Did China Authorize Major High Level Hack on US & It’s Allies?

 

Google announced it has discovered a phishing scam based in China, looking to uncover email passwords of important government officials. 

Chinese hackers broke into the personal Gmail accounts of senior officials and military personnel of the US government and its allies and stole sensitive data, setting the stage for an era of heightened cyber tension between the world's top military powers.

Hackers unleashed malware or phishing scam to highjack the accounts of government functionaries, military top brass and journalists in what appears to be a selective attack on key targets, especially political rivals of China, from where the cyber criminals launched their attack.

The hack attack came to light just a day after it was revealed that the US government was planning to bring in legislation declaring cyber attacks as acts of war.

The latest hack attack, which might bring Google and the Chinese administration into a fresh fistfight, was precisely planned and executed, raising doubts if the Chinese state had authorized it.

Google has not ruled out the chances of a state-sponsored hack attack. The report says there is no evidence suggesting that the cyber criminals were in Chinese government payrolls.

However, there have been serious allegations against the Chinese state machinery in the past over cyber attacks on the US and allies. Experts have said in the past that, for China, cyber warfare fits into the scheme of things.

China has long regarded cyberwarfare as a critical component of asymmetrical warfare in any future conflict with the US From China's perspective, it makes sense to use any means possible to counter America's huge technological advantage. Sneaking into the email systems of high-profile sensitive targets could be just a precursor to daring attacks on critical computer networks supporting a country's security. The US has realized the scope and gravity of cyber attacks and their utility in real warfare.

That is why the US decided to change it military rule book to accommodate provisions for retaliatory strikes on hacker groups and their state sponsors if critical US infrastructure, military installations or other national assets come under attack.

According to the Pentagon, planned retaliatory strikes against cyber criminals can come within the gamut of laws governing armed conflict. When an enemy deals a crippling blow to the country's assets by means of a cyber attack, it can be considered as an act of war.

When warranted, the US will respond to hostile acts in cyberspace as we would to any other threat to our country, the White House said a fortnight ago.

The US, the country's nuclear reactors, pipelines and mass transport systems are especially vulnerable. The US is vulnerable to sabotage in defence, power, telecommunications, banking. An attack on any one of those essential infrastructures could be as damaging as any kinetic attack on US soil,  former Pentagon cyber expert Sami Saydjari is reported to have said. 

The US military is also on high alert for possible hack attacks, especially by Chinese and Russian hackers.

Many experts share the feeling that sophisticated cyber attacks can deal crippling blows on enemy states. The US has decided to be up to speed with the developments, and that's why the Pentagon now considers cyber attacks on critical installations as acts of war. 
Ein News: http://bit.ly/1HmIdMF

« Google's New AI System is 'Machine Learning' Breakthrough
CIA Say Edward Snowden 'taught ISIS to avoid detection' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Sanderson

Sanderson

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.