‘State actor’ behind slew of cyber attacks

BOSTON, (Reuters) – Security experts have discovered  an unprecedented series of cyber attacks on the networks of 72  organizations globally, including the United Nations,  governments and corporations, over a five-year period.

Security company McAfee, which uncovered the intrusions,  said it believed there was one “state actor” behind the attacks  but declined to name it, though several other security experts  said the evidence points to China.

The long list of victims in the extended campaign include  the governments of the United States, Taiwan, India, South  Korea, Vietnam and Canada; the Association of Southeast Asian  Nations (ASEAN); the International Olympic Committee (IOC); the  World Anti-Doping Agency; and an array of companies, from  defense contractors to high-tech enterprises.

In the case of the United Nations, the hackers broke into  the computer system of its secretariat in Geneva in 2008, hid  there for nearly two years, and quietly combed through reams of  secret data, according to McAfee.

“Even we were surprised by the enormous diversity of the  victim organizations and were taken aback by the audacity of  the perpetrators,” McAfee’s vice president of threat research,  Dmitri Alperovitch, wrote in a 14-page report released on  Wednesday.

“What is happening to all this data … is still largely an  open question. However, if even a fraction of it is used to  build better competing products or beat a competitor at a key  negotiation (due to having stolen the other team’s playbook),  the loss represents a massive economic threat.”

McAfee learned of the extent of the hacking campaign in  March this year, when its researchers discovered logs of the  attacks while reviewing the contents of a “command and control”  server that they had discovered in 2009 as part of an  investigation into security breaches at defense companies.

It dubbed the attacks “Operation Shady RAT” and said the  earliest breaches date back to mid-2006, though there might  have been other intrusions. (RAT stands for “remote access  tool,” a type of software that hackers and security experts use  to access computer networks from afar).

Some of the attacks lasted just a month, but the longest —  on the Olympic Committee of an unidentified Asian nation —  went on and off for 28 months, according to McAfee.
“Companies and government agencies are getting raped and  pillaged every day. They are losing economic advantage and  national secrets to unscrupulous competitors,” Alperovitch told  Reuters.

“This is the biggest transfer of wealth in terms of  intellectual property in history,” he said. “The scale at which  this is occurring is really, really frightening.”
 CHINA CONNECTION?

Alperovitch said that McAfee had notified all 72 victims of  the attacks, which are under investigation by law enforcement  agencies around the world. He declined to give more details.

Jim Lewis, a cyber expert with the Center for Strategic and  International Studies, said it was very likely China was behind  the campaign because some of the targets had information that  would be of particular interest to Beijing.

The systems of the IOC and several national Olympic  Committees were breached before the 2008 Beijing Games. And  China views Taiwan as a renegade province, and political issues  between them remain contentious even as economic ties have  strengthened in recent years.