What's new

China hacks US comission emails under Indian guise.

ao333

FULL MEMBER
Joined
Mar 15, 2010
Messages
1,289
Reaction score
0
Country
Canada
Location
Canada
Suspicion is growing that operatives in China, rather than India, were behind the hacking of emails of an official US commission that monitors relations between the United States and China, US officials said.

News of the hacking of the US-China Economic and Security Review Commission surfaced earlier this month when an amateur "hacktivist" group calling themselves "The Lords of Dhararaja" and purporting to operate in India published what it said was a memo from an Indian Military Intelligence unit to which extracts from commission emails were attached.

The Guardian's own investigation, alongside that by Reuters, established that the memo itself – which claimed that Apple, Nokia and BlackBerry-maker RIM had given the India government and military a "back door" to spy on data traffic and conversations – was almost certainly faked.

The emails, however, appeared authentic.

Now US officials, who have spoken to Reuters on condition of anonymity, say the roundabout way the commission's emails were obtained strongly suggests the intrusion originated in China, possibly by amateurs, and not from India's spy service.

A large cache of raw email data from the security breach, reviewed by Reuters, indicates that the principal target of the intruders was not the commission, but instead a Washington-based non-governmental pro-trade group called the National Foreign Trade Council (NFTC).

The NFTC is headed by William Reinsch, a former top US Commerce Department official who until recently served as the US-China Commission's chairman.

A large proportion of the raw email traffic downloaded by the hackers consists of messages to and from Reinsch at his NFTC email address. Many of the emails were spam, but some related to the work of the commission, which was set up by Congress to take a critical look at a wide range of US dealings with China.

Reinsch told Reuters that the NFTC first became aware in November that large quantities of its message traffic had been hacked. He said that law enforcement authorities, including the FBI, had been quickly notified. The FBI has declined comment.

Reinsch said he could think of "no particular reason" why the Indian government or Indian hackers would be interested in him. By contrast, he and several other US officials said that Chinese hackers, whether amateur or directly affiliated with Chinese government, would have great interest in the US-China Commission's activities, both public and private.

Sources familiar with the hacking and the related investigation said they draw two inferences from the fact that the principal target of the hack appears to have been Reinsch's email account at NFTC.

First, the sources said they found it difficult to believe anyone connected with India would have taken the time or effort to track down Reinsch or his NFTC account, whereas his chairmanship of the US-China Commission made him a potential major target for Chinese hackers.

Secondly, said the sources, the fact that Reinsch's NFTC emails were the principal target suggests that whoever hacked them was hunting for a soft target with poor cybersecurity.

That fits a pattern of what is known as a blended attack: sophisticated hackers often plan attacks in multiple stages, targeting the systems of government officials and corporate executives by first breaching the less secure systems of people with whom they regularly communicate.

"It's all about trust relationships and getting inside the trust ecosystems – whether they be digital ecosystems or interpersonal relationships," said Tom Kellermann, a cybersecurity expert who has served as a policy advisor to the Obama administration.

"Individuals many times are targeted not just for the network of computers to which they have access, but to the network of individuals to which they have access," said Kellermann, chief technology officer of a company known as AirPatrol Corp.

Pinning down the origin and perpetrator of a particular cyber intrusion can be very difficult, if not impossible, as hackers frequently take steps to mask their identity or appear that they are from a third country.

One official familiar with the matter said that it was possible that all the hacked email traffic, including messages related to the US-China Commission, originated with the NFTC.

Under this scenario, the reason commission traffic was included in the hacked material was that it consisted of copies of commission messages which were sent to Reinsch at his NFTC email address.

But other officials said it was also still possible some emails were stolen directly from the commission or private email accounts of other commissioners.

A person familiar with details of the incident and related investigation said the hacked emails spanned a six-month period from late March to late October 2011. The source said that about 85% of the traffic consisted of emails incoming at the NFTC, with the rest being outgoing messages from NFTC's server.

The source said that there were significant gaps in the hacked traffic, covering both day-long and week-long periods, bolstering the notion the hacking was done by amateurs.

Investigators are still trying to determine if the hacker successfully targeted NFTC's local network, or a network which fed messages to a mobile device used by Reinsch. It is not known what device Reinsch uses for mobile communications.

The purported Indian intelligence memo implied that the commission emails had somehow been hacked using know-how supplied to the Indian government by mobile phone companies who, as payback, were afforded greater access to the Indian market.

But comments from Apple, RIM and Nokia indicated that no such deal had been made.

Indian government officials and agencies declined repeated requests for comment on the alleged government document, although some former Indian officials labelled the memo a fabrication. One telling detail was the use of a logo which did not match the department claimed to have created the memo.

