IDG News Service - The official newspaper of China's ruling communist party dismissed security vendor McAfee's report that a state sponsored group was behind the massive cyberattack that penetrated 72 companies and organizations, calling the claims groundless.
The article written in the People's Daily on Friday is the closest official comment the Chinese government has issued about the reported hacking attacks, which spanned 14 countries and stole national secrets and sensitive business plans.
While McAfee's report did not name the group behind the cyber attack, security experts suspect it came from China, partly because of the organizations targeted. Some of the targeted groups included the International Olympic Committee, the World Anti-Doping Agency, the United Nations and companies in South Korea, U.S. and Taiwan.
The People's Daily article said, however, that the only evidence security experts had in suspecting China was because the targets were of interest to either Beijing or Moscow. The article also noted criticism that McAfee had released the report in order to sell more security products.
"Arbitrarily linking China and every hacking attack is irresponsible," the article said.
China has a record of being named the country of origin for several other high-profile hacking attacks. In June, Google said it had disrupted a phishing campaign coming from China that was designed to steal the e-mails of government officials, Chinese political activists and military personnel.
In February, McAfee had published another report that said a hacking attack originating from China that stole gigabytes of data from at least five oil, gas and petrochemical companies.
China, however, has previously denied taking part in any kind of hacking attacks. Chinese foreign ministry officials have said the country is firmly opposed to hacking and that the country has also been a victim of cyber attacks.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts