China denies its military hacked Pentagon network
Second time in two weeks China has had to answer claims it hacked another country's computers
Computerworld - China today denied allegations that its military hacked a Pentagon network in June -- the second time in as many weeks that the country has responded to charges of sponsoring computer attacks.
"Some people are making wild accusations against China and wantonly saying the Chinese military attacked the Pentagon's computer network," Jiang Yu, a foreign ministry spokeswoman said in Beijing, according to the state-controlled Xinhua news service. "These are totally groundless and also reflect a Cold War mentality," she added.
Jiang was responding to a story published by the Financial Times this weekend that quoted American officials who said the People's Liberation Army (PLA) was behind the June hack. One person familiar with the incident told the Financial Times that there was a "very high level of confidence... trending towards total certainty" that the PLA was responsible.
Other sources told the publication that Chinese hackers probed the Pentagon system for months before the attacks, which forced the U.S. to take the network offline for more than a week.
The Department of Defense downplayed the attack, but declined to point the finger at any one country or group. The attack on an unclassified e-mail network in the Office of the Secretary of Defense required that the systems be taken offline, spokesman Bryan Whitman acknowledged today, but backup networks kicked in. He would not confirm that China hackers were behind the assault, saying only that it's often difficult to pinpoint the origin of an intrusion into computer systems.
But the Pentagon did not stand idly by, he said. "Cyber or non-kinetic type threats to military computer networks are viewed as just as real and just as significant as physical or kinetic threats," Whitman said in a statement. "The department aggressively responds to deter all intrusions to defend what is known as the GIG, the global information grid."
Just a month before the attack, the Department of Defense had issued a report claiming that the PLA fields first-strike cyberwarfare units whose arsenals include computer viruses they might unleash on enemy networks.
When the Pentagon released its annual report on the state of China's military strength in late May, Jiang, the same foreign ministry spokeswoman who blasted the story today, took exception to its overall tone, although she didn't mention cyberwarfare specifically. The U.S., she said then, "continues to spread myth of the 'China Threat' by exaggerating China's military strength and expenses out of ulterior motives."
Last week, Angela Merkel, Germany's chancellor, raised the same issue during her visit to Beijing after the popular weekly Der Spiegel said systems at several government ministries, including Merkel's own office, had been infected with spyware planted by Chinese hackers.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts