GhostNet: Did the Chinese government hack the world?
The Chinese state has been accused of spying on networks around the world, but it could also be cybercriminals – which could turn out to be a very big problem for businesses.
It's the sort of world-wide super-villain master plan that wouldn't look out of place in a spy movie
Canadian researchers have discovered a massive worldwide cyber-spying network, where at least 1,295 computers from high-value targets like foreign ministries and embassies were infected over two years.
A team from the Munk Centre for International Studies dubbed the operation GhostNet', and concluded that computers based almost exclusively in China were responsible but stopped short of accusing the Chinese government.
Chinese state hacking?
So what evidence is there that the Chinese authorities could have been responsible for this invasion into highly privileged information around the world?
The report does agree that Chinese cyber-espionage is a major global concern, with even the Chinese authorities making it clear that they considered cyberspace a strategic domain and that it redressed the military imbalance with the rest of the world.
It's also important to note that the investigation started with a Tibetan request to the Information Welfare Monitor to look at cyber-espionage against the Tibetan community.
The Tibetans have accused the Chinese of engaging in cyber war against them for several years, as part of wider strategy to crack down on dissident groups and subversive activity.
No smoking gun'
However, the Canadian researchers said it would be wrong and misleading to claim that all of the Chinese malware was from the government.
After all, the Chinese have the world's largest internet population, and cybercrime kits are letting users pull off their own attacks.
As Sophos security analyst Graham Cluley says in his blog, there is no "smoking gun". He points out that just because Chinese computers were used in the operation, it did not mean that the authorities were involved.
He said that if you were to investigate the IP address of spam that was sent into your mailbox, a good proportion of it would be from a PC based in China but it wouldn't be in Chinese.
In This Article
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now