OFFICIALS: China Hacked US Defense Contractors 20 Times In Just One Year
According to the report, investigators found roughly 50 "intrusions or other cyber events" in the network of US contractors working with US Transportation Command. At least 20 of those intrusions were successful, the committee said, and were attributed to "sophisticated threats commonly associated with governments." Of those 20 intrusions, TRANSCOM was reportedly only aware of two.
The investigation specifically found "Chinese military" hackers broke into the systems of a number of key institutions, including at least one ship. Once inside, the hackers gathered passwords, encryptions, and more.
Here are some of the specific incidents described in the report:
- A Chinese military intrusion into a TRANSCOM contractor between 2008 and 2010 that compromised emails, documents, user passwords and computer code.
- A 2010 intrusion by the Chinese military into the network of a CRAF contractor in which documents, flight details, credentials and passwords for encrypted email were stolen.
- A 2012 Chinese military intrusion into multiple systems onboard a commercial ship contracted by TRANSCOM.
Sen. Carl Levin (D-Michigan), the chair of the committee, released a statement calling the report "a warning that we must do much more" to protect the computer systems of defense contractors.
"These peacetime intrusions into the networks of key defense contractors are more evidence of China's aggressive actions in cyberspace," Levin said. "Our findings are a warning that we must do much more to protect strategically significant systems from attack and to share information about intrusions when they do occur."
Sen. Jim Inhofe (R-Oklahoma), the ranking Republican on the committee, further urged the creation of a "central clearinghouse" for contractors to detect and relay cyber attacks to higher military authorities.
"We must ensure that cyber intrusions cannot disrupt our mission readiness," Inhofe said. "It is essential that we put into place a central clearinghouse that makes it easy for critical contractors, particular those that are small businesses, to report suspicious cyber activity without adding a burden to their mission support operations."
- I'm an interior designer. Here are 10 things in your living room you should get rid of.
- A software engineer shares the résumé he's used since college that got him a $500,000 job at Meta — plus offers at TikTok and LinkedIn
- A 101-year-old woman keeps getting mistaken for a baby on flights and says it's because American Airlines' booking system can't handle her age
- The Role of AI in Journalism
- 10 incredible Indian destinations for family summer holidays in 2024
- 7 scenic Indian villages perfect for May escapes
- Paneer snacks you can prepare in 30 minutes
- Markets crash: Investors' wealth erodes by ₹2.25 lakh crore
- Nothing Phone (2a) blue edition launched
- JNK India IPO allotment date
- JioCinema New Plans
- Realme Narzo 70 Launched
- Apple Let Loose event
- Elon Musk Apology
- RIL cash flows
- Charlie Munger
- Feedbank IPO allotment
- Tata IPO allotment
- Most generous retirement plans
- Broadcom lays off
- Cibil Score vs Cibil Report
- Birla and Bajaj in top Richest
- Nestle Sept 2023 report
- India Equity Market