Two US officials familiar with the hacking incident said they were puzzled why India would go to the trouble of hacking emails related to the US-China Commission, since its work had little if anything to do with India, and Indian officials and diplomats had never showed much interest in its activities.

By contrast, the commission has been a regular target for what officials describe as persistent attempted hacking intrusions, many through the technique of "phishing," which involves sending bogus but convincing emails which purport to come from insiders but contain malicious code.

Investigators strongly suspect these intrusions were launched by people from, or operating on behalf of, China.

A large proportion of the hacked traffic examined by Reuters appeared to be what could be categorised as spam, including summaries of news articles and political fundraising pitches.

Some hacked traffic from the US-China Commission had potentially sensitive implications, however, including messages in which commission personnel discuss matters under deliberation by the organisation. These issues included the commission's attitude toward alleged Chinese theft of intellectual property and congressional deliberations about alleged Chinese currency manipulation.

US officials said there was no indication hackers managed to gain access to electronic files related to the commission's most sensitive project – a classified version of its annual public report. Electronic materials related to this project are kept on classified servers, isolated from the internet, which are operated by agencies other than the commission itself, one official said.

US accuses China of hacking emails | Technology | guardian.co.uk

When in doubt, blame India
 
Suspicion is growing that operatives in China, rather than India, were behind the hacking of emails of an official US commission that monitors relations between the United States and China, US officials said.
...
The Guardian's own investigation, alongside that by Reuters, established that the memo itself – which claimed that Apple, Nokia and BlackBerry-maker RIM had given the India government and military a "back door" to spy on data traffic and conversations – was almost certainly faked.
Unbelievable! LOL It's a public fact that the Indian government requested certain companies to allow backdoors for "security" reasons or else market access within India would be banned. RIM (makers of Blackberry) were threatened with this in the recent past and they acquiesced.

BlackBerry agrees to address India's security concerns: MHA - The Times of India

India's access to private emails, SMS, etc via RIM is a public fact and beyond dispute. It was the reason RIM stock plunged right after it became public that India was going to ban Blackberry from that market unless they gave access to the Indian government to spy on Blackberry users for "security" reasons. The Guardian's "investigation" is an absolute joke, millions of people knew about this. There were similar threats made against RIM from the UAE which RIM also bowed down to....

RIM averts BlackBerry ban in UAE | Security - CNET News

When in doubt, blame India
You're joking right? India publicly threatened to ban RIM (maker of Blackberry) unless they provided India's spies backdoor access to Blackberry users and now that India has been caught red-handed spying on the United States, using the backdoor that everybody knows India has access to, that it's actually China's fault and Chinese spies...who do not have backdoor access? Honestly, this sort of blatant demonization and obvious BS makes Americans look like morons.
 
It's plausible that India (government sponsored or not) is responsible since India is known for it's technical (comp sci) knowledge and not just being the World's call centre.
 
It's plausible that India (government sponsored or not) is responsible since India is known for it's technical (comp sci) knowledge and not just being the World's call centre.

Indian have the knowledge and technical know how to do such a stunt...
But in reality we dont hav an establishment to pull that kind of stunt....and this is the truth believe it or not...
 
The same old stuff with a new label. Nothing special, Shift the blame on to china.
But by the way, Why chinese hacker do "these shameful thing" too much, If it is true, Good, Go ahead, you are better than other country hacker. shame on India.
 
It's plausible that India (government sponsored or not) is responsible since India is known for it's technical (comp sci) knowledge and not just being the World's call centre.
Again, India was given backdoor access by RIM (makers of Blackberry) on purpose. It was a public issue that affected millions of people, Indian users of Blackberry and investors around the world. I was one of those people because I held over $100000 of their f**king stock when India announced their intention to ban the Blackberry from the Indian market unless RIM (makers of Blackberry) gave Indian security services backdoor access to Blackberry customers SMS, email and probably voice calls as well. It is public knowledge that millions of people read about and was front page news in the financial papers, television and Internet news. Here is just 1 story from that time less than 2 years ago.

http://timesofindia.indiatimes.com/business/india-business/BlackBerry-agrees-to-address-Indias-security-concerns-MHA/articleshow/6232306.cms

...the level of rhetoric with this spying issue concerning China has crossed into the insanity zone the moment the media began accusing China for being the culprits when Indian security services have legal access with the express permission of these companies.

Despite what is being said by the media, make no mistake, the American government is aware that India is spying on them and will be considering this in their decision making. Not everybody in the US are ideologues that see things as good and evil...vs...reality and wishful thinking.
 
Back
Top Bottom