What is the source of the attack from China?

Source: Internet
Author: User
Keywords US website Chinese hackers
Tags address company control hacker hacker attacks hackers hacking how to

Absrtact: A few days ago, a U.S. network security company issued a report that the Chinese military-related hackers repeatedly attacked the U.S. Web site, this statement immediately sparked international public opinion's strong concern. Does the Chinese military support involvement in hacking? How to view American companies and media

Recently, a U.S. network security company issued a report that the Chinese military-related hackers repeatedly attacked the U.S. Web site, this statement immediately sparked international public opinion's strong concern. Does the Chinese military support involvement in hacking? How do you think about American companies and the media? This reporter interviewed the relevant departments and experts.

The Chinese army is involved in cyber hacking attacks?

China is one of the main victims of cyber attacks, and the Chinese government and military are firmly opposed to cyber hacking

According to some foreign media reports of Chinese military involvement in cyber hacking attacks, the Ministry of Defense Press bureau said 20th that hacking is a global problem. China's laws prohibit any cyber-security breaches, such as hacking, and the Chinese government has always resolutely combated criminal activity, and the Chinese military has never supported any hacking activities. The allegation that the Chinese military is engaged in cyber attacks is neither professional nor factual.

China is one of the main victims of cyber attacks. According to the report published by China National Internet Emergency Center, in 2012, 73,000 overseas IP addresses were used as Trojan or botnet control servers to control more than 14 million hosts in China, 32,000 IP by implanting back door to implement remote control for nearly 38,000 websites in China. The National defense Network and the Chinese military network suffered more than 80,000 attacks abroad. According to the IP address, there are a significant number of attacks from the United States, but our country has not been blamed on the U.S. side.

China has always attached importance to international cooperation in cyberspace to combat cybercrime, the Ministry of Information Affairs said. Since 2004, China's Ministry of Public Security has assisted more than 50 countries and regions in investigating cybercrime cases over 1100. China has established bilateral law enforcement cooperation with 30 countries such as the United States and Britain, and has signed bilateral judicial cooperation treaties with many countries, and has a better mechanism to combat cybercrime and hacker attacks. China hopes to solve the problem through normal law-enforcement cooperation, and to make a unilateral public accusation in the media is not only unhelpful, but also undermines the atmosphere of cooperation.

Hong Lei, a foreign ministry spokesman, said at a regular press conference 19th that the US side had no expertise or responsibility to make unwarranted guesses and accusations of hacking, and that it should be resolved through constructive international cooperation on the basis of mutual trust and respect. The Chinese government has always resolutely opposed and combated cyber attacks according to law.

What is the source of the attack from China?

There is no convincing evidence of the report; precise positioning of the source of the attack requires cross-border multisectoral cooperation

Wu Chengrong, associate professor of computer science and technology, Fudan University told reporters that from the technical level, Mandiante (Mandiant) network company reported that some of the tools described in the current more advanced and effective methods of network intrusion, but only with the IP address of the connection, they are "Chinese military hackers" conclusion, There is insufficient evidence.

Wu Chengrong believes that online attackers always hide their real address as far as possible, to identify the source of the attack, precise positioning, the need for cross-border multisectoral cooperation, but currently published only a network company's internal records, not even the telecommunications sector monitoring data. In addition, in the information security attack and defense technology, our country and the United States still have a big gap. If there is a government support hacker attacks, the face of the operating system, client software and other aspects of the technology advantage, and have a domain name server and other Internet strategic resources of the United States, China is difficult to get the upper hand.

Professor Shima, vice dean of information security Engineering, Shanghai Jiao Tong University, 2010, the United States media has only issued a virus in accordance with the IP address, said the Shandong Blue Cheung Technical School and the Shanghai Jiaotong University Information Security Engineering College is the government background of the Chinese hackers "stronghold." However, the results of the Shanghai Jiaotong University survey, the IP address from a student bedroom computer, infected with Trojan virus became "broiler." On the internet, such a controlled "broiler" has tens of millions of units, to find out which is the real control of the host, which is only a springboard, not easy.

The Information Bureau of the Ministry of Defense also points out that cyber attacks are transnational, anonymous and deceptive, and that the source of the attack is very uncertain. The report published by Mandiante Network company only based on some of the online actions collected, subjectively inferred that the Chinese military engaged in cyber espionage operations, lack of legal basis.

Why are the reports of "Chinese hackers attacking America" recurring?

The system factor of the government budget system, which is driven by commercial interests

Shen Yi, Ph. D., doctor of International relations and Public Affairs, Fudan University, told reporters an interesting phenomenon, Mandiante network company Report Writer, formerly in the United States Air Force Intelligence Service, and later served as arms manufacturers Lockheed Martin and Mandiante Network company, Martin is the largest U.S. arms manufacturer and defense contractor to be attacked by hackers in May 2011. The incident was later falsely referred to as "Chinese hackers attacking the Pentagon".

"This year's report is a rehash of the same, adding some specious details, such as the announcement of cyber-security in China's Central Military Commission and the relocation of the military hacker address to Shanghai to increase credibility." ”

Shen Yi says some of the details provided by the report are untrue. For example, Google search for the so-called "three departments of the PLA" and "61,398 teams" no results. Based on these keyword searches, he can find "a whole bunch of web articles". He speculated that the report might have borrowed from these online articles. Shen Yi, the Pentagon has put a published on the campus online science fiction "Deep-sea crab", described as China has developed a successful submarine attack weapons, a professor in the media column, as "China wants to change the policy of not first use nuclear weapons" evidence.

Shen Yi that the Pentagon needs reasonable reasons to convince the public that it wants to expand its network of troops and buy weapons and research projects from private companies. Business interests have become a powerful social driver, prompting companies to "design" the enemies of the United States and to render terror and threats, as determined by the U.S. government's budgetary system.

"Repeated reports of Chinese hackers ' threats to U.S. information security are a projection of the lack of strategic trust and national security anxiety in China." "Shen Yi said.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.