What's new

Exxon, Shell, BP Said to Have Been Hacked Through Chinese Internet Servers

Kevrai

FULL MEMBER
Joined
Feb 9, 2011
Messages
474
Reaction score
0
Country
India
Location
Australia
Exxon, Shell, BP Said to Have Been Hacked Through Chinese Internet Servers


Computer hackers working through Internet servers in China broke into and stole proprietary information from the networks of six U.S. and European energy companies, including Exxon Mobil Corp., Royal Dutch Shell Plc and BP Plc, according to one of the companies and investigators who declined to be identified.

McAfee Inc., a cyber-security firm, reported Feb. 10 that such attacks had resulted in the loss of “project-financing information with regard to oil and gas field bids and operations.” In its report, Santa Clara, California-based McAfee, assisted by other cyber-security firms, didn’t identify the energy companies targeted. The attacks, which it dubbed “Night Dragon,” originated “primarily in China” and occurred during the past three years.

The list of companies hit, none of which disclosed the attacks in filings with regulators, also includes Marathon Oil Corp., ConocoPhillips and Baker Hughes Inc., according to the people who worked on or are familiar with the companies’ investigations and asked not to be identified because of the confidential nature of the matter.

Chinese hackers broke into the computer network of Baker Hughes, said Gary Flaharty, spokesman for the Houston-based provider of advanced drilling technology. Baker Hughes concluded the incident didn’t need to be disclosed because it wasn’t material to investors, he said, declining to comment further.
Undetected Access

In some of the cases, hackers had undetected access to company networks for more than a year, said Greg Hoglund, chief executive officer of Sacramento, California-based HBGary Inc., a cyber-security company that investigated some of the security breaches at oil companies. Hoglund, who was cited by McAfee as a contributor to its report, declined to identify his clients.

“Legal information, information on deals and financial information are all things that appear to be getting targeted,” Hoglund said, summing up conclusions his firm made from the types of documents and persons targeted by the hackers. “This is straight up industrial espionage.”

Hackers targeted computerized topographical maps worth “millions of dollars” that show locations of potential oil reserves, said Ed Skoudis, whose company, Washington-based InGuardians Inc., investigated two recent breaches of U.S. oil companies’ networks. He declined to name his clients or the origin of the hackers.

‘Unsophisticated’ Techniques

The McAfee report described the techniques used to get into the energy company computers as “unsophisticated” and commonly used by Chinese hackers. The attacks began in November 2009, McAfee said. Two cyber investigators familiar with the probes said the attacks began even earlier -- in 2008 -- and involved several well-financed groups. The investigators asked not to be identified because the company investigations are private.

McAfee based the report on information gathered from its own work on the breaches and from others who were directly involved in investigating them. The report, produced on the condition that the affected companies not be identified, was done to “educate the community,” said Ian Bain, a McAfee spokesman.

The thefts of oil company data like those in the McAfee report match the profile of industrial espionage operations that have the backing or consent of the Chinese government, said Joel Brenner, former head of U.S. counterintelligence during the Bush and Obama administrations and now a lawyer with Cooley LLP in Washington. In his former post, one of Brenner’s jobs was tracking spying efforts against U.S. companies from foreign countries.
‘On the Hunt’

“The Chinese are on the hunt for natural resources to fuel this massive economic leap forward,” Brenner said.

Ma Zhaoxu, spokesman for China’s Ministry of Foreign Affairs, said he had no information about the attacks on the oil companies when asked about the issue at a regular briefing today.

“The Chinese government opposes hacking activities,” Ma said. “China falls victim to hacking itself. We will step up efforts to crack down on hacking crimes.”

The thefts might trigger legal liability for companies that chose not to disclose them to investors, said Blair Nicholas, a San Diego-based partner at law firm Bernstein Litowitz Berger and Grossman.

