+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

'Human Weakness' Helped Chinese Hackers Steal Secrets From US Companies

Mar 20, 2013, 23:25 IST

Most of the espionage coming from these "sophisticated" Chinese hackers was actually victim activated.

Advertisement

A cyber security company released a report last month detailing the exploits of a state-sanctioned group of Chinese hackers. The hackers had been siphoning proprietary information from defense firms and private companies in the United States.

Despite the convoluted efforts to conceal their identities, and the complexity of their attacks, the majority of the hacker unit's operations depended on users clicking dubious email attachments, Jennifer Martinez of The Hill reports.

Martinez recently talked to the founder of Mandiant, the cyber security company whose report blew the lid off the Chinese hacking group known as APT1.

From The Hill:

Advertisement

The APT1 hackers were able to crack into American companies' computer networks and systems by targeting "human weakness," according to [Mandiant founder, Kevin Mandia]. They would send emails to a company's employees that appeared to be from someone they knew and the message would prompt those workers to click on a link or PDF file laced with malware. This would allow the hackers to get access to an employee's computer.

The method is called "spearfishing," and it baits email browsers into giving personal information, or in this case downloading command and control malware to their computers. One type of this software is called RAT, for Remotely Accessed Terminal (in some references, "Trojan" instead of "Terminal"), something IT sections of companies often use to troubleshoot employee computers.

We recently covered how oppressive regimes, like Egypt, Tunisia and Syria, as well as perverts called RATters, used RAT programs to conduct surveillance on unwitting victims.

Next Article