China's Defense Ministry calls accusations of state-sponsored hacking groundless
China's Defense Ministry points to flaws in claims that the nation's military supports cyberespionage
IDG News Service - China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence.
The ministry made the statement after U.S. security firm Mandiant released a 74-page report documenting evidence, including IP addresses, that traced a large number of international cyberattacks to what it claims is likely to be a unit of China's People's Liberation Army based in Shanghai. The so-called "Unit 61398" has stolen data, such as intellectual property, from at least 141 companies since 2006, it said.
China's Defense Ministry, however, said in a statement online that Mandiant's claims were groundless. It added that the report made its conclusion by only relying on IP addresses to trace the cyberattacks to China.
"As we all know, hacking attacks occur almost everyday by using stolen IP addresses. This is a common practice and is a matter of common sense," the ministry said. "Secondly, there still is no standard definition for 'cyber attack', and the report's claim that the daily gathering of online information construes as cyber espionage lacks a legal basis."
The ministry further added that cyber attacks are both transnational and occur anonymously, making them hard to pinpoint. "China is one the major victims of cyber attacks," it said. "According to the IP addresses found, a considerable number of the attacks come from the U.S., but we have not blamed the U.S. side for this."
In the past, Chinese authorities have consistently denied supporting cyberattacks, despite mounting reports of sophisticated hacking coming from the nation that has shut down activist sites and allegedly breached systems from companies including Google.
Mandiant's report said it was "highly unlikely" the Chinese government was unaware of the hacking attacks, and was possibly supporting the cyberespionage.
Security expert Jeffrey Carr cast doubt on the conclusions of the Mandiant report. "My problem is that Mandiant refuses to consider what everyone that I know in the Intelligence Community acknowledges -- that there are multiple states engaging in this activity; not just China," he said in a blog post.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts