.

Stolen documents recovered by the researchers contained sensitive data taken from India’s National Security Council Secretariat. They included secret assessments of the security situation in north-eastern states bordering Tibet, Bangladesh and Myanmar, as well as insurgencies by Maoists.

We’ve actually had very healthy co-operation with the Chinese computer emergency response team, who are actively working to understand what we’ve uncovered

Information supplied by visa-seekers to the Indian embassy in Afghanistan and the Indian and Pakistani embassies in the United States were also compromised, the report said.

The report, entitled “Shadows in the Clouds”, said the spy network was likely run by individuals with connections to the Chinese criminal underworld. Information might have been passed to branches of the Chinese government, it added.

“We did not find any hard evidence that links these attacks to the Chinese government,” said Nart Villeneuve, a researcher at the University of Toronto’s Munk School of Global Affairs.

“We’ve actually had very healthy co-operation with the Chinese computer emergency response team, who are actively working to understand what we’ve uncovered and have indicated they will work to deal with this … It’s been a very encouraging development,” Villeneuve told a Toronto news conference.

In Beijing, a Chinese Foreign Ministry spokeswoman said Chinese “policy is very clear. We resolutely oppose all internet crime, including hacking.”

A year ago, the same researchers described a systematic cyber-infiltration of the Tibetan government-in-exile, which they dubbed GhostNet.

“The social media clouds of cyberspace we rely upon today have a dark, hidden core, There is a vast subterranean ecosystem to cyberspace within which criminal and espionage networks thrive,” said the Munk School’s Ron Diebert.

Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.

Todays Highlights
How to See Google Search History
how to download photos from google photos