TEL AVIV (Reuters) – Hackers have broken into the systems of more than a dozen global telecom companies, and taken large amounts of personal and corporate data, researchers at a cyber security firm said on Tuesday, which is the identification of links to previous Chinese cyber-espionage campaign.
A FILE PHOTO of A man holding a laptop computer as a cyber-code that is projected onto it in this illustration photo taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
Researchers at the U.S. / Israeli cyber-security firm Cybereason, said that the attackers compromised of companies in more than 30 countries, and has been referred to the collection of information on people with the government, the police and the politicians.
The hackers used tools in a context with other terrorist attacks attributed to Beijing by the us and its Western allies, said Lior Div, chief executive of Cybereason.
“This level of fine-tuning is not a crime group. This is a government that has the capability to do this kind of attack,” he told Reuters.
China has repeatedly denied involvement in the hacking business.
Cybereason declined to name the companies affected, or the countries in which they operate, but those who are familiar with the Chinese hacking operations, said in Beijing, more and more attention to telco’s in the West, Europe and asia.
The western countries have moved on to call out Beijing for its actions in the wild, warning that Chinese hackers have broken into businesses, and government agencies all over the world in order to steal valuable trade secrets, and personal data for intelligence purposes.
Div said: this is the last campaign in which his team discovered in the last nine months, and the compromise of the internal network of a number of targeted, allowing the offense to adjust to the infrastructure and the theft of large amounts of data.
In some cases, they are able to make a compromise of the entire active directory, which will give them access to every user name and password for the organization. They also got a hold of your personal information, including billing information and call records, Cybereason, said in a blog post.
“They have built up a perfect espionage environment,” said Div, is a former commander of Israel’s military intelligence unit 8200. “They were able to grasp the information the way you need them, and for the purposes that they are interested in.”
Cybereason, said multi-tools that will be used by the attackers, and had previously been used by a Chinese hacking group known as the APT10.
The United States has indicted two alleged members of the APT10 in December, along with other Western countries, the question of the group’s attack on the global technology and service providers, to the stealing of the intellectual property rights of our clients.
The company has said on previous occasions, was referred to attacks suspected of coming from China or Iran, but it was never really enough to get the name of the new member states.
Cybereason, said that “This time, unlike in the past, and we are proud to say that the attack originated in China.”
“We have to know where to find it, and not just a part of the software, we were able to get more than five of a variety of tools that this particular group,” Misc said.
Additional reporting by Jack Stubbs. Editing by Jane Merriman