Chinese hackers have been harassing the US in a series of cyberattacks, but we've started trying to talk it out and cool this all down. But in the meantime, a security researcher has just revealed that he caught a team of Chinese hackers hijacking a fake water plant he set up. And aside from spotting the fake, they knew exactly what they were doing.
Kyle Wilhoit, a researcher with security company Trend Micro, explained the details of the whole thing at Black Hat on Wednesday. The hackers that attacked the honeypot are known as APT1 or "Comment Crew," and have been tracked back to the Chinese Army before; this isn't just some group of high-tech hooligans.
According to Wilhoit, the whole thing was extremely and obviously deliberate. He put it this way to the MIT Technology Review:
You would think that Comment Crew wouldn’t come after a local water authority. I actually watched the attacker interface with the machine. It was 100 percent clear they knew what they were doing.
This isn't an isolated case either. Wilhoit also shared information about 12 other decoys that attracted some 74 deliberate attacks from APT1 and other groups, 10 of which were able to completely control of the fake water plants. If the targets had been real and not decoys, the attackers would have had no problem doing pretty much anything they wanted with the infrastructure they managed to snag...
As researcher Trevor Loudon has warned us for years, the People's Republic of China is at war with the United States. Right now.
Via: BadBlue Tech News.
1 comment:
And as Stuxnet shows, this isn't a one-sided cyber war. Let us not forget that NSA was also at Black Hat. They were publicly hooted, but I am sure plenty of cards were passed out and accepted. Oh, and we are also both currency manipulators. But, the ChiComs suck, and I do get sick of seeing their MIC stamps on everything.
Post a Comment