Report: One in every three observed computer attacks in Q3 2012 came from China
The New York Times and the Wall Street Journal claim to be victims of Chinese attacks
Chinese officials say there are no state-sponsored hacking attacks on Western companies
Experts say the number of attacks coming out of China has risen in recent years
Allegations that Chinese hackers infiltrated the computers of two leading U.S. newspapers add to a growing number of cyber attacks on Western companies, governments and foreign-based dissidents that are believed to originate in China, experts say.
According to one recent report, one in every three observed computer attacks in the third quarter of 2012 emanated from China.
Chinese officials have denied that Beijing has supported any cyber attacks, stressing that hacking is illegal in the country.
The New York Times reported Wednesday it had been the target of four months of cyber assaults, which started during an investigation by the newspaper into the wealth reportedly accumulated by relatives of the Chinese premier, Wen Jiabao. The Wall Street Journal said Thursday that its computer systems also had been infiltrated by Chinese hackers.
Cyber security experts say the alleged attack on The New York Times appeared to be similar to previously reported attacks that were linked to China.
“To do a spear-phishing attack of this kind is a well-established move in attacks against Google and various U.S. defense contractors from China,” said Thomas Parenty, a former employee of the U.S. National Security Agency who now advises foreign firms in China on computer security.
“You could say the tools are sort of stock-in-trade” for Chinese hackers, he said.
“Spear-phishing” is a technique of disguising an email so that it appears to be from a trusted source, luring the victim to open an attachment or link that unleashes malicious software on the computer.
Investigators for The Times say they suspect the technique was used by the hackers to break into the newspaper’s system where they were able collect passwords of every Times employee and gain access to the personal computers of 53 employees.
Security experts who helped the newspaper to counter the attacks accumulated evidence that the hackers used methods “associated with the Chinese military in the past” to breach the network, The Times said.
Asked about The Times’s allegations on Thursday, a spokesman for the Chinese Foreign Ministry said that “all such alleged attacks are groundless, irresponsible accusations lacking solid proof or reliable research results.” China has been the victim of cyberattacks and “has laws and regulations prohibiting such actions,” the spokesman, Hong Lei, said at a regular news briefing.
A separate statement from the Chinese Ministry of National Defense said the country’s military “has never supported any hacker activities.”
But data reported by Western companies suggest that even though Chinese authorities say they prohibit hacking, they are struggling to keep it under control.
One-third of all observed computer attacks from July through September last year came from China, according to a report last month from Akamai Technologies, an Internet services company.
The United States was a distant second, originating 13% of observed attacks, followed by Russia with 4.7%.
“China has been consistently responsible for the largest percentage of observed attacks since (the fourth quarter of) 2011,” the report said.
The most recent report shows a dramatic upswing in incidents from the Asian country. In the second quarter, 16% of observed cyber attacks came from China, the company said.
The executive summary of the report didn’t specify from which groups or individuals in China the attacks might have come.
Google had a very public spat with the Chinese government in 2010 after it claimed China had led a hacking attack against Google, other technology companies, defense corporations and Chinese dissidents.
“In the past they’ve been pretty much focused on either intellectual properties, such as the hacking of defense companies, or dissidents they want to get at, like the Google Gmail attacks,” Parenty said. “In this case, it appears they were trying to be able to get to people who talked to The New York Times – they could make their lives miserable and send the message: Don’t do this.
“They love to instill fear so people self censor or limit what they would say or do with the media,” he added.
Mandiant, the security firm that led the investigation at The New York Times, says there is good reason for concern in the United States.
“There are thousands of computers compromising the United States at universities, at Mom and Pop shops – small organizations without a big cyber security program – and those computers serve as the beachhead to hack blue-chip American companies,” Kevin Mandia, the chief executive of Mandiant, told CNN.
“The majority of victims, well over 90% of the victims we have responded to, really don’t disclose that these attacks occur” for fear of losing customer trust, Mandia said.
“The folks that perpetrated this intrusion have done it to hundreds of other organizations and usually they are very successful,” Mandia said. “What’s really unique here is the fact that the victim organization, The New York Times, has decided to share this information with the public, so people can be more aware of the problem – because it’s a very pervasive problem.”
Marc Frons, chief information officer of The Times, told CNN that the newspaper believed it had prevented this attack from revealing confidential sources.
In the case of the investigation into Wen’s family’s finances, much of the information came from public records.
But Frons said The Times isn’t letting its guard down after expelling the hackers.
“I think we’re over this phase of the attack and obviously the types of things they tried to do previously they’ll have a more difficult time doing, but this isn’t over,” he said. “As long as there are computers and networks we’re going to be faced with cyber espionage threats.”
CNN’s Hala Gorani, Jethro Mullen and CNN’s Beijing bureau contributed to this report