Taiwan 'testing ground' for China hacking

2013-07-19 08:35
(Duncan Alfreds, News24)

(Duncan Alfreds, News24)

Multimedia   ·   User Galleries   ·   News in Pictures Send us your pictures  ·  Send us your stories

kalahari.com

Taipei - Taiwan is the frontline in an emerging global battle for cyberspace, according to elite hackers in the island's IT industry, who say it has become a rehearsal area for the Chinese cyber attacks that have strained ties with the US.

The self-governing island, they say, has endured at least a decade of highly-targeted data-theft attacks that are then directed towards larger countries.

"We've seen everything," said Jim Liu, the 28-year-old founder of Lucent Sky, a Taiwanese internet security company specialising in resolving dangerous software vulnerabilities that hackers can exploit in order to gain access to a system.

"We'll see a specific attack signature here, and then six months later see the same signature in an attack on the States."

A Pentagon report in May accused China of trying to break into US defence computer networks. It followed another report in February by US computer security company Mandiant that said a secretive Chinese military unit was probably behind a series of hacking attacks that had stolen data from 100 US companies.

Cyber war

Beijing dismissed both reports as without foundation. But Taiwan experts say that hacking methods such as those outlined in the Mandiant report are the same kinds of security breaches that they had seen several years earlier.

Regarded by China as a renegade province it must recover, by force if necessary, it is easy to see why Taiwan might be an ideal target for Chinese hackers: It is close to the mainland, Mandarin-speaking and boasts advanced internet infrastructure.

This cyber war playing out across the narrow Taiwan Strait first came to public attention in 2003, when a Taiwanese police agency realised hackers had stolen personal data, including household registration information, from its computer system.

These attacks differed from traditional hacking attempts - where many casual hackers attempt to disrupt their targets' systems, these hackers went in stealthily, with the intention to plunder rather than destroy.

"Back then it was very rare to see these kinds of social network attacks," said hacking specialist Jeremy Chiu, a contract instructor in IT for Taiwan's intelligence agencies. "They were very, very well organised."

Other indicators, including the ease with which the hackers penetrated an e-mail system written entirely in Chinese, painted a picture of the culprits as a large, co-ordinated group of mainland Chinese hackers.

"One thing that indicates government support for these attacks is just the sheer volume - how many agencies are being attacked on a daily basis," said Benson Wu, postdoctoral researcher in information technology at Taiwanese think-tank Academia Sinica and co-founder of Xecure Lab, which focuses on responding to advanced persistent threats.

Source

Interviewed at his downtown Taipei office, Wu's set-up fits the classic hacker image: Dimly-lit, strewn with wires and humming with computers.

On a projector screen he displayed a list of e-mails, written in Chinese, with subject headings like "meeting notes", "dinner attendance" and "questionnaire".

"These are all hacking attempts," Wu explained. Once the documents have been opened, they plant a backdoor allowing the hacker virtually unfettered access to the network.

One such "spearphishing" attack was reportedly used on the White House in October. A Taiwan expert in cyber espionage estimated that thousands of Taiwanese high-level government employees receive as many as 20 to 30 of these e-mails a month.

"We've been following these Chinese hackers for so long, we can track their daily work schedule," said the expert, who asked not to be identified.

"People expect hackers to be night owls, but these guys work very normal hours - on Chinese national holidays, for example, we don't see any hacking activity at all."

Tracking the exact source of the attacks, however, remains a slippery game of internet sleuth.

"We take the IP address culled from the attack as a springboard, then track it through the internet - perhaps the same IP address was used in a forum registration, or to register a QQ handle," he said, referring to a popular Chinese chat program. "It depends how good they are at covering their tracks."

US surveillance

China denies being behind hacking attacks on other nations and insists it is a major victim of cyber attacks, including from the US - an argument that Beijing sees as strengthened by revelations last month from a former National Security Agency contractor, Edward Snowden, about top-secret US electronic surveillance programmes.

The US and China held talks focused on cyber issues last week.

According to internet platform Akamai, 27% of worldwide hacking activity during 2012 originated in China. The same report, however, also placed Taiwan among the top five digital attack originating countries in 2012.

"Taiwan is one of the key countries where we see a lot of activity," said Singapore-based malware researcher Chong Rong Hwa of network security firm FireEye.

A report issued by SecureWorks, a network safety arm of PC maker Dell, said Taiwan government ministries are swarming with a particularly malicious form of data-nabbing computer virus.

In one year, the Taiwan National Security Bureau encountered more than three million hacking attempts from China, according to statements given by bureau director Tsai Teh-sheng in March in response to questions from lawmakers.

Military and technology intelligence was included among the pilfered data. A representative from the bureau declined to comment when contacted.

"Taiwan will continue to be the battleground for lots of cyber attacks; it's like we are on our own," Wu said. "China has a huge pool of talent and technical resources."
Read more on:    cybercrime
NEXT ON NEWS24X
SHARE:

Read News24’s Comments Policy

24.com publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
0 comments
Add your comment
Comment 0 characters remaining
 

Inside News24

 
/Music
 

17 photo illusions that look so real

What if they aren’t illusions? What if that dog really has a human foot – then what?

 
 

For chic geeks...

It’s THIS easy for someone to steal your ATM pin!
Check out the speed of this robo-cheetah!
New GIF keyboard on iOS for added fun!
Puppy goes crazy over iPad game

Jobs in Cape Town [change area]

Property [change area]

Travel - Look, Book, Go!

Magical Massinga

Spend 5 nights at the gorgeous Massinga Beach Lodge in Mozambique and only pay for 4 from R13 220 per person sharing. Includes return flights, accommodation, transfers and romantic turndown. Book now!

Kalahari.com - shop online today

Pre-order your iPhone 6 at kalahari.com

Hurry and pre-order your own iPhone 6 now at SA’s favourite online store!

Bargain box – 60% off

Reduced prices, very limited stock. While stocks last. Hurry and shop now!

Mind blow low prices on electronics

Get either the Prestigio multiphone or Proline tablet 7” tablet for only R699. Offers valid while stocks last. Shop now!

30% off Barbie toys

Save 30% on all Barbie toys and accessories. Offer valid while stocks last. Shop now!

Baby extravanganza month at kalahari.com

Celebrate baby month with a wide range of awesome baby products. Offers valid while stocks last. Shop now.

OLX Free Classifieds [change area]

Samsung Galaxy s4

Mobile, Cell Phones in South Africa, Western Cape, Cape Town. Date October 24

Best bargain in big bay

Real Estate, Houses - Apartments for Sale in South Africa, Western Cape, Cape Town. Date October 25

VW Golf 6, 1.6 Trendline (Excellent condition)

Vehicles, Cars in South Africa, Western Cape, Cape Town. Date October 25

Horoscopes
Aquarius
Aquarius

There is a tendency to fight against the current today but this will just use up a lot of energy and not get you very far. You...read more

There are new stories on the homepage. Click here to see them.
 
English
Afrikaans
isiZulu

Hello 

Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.


Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire 24.com network.

Settings

Location Settings

News24 allows you to edit the display of certain components based on a location. If you wish to personalise the page based on your preferences, please select a location for each component and click "Submit" in order for the changes to take affect.








Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.