“To the extent that there aren’t adequate procedures in place to protect the companies’ crown jewels and somebody gets the key to jewelry box, there is certainly potential for shareholder derivative liability,” Nicholas said.
Securities Laws

Investors might also argue they had a right under U.S. securities laws to be informed of the thefts, which a judge might construe as a “material” fact that should have been disclosed, Nicholas said.

John Roper, a spokesman for Houston-based ConocoPhillips; Lee Warren, a Marathon Oil spokeswoman at its Houston headquarters, and Alan Jeffers, a spokesman for Irving, Texas- based Exxon, said in e-mail messages that their companies don’t comment on security-related issues. David Nicholas, a spokesman for London-based BP, and Kim Blomley, a spokesman in London for Shell, which is based in The Hague, declined to comment.

Jenny Shearer, an FBI spokeswoman in Washington, said she couldn’t comment on whether the agency was investigating the attacks. Laura Sweeney, a Justice Department spokeswoman, said the department can’t comment on a possible investigation.
Hacker Activists

Some aspects of the attacks were disclosed in internal e- mails made public after a February security breach at HBGary. The e-mails were stolen from HBGary’s computer network by the group of hacker activists called Anonymous, which posted them on the Internet.

“I’ve been able to confirm that the same attackers are conducting coordinated IP thefts against Baker Hughes and Shell Oil, going after bid data and operational reporting, as well as projects/plans and related financial information,” according to an e-mail written on Jan. 13 by an independent security consultant working on the cases.

“I reached out to some friends at Conoco and Exxon and they also experienced similar breaches,” the consultant wrote in the e-mail. “This is of course client confidential,” he added under the subject line “coordinated Chinese attacks on oil companies.”

In a separate e-mail, an HBGary investigator discussed the analysis of malware designed to steal data in the computers of a drilling rig working on a ConocoPhillips project.

Marc Zwillinger, an attorney representing HBGary, declined to comment on the e-mails’ content.
‘Stolen E-Mails’

“Those are stolen e-mails and they contain confidential information relating to clients,” Zwillinger said.

The McAfee report, which cites several attacks connected to the Chinese hacking underground, doesn’t link the “Night Dragon” attack directly to the Chinese government.

Analysts who assessed the attacks on energy companies said the source of the breaches was easier to pinpoint than in previous hits by Chinese hackers, including an attack against Google Inc. that that company disclosed in January 2010.

The hackers used tools prevalent in China’s underground hacking forums, the McAfee report said, and they appeared to work from 9 a.m. to 5 p.m., Beijing time. McAfee traced the hackers’ command-and-control operations to servers operated by a company in China’s Heze City in Shandong province.

The owner of the company, Song Zhiyue, said he wasn’t aware of any hacking taking place from his servers and that he always seeks to verify the activities of customers who rent server space from him.

“There are so many servers in the world,” Song said. “This has nothing to do with me. This is very unfair.”

To contact the reporter on this story: Michael Riley in Washington at michaelriley@bloomberg.net

To contact the editor responsible for this story: John Pickering at jpickering@bloomberg.net

Exxon, Shell, BP Said to Have Been Hacked Through Chinese Internet Servers - Bloomberg
 
.
Chinese hackers? There is no evidence!
Indian Hackers is very powerful.
 
.
The hackers used tools prevalent in China’s underground hacking forums, the McAfee report said, and they appeared to work from 9 a.m. to 5 p.m., Beijing time. McAfee traced the hackers’ command-and-control operations to servers operated by a company in China’s Heze City in Shandong province.
 
.
As for hackers there is no one from China but only internet intruders who got nothing useful as in 1962.
I know this from Harrison Ford starring movie Fire Wall.
 
.
The hackers used tools prevalent in China’s underground hacking forums, the McAfee report said, and they appeared to work from 9 a.m. to 5 p.m., Beijing time. McAfee traced the hackers’ command-and-control operations to servers operated by a company in China’s Heze City in Shandong province.

Insufficient evidence.
Hackers can use a proxy server.
 
