China's Defense Ministry calls accusations of state-sponsored hacking groundless
China's Defense Ministry points to flaws in claims that the nation's military supports cyberespionage
IDG News Service - China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence.
The ministry made the statement after U.S. security firm Mandiant released a 74-page report documenting evidence, including IP addresses, that traced a large number of international cyberattacks to what it claims is likely to be a unit of China's People's Liberation Army based in Shanghai. The so-called "Unit 61398" has stolen data, such as intellectual property, from at least 141 companies since 2006, it said.
China's Defense Ministry, however, said in a statement online that Mandiant's claims were groundless. It added that the report made its conclusion by only relying on IP addresses to trace the cyberattacks to China.
"As we all know, hacking attacks occur almost everyday by using stolen IP addresses. This is a common practice and is a matter of common sense," the ministry said. "Secondly, there still is no standard definition for 'cyber attack', and the report's claim that the daily gathering of online information construes as cyber espionage lacks a legal basis."
The ministry further added that cyber attacks are both transnational and occur anonymously, making them hard to pinpoint. "China is one the major victims of cyber attacks," it said. "According to the IP addresses found, a considerable number of the attacks come from the U.S., but we have not blamed the U.S. side for this."
In the past, Chinese authorities have consistently denied supporting cyberattacks, despite mounting reports of sophisticated hacking coming from the nation that has shut down activist sites and allegedly breached systems from companies including Google.
Mandiant's report said it was "highly unlikely" the Chinese government was unaware of the hacking attacks, and was possibly supporting the cyberespionage.
Security expert Jeffrey Carr cast doubt on the conclusions of the Mandiant report. "My problem is that Mandiant refuses to consider what everyone that I know in the Intelligence Community acknowledges -- that there are multiple states engaging in this activity; not just China," he said in a blog post.
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Manage Virtualized and Cloud Environments and the New Software-defined Data Center
- Analyst report by Enterprise Management Associates on the newly announced EMC Service Assurance Suite, and how well it addresses operational challenges and market...
- How Storage Resource Management Suite Meets Today's Storage Management Challenges
- This white paper outlines the common use cases Storage Resource Management Suite addresses including comprehensive monitoring, reporting, and analysis for heterogeneous block, file,...
- Sepaton DBeXstream Enhancements
- Silverton Consulting weighs in on why Sepaton is a compelling response to the data protection challenges inherent in today's large enterprise database environments...
- Sepaton Boosts Performance and Connectivity Options
- Read why Senior ESG analyst Jason Buffington and Research Analyst Monya Keane endorse the Sepaton S2100-ES3 Series 2925 data protection appliance (version 7.0)... All Government IT White Papers
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity.
- Content Analytics: Big Data Conquered, Customer Service Elevated
- For organizations looking to start a content analytics program or improve their existing capabilities, Aberdeen Group and IBM will lay out several recommendations... All Government IT Webcasts