China denies role in hack of Japanese defense contractor
Charges that Chinese hackers attacked Mitsubishi are 'groundless,' says government spokesman
Computerworld - A Chinese government official today denied any involvement in the attack that compromised scores of servers belonging to Mitsubishi Heavy Industries, Japan's largest defense contractor.
According to press reports, Foreign Ministry spokesman Hong Lei dismissed suggestions that the attacks against Mitsubishi originated in China.
"The Chinese government has consistently opposed hacking attack activities. Relevant laws strictly prohibit this," Hong told reporters for Reuters, the Associated Press, and other outlets, during a regular press briefing Tuesday.
"Criticism that China initiated a cyberattack is not only groundless, it goes against development of international cooperation on cybersecurity," Hong said.
Hong's comments are nearly identical to those trotted out by the Chinese government whenever security experts speculate that attacks originate from the country.
The evidence of links to Chinese hackers are admittedly tenuous, relying on past accusations by others -- going back to the Aurora attacks that targeted Google and dozens of other Western corporations in late 2009 and early 2010 -- a proven history of hacking activity, and claims that Chinese-language scripts have been found in some of the malware that infected Mitsubishi's servers and PCs.
Yesterday, a U.S.-based spokesman for Mitsubishi confirmed that the company had uncovered a large-scale intrusion that had planted malware on 45 servers and an additional 38 individual PCs in several locations around Japan.
Servers at Mitsubishi's Kobe shipyards, where the company builds diesel-electric submarines and components for nuclear power plants; at the company's Nagasaki shipyards; and at its Nagoya plant, which designs and manufactures missile guidance systems, were among those compromised, the spokesman said.
The attacks were first detected in mid-August, said Mitsubishi, but the company did not go public until Japanese media revealed the intrusion. According to Japanese reports, the government was not informed by Mitsubishi of the attack before this weekend.
The spokesman declined to comment on the origin of the attacks.
Separately, however, Japan's National Police Agency (NPA) today circulated a warning of attacks against government websites based on chatter in Chinese forums.
Messages on those forums last week had called for cyber attacks on the 80th anniversary of the Sept. 18, 1931 "Mukden Incident," when the Japanese military staged an attack against a railroad in the Manchurian region of northern China. The incident was used as a pretext by Japan to invade and occupy Manchuria.
The NPA said that several Japanese government sites were targeted last week, and that the attacks made them difficult to access at times.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on
- Needed: Breach detection correction
- Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief
- Cyberattacks could paralyze U.S., former defense chief warns
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts