🥇 First rule of investing? Know when to save! Up to 55% off InvestingPro before BLACK FRIDAYCLAIM SALE

Chinese hacked U.S. military contractors: Senate panel

Published 09/18/2014, 07:08 AM
© Reuters Illustration file picture shows a man typing on a computer keyboard in Warsaw
CYH
-

By Ros Krasny

WASHINGTON (Reuters) - Hackers associated with the Chinese government have repeatedly infiltrated the computer systems of U.S. airlines, technology companies and other contractors involved in the movement of U.S. troops and military equipment, a U.S. Senate panel has found.

The Senate Armed Services Committee's year-long probe, concluded in March but made public on Wednesday, found the military's U.S. Transportation Command, or Transcom, was aware of only two out of at least 20 such cyber intrusions within a single year.

The investigation also found gaps in reporting requirements and a lack of information sharing among U.S. government entities. That in turn left the U.S. military largely unaware of computer compromises of its contractors.

"These peacetime intrusions into the networks of key defense contractors are more evidence of China's aggressive actions in cyberspace," Democratic Senator Carl Levin of Michigan, the committee's chairman, said in releasing the report.

Officials with the Chinese Embassy in Washington did not immediately comment.

Cybersecurity expert Dmitri Alperovitch, chief technology officer with the security firm Crowdstrike, said China had for years shown a keen interest in th the logistical patterns of the U.S. military.

The investigation focused on the U.S. military's ability to seamlessly tap civilian air, shipping and other transportation assets for tasks including troop deployments and the timely arrival of supplies from food to ammunition to fuel.

Those companies typically do not have the level of defense against hackers as major weapons makers or the military itself.

"The military uses secret or top-secret networks that are not on the Internet, but private companies do not," said Alperovitch. "That's a real challenge."

The FBI said in a statement that it "continues to aggressively investigate cyber intrusions emanating from state-sponsored actors and other criminals.

"We remain committed to working with our interagency partners to identify threats, protect the nation's infrastructure from potential harm, and hold accountable those groups and individuals that pose a threat in cyberspace," the statement added.

In a 12-month period beginning June 1, 2012, there were about 50 intrusions or other cyber events into the computer networks of Transcom contractors, the 52-page report stated.

At least 20 of those were successful intrusions attributed to an "advanced persistent threat," a term used to designate sophisticated threats commonly associated with attacks against governments. All of those intrusions were attributed to China.

Senator Jim Inhofe of Oklahoma, the committee's top Republican, called for a "central clearinghouse" that makes it easy for contractors to report suspicious cyber activity.

"We must ensure that cyber intrusions cannot disrupt our mission readiness," Inhofe said.

The investigation found that a "Chinese military intrusion" into a Transcom contractor between 2008 and 2010 "compromised emails, documents, user passwords and computer code." In 2012, another intrusion was made into multiple systems of a commercial ship contracted by Transcom, the report said.

The Senate probe could further increase tensions between the two world powers over cyber spying.

In May U.S. authorities charged five Chinese military officers, accusing them of hacking into American nuclear, metal and solar companies to steal trade secrets.

© Reuters. Illustration file picture shows a man typing on a computer keyboard in Warsaw

Last month, Community Health Systems (N:CYH), one of the largest U.S. hospital groups, said Chinese hackers had stolen Social Security numbers and other personal data from some 4.5 million patients.

(Reporting by Ros Krasny; Additional reporting by Jim Finkle in Boston; Editing by Will Dunham, Chizu Nomiyama and Peter Cooney)

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.