Friday, February 22, 2013

What Are Chinese Hackers Looking for in Cyber Attacks?

This transcript is automatically generated

To the Chinese and a stunning breadth of attacks you could darn near time do one every minute.

-- -- and -- corporation on many of the folks behind.

This unsettling bit of defense pressing news that has the white house on guard and curious media now on the attack.

-- first thought that China is denying being behind any of us how sure -- you that their line.

When there were very confident you know it's nice when you've got a lot of evidence you don't need to we're about a lot of hand waving in the propaganda that's being spewed.

I would -- right back to report the report re released yesterday.

Is extremely detailed -- we've been signs exclusive research we lay out.

A 141 different organizations that this group which we call a PT one or advanced persistent threat one is attacked.

-- weaving gets 3000 digital indicator signatures that we encourage other researchers to take and look at themselves so.

Despite China's you know yelling and it -- to the contrary your creditors didn't happen we just went right back -- the facts every time.

All right now we showed cases of attacks in general that have been in the news not all -- inspired or China led.

But enough up from decided that it leads me to this question how to -- Do you get in defense contractors computers because I would imagine.

They have a couple of more fire walls are a couple of better firewalls what happen.

He -- they -- make it look easy don't they the fact is it's actually not about fire -- have the best fire -- in the world.

But when it comes down to the weakest link in any organization -- a human being and that's that we see time and time again.

This group which we tied back to Chinese PL a unit 61398.

These guys are really masters not just a computer hacking but it social engineering the art of engineering human beings so you'll see them crap he's really.

Really elaborate very well thought out spear Phishing emails that look like they come from a pier and another organization or from your buddy that you know from the -- And the -- that he nobody you know opening attachments so you on the inside the organization are -- work for them.

All right so obviously warnings must go out to defense contractor workers that if you're getting in the email that appears to be coming from a colleague or -- source or friend or what have you.

You don't open -- at the very least -- that kinda freezes them and you know of the itself compromises.

Our defense and -- -- -- yet you can't be too careful with these kinds of things and what we we say again and again is no organization is immune to these kinds of tax because a bottom line is.

We all have human beings a worker organizations that are susceptible to -- -- this types of emails.

But I think the bigger key here is -- the open that email or not were up against a very determined very well financed well resource adversary.

So if you don't -- -- nearly gonna find another way and so they did they have great odds of -- of Maria just have already dead -- they jump in they get it let's say of Getty museum on working at.

General dynamics what have you and I I just respond do -- and now I'd given them access to.

My company right but what are getting what are they going through what are they combing.

So they're looking for specific intellectual property would -- they're tasked by the PLA so they're not just browsing around looking at pictures of the -- you had last fourth of July.

They're in there to find specific blueprints chemical formulas.

-- emails from executives talked about -- big acquisition you're about to do in Shanghai.

Becoming a specific tasking and -- given that toehold in the quickly pivot puts -- that's actually emailed back and forth.

Anyway with the defense establishments and isn't the better part of -- right in this crazy world.

That the -- other venues for which these high tech companies exchange information.

Sure it doesn't have to be in the Melvin Iraq -- open that email they can quickly pivot into your life if you file systems together in your computer but what's worse -- -- the entire organizations flat network and they can use to go anywhere they want to once again.

Scary stuff what do you think of their response that -- dog owning up have been edited it out they've been cut.

Caught -- but they're more -- saying we don't care.

-- they do -- I should say that we don't have a political dog in this fight we do this because that's what's led to do you know -- like to find in eradicate evil computer networks.

But you know that said we would would keep pointing back to the evidence its interest in China says these accusations are baseless -- professional.

We provide amount of evidence that points back to one particular neighborhood in Shanghai.

And it gets really answer the specific.

Allegations they feel that they don't have to that's right -- thank you.

That is tragic stuff you brits -- stuff all right.

Source: http://video.foxbusiness.com/v/2178907397001/what-are-chinese-hackers-looking-for-in-cyber-attacks/

Venezuela Elections Skyfall Chicago Marathon 2012 texas rangers steve jobs meningitis bobby valentine

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.