LONDON (Reuters) – Hackers working for China’s Ministry of state security broke up a network of eight of the world’s largest technology providers, in an effort to steal the trade secrets of their clients, according to sources familiar with the attacks.
A FILE PHOTO of A man holding a laptop computer as a cyber-code that is projected onto it in this illustration photo taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
Reuters today reported, added new details to the global hacking campaign, also known as a Cloud Hopper, and is attributed to China, the United States and its Western allies.
You can find the full report here:
A U.S. criminal complaint, in December, outlined an in-depth description to steal Western intellectual property rights in China’s economic interests, but stopped short of naming the victim companies. A Reuters report at the time identified in two, Hewlett-Packard, and IBM Enterprise.
Now, Reuters has found at least six other technology service providers, were affected: Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation and the DXC-Technology, HPE’s a spin-off services to the poor.
Reuters has also announced that more than a dozen victims who were clients of the service providers. That list contains some of the Swedish telecoms giant, Ericsson, U. s. Navy’s shipbuilding company, Huntington Ingalls Industries, and the travel reservation system, Sabre.
HPE said that it is working diligently with our customers to mitigate these attacks and protect their information.” DXC said it had “robust security measures” to protect itself and the customers, both of which have experienced from significant impact” by the Cloud Hopper.
NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM, declined to comment. IBM has said it has no evidence that sensitive company information was compromised by the attack.
Sabre said it had to be revealed to a cyber security incident in the year 2015, and a study concluded that not a single passenger data to be accessed. A Huntington Ingalls spokeswoman, said the company is “confident that there will be no question of a breach of COMPANY data through the HPE or the DXC.
Ericsson has said that it does not comment on specific cyber security-related incidents. “Even though there have been attacks on the enterprise network, there is no evidence can be found in our extensive studies of Ericsson in the infrastructure, it is used as a component part of, a successful attack on one of our customers,” said, a spokesman said.
The Chinese government has consistently denied all allegations of involvement in hacking. The Chinese Ministry of Foreign affairs, said that Beijing is against the cyber-enabled industrial espionage. “The Chinese government has never, in any form, participate in, or be a party to the conduct, and the theft of trade secrets,” he said in a statement to Reuters.
The Cloud Hopper’s attacks bear the sure lessons to be learned for government and the technology companies are struggling to manage the threats to their safety and security.
The Chinese hackers, including a group known as the APT10, they were able to continue on with the attack, in the face of a counter-offensive, a top security specialists, and, in spite of the 2015 US-China pact to refrain from engaging in economic espionage.
Reuters was not able to get into a detailed description of the full extent of the damage caused by the hacking and many of the victims are not in a position to tell you exactly what has been stolen. Still, senior Western intelligence officials saying that the toll was very high.
“This has been an ongoing series of attacks have a devastating impact,” said Robert Hannigan, the former executive director of the british GCHQ signals intelligence agency, and the European president at the cybersecurity firm BlueVoyant.
Additional reports by the Gao Liangping, Cate Cadell, and Ben Blanchard in Beijing and. Edited by Ronnie Greene and Jonathan Weber