Did China Authorize Major High Level Hack on US & It’s Allies?

 

Google announced it has discovered a phishing scam based in China, looking to uncover email passwords of important government officials. 

Chinese hackers broke into the personal Gmail accounts of senior officials and military personnel of the US government and its allies and stole sensitive data, setting the stage for an era of heightened cyber tension between the world's top military powers.

Hackers unleashed malware or phishing scam to highjack the accounts of government functionaries, military top brass and journalists in what appears to be a selective attack on key targets, especially political rivals of China, from where the cyber criminals launched their attack.

The hack attack came to light just a day after it was revealed that the US government was planning to bring in legislation declaring cyber attacks as acts of war.

The latest hack attack, which might bring Google and the Chinese administration into a fresh fistfight, was precisely planned and executed, raising doubts if the Chinese state had authorized it.

Google has not ruled out the chances of a state-sponsored hack attack. The report says there is no evidence suggesting that the cyber criminals were in Chinese government payrolls.

However, there have been serious allegations against the Chinese state machinery in the past over cyber attacks on the US and allies. Experts have said in the past that, for China, cyber warfare fits into the scheme of things.

China has long regarded cyberwarfare as a critical component of asymmetrical warfare in any future conflict with the US From China's perspective, it makes sense to use any means possible to counter America's huge technological advantage. Sneaking into the email systems of high-profile sensitive targets could be just a precursor to daring attacks on critical computer networks supporting a country's security. The US has realized the scope and gravity of cyber attacks and their utility in real warfare.

That is why the US decided to change it military rule book to accommodate provisions for retaliatory strikes on hacker groups and their state sponsors if critical US infrastructure, military installations or other national assets come under attack.

According to the Pentagon, planned retaliatory strikes against cyber criminals can come within the gamut of laws governing armed conflict. When an enemy deals a crippling blow to the country's assets by means of a cyber attack, it can be considered as an act of war.

When warranted, the US will respond to hostile acts in cyberspace as we would to any other threat to our country, the White House said a fortnight ago.

The US, the country's nuclear reactors, pipelines and mass transport systems are especially vulnerable. The US is vulnerable to sabotage in defence, power, telecommunications, banking. An attack on any one of those essential infrastructures could be as damaging as any kinetic attack on US soil,  former Pentagon cyber expert Sami Saydjari is reported to have said. 

The US military is also on high alert for possible hack attacks, especially by Chinese and Russian hackers.

Many experts share the feeling that sophisticated cyber attacks can deal crippling blows on enemy states. The US has decided to be up to speed with the developments, and that's why the Pentagon now considers cyber attacks on critical installations as acts of war. 
Ein News: http://bit.ly/1HmIdMF

« Google's New AI System is 'Machine Learning' Breakthrough
CIA Say Edward Snowden 'taught ISIS to avoid detection' »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.