.
The hackers used tools prevalent in China’s underground hacking forums, the McAfee report said, and they appeared to work from 9 a.m. to 5 p.m., Beijing time. McAfee traced the hackers’ command-and-control operations to servers operated by a company in China’s Heze City in Shandong province.
They do it as a work or do it for private matter during working time ?
 
. .
Then,west shouldn't cry....
U start ur own cyber army,Build a better firewall and start breaking into chineese servers...
Tit for Tat
Problem solved

---------- Post added at 06:07 PM ---------- Previous post was at 06:07 PM ----------

Then,west shouldn't cry....
U start ur own cyber army,Build a better firewall and start breaking into chineese servers...
Tit for Tat
Problem solved
 
.
Chinese hackers targeted Morgan Stanley in 2009

Investment bank 'hit hard' by six-month strong attack on its network, within weeks of attack on Google



Morgan Stanley suffered a "very sensitive" break-in by the Chinese computer hackers who attacked Google last year, according to leaked emails from an internet security firm working for the investment bank.

The emails, which were sent by California-based HB Gary Federal, detail how Morgan Stanley was "hit hard" by a six-month strong attack on its network in June 2009 – within weeks of the attack on Google by Chinese hackers.

George Kurtz, chief technology officer for security firm McAfee which investigated the so-called "Operation Aurora" attacks, described it as the "largest and most sophisticated cyberattack we have seen in years".

An email sent by Phil Wallisch, a senior security engineer at HB Gary Federal, which provided internet security for Morgan Stanley, said: "They [Morgan Stanley] were hit hard by the real Aurora attacks (not the crap in the news).

"They have given me access to a very sensitive report on their Aurora experience," Wallisch said in an email to a colleague in May last year. "I will honor their wishes about not sharing the info with anyone, but the good news is that I have some great ideas for our final reports."

The HB Gary Federal emails were made public in the wake of an attack by online collective Anonymous. The emails did not reveal what information may have been stolen from Morgan Stanley.

Morgan Stanley declined on Monday to comment specifically on the Operation Aurora attack. A spokeswoman said: "Morgan Stanley invests significantly in IT security and manages a robust programme to deal with malware and attempted computer compromises."

A senior member of China's communist politburo organised the hack into Google, according to leaked classified information sent by US diplomats in China to Hillary Clinton's state department, revealed by WikiLeaks.

Google made public the "highly sophisticated and targeted attack" last January, shortly before the hackers shut down their operation. The attack, which involved "more than 20 other US companies", was partly aimed at the Gmail accounts of "Chinese human rights activists".

Classified diplomatic cables sent by the US embassy in Beijing, and released by WikiLeaks in December, alleged that a leading Chinese politician had "coordinated" the assault on Google, which the Americans claimed was "100% political in nature".

The attack caused Google to abandon mainland China and sparked a global diplomatic row about internet censorship.

Hillary Clinton, the US secretary of state, renewed her calls for China and other countries to adopt common standards for internet use, which includes removing barriers to access.

• Booby-trapped adverts hit visitors to the London Stock Exchange (LSE) website on Monday. The ads, which the LSE said were provided by a third party, caused some users' computers to crash – with one victim claiming his machine became unusable after landing on the site. The LSE site has been involuntarily hosting computer viruses on around 363 pages in the last 90 days, according to an analysis by Google.

Chinese hackers targeted Morgan Stanley in 2009 | Technology | guardian.co.uk
 
. .
Computers in my office were once hacked too, apparently by Chinese. After investigation it was found that they were Russian hackers, using proxy servers. Don't know how they found that out, but thats what i heard.
 
.
Complaining you get hacked is like complaining your girlfriend is too easy. Both get little sympathy.
 
. .
Complaining you get hacked is like complaining your girlfriend is too easy. Both get little sympathy.

Don't agree with that, hacking is unethical.

Your logic sounds similar to, If you wear skimpy clothes, expect to get raped.
 
. .

Country Latest Posts

Back
Top Bottom