Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US data breach is intelligence coup for China
By Rob Lever
Washington (AFP) June 13, 2015


Chinese hackers got US security files: report
Washington (AFP) June 13, 2015 - A data breach of millions of US government employees allowed Chinese hackers to access sensitive information including security clearances of the workers and contractors, the Washington Post said Friday.

The report said investigators are looking at two separate attacks, widely believed to be from China, accessing government employee records in a database at the Office of Personnel Management (OPM).

The database "is very sensitive and it has lots of interfaces to it," a US official told the newspaper on condition of anonymity.

The report, which called the breach "wider than first acknowledged," said the database could possibly contain files on some CIA employees.

"That's the open question -- whether it's going to hit CIA folks," a second official was quoted as saying. "It would be a huge deal. They could start unmasking identities."

The database contains personal information on employees including their financial histories, investment records, family data, contacts with foreigners and names of neighbors and friends, according to the report.

Earlier this week, a public employees union said the hackers obtained sensitive information on all federal employees.

Samuel Schumach, spokesman for the OPM, would not confirm if the hack originated in China.

An investigation that included the FBI found that "there was a high degree of confidence that OPM systems containing information related to the background investigations of current, former, and prospective federal government employees, and those for whom a federal background investigation was conducted, may have been exfiltrated," he said.

The OPM was still assessing how many people had been affected, he added.

The hacking of millions of US government employees is likely part of an effort by Chinese intelligence for long-term profiling -- and possibly more nefarious things.

Security analysts say considerable evidence points to China, and that the cyber-intrusion shows the long and patient efforts in Beijing to collect and compile data which may be useful in the future.

"It's normal for big intelligence agencies to create large biographic databases on their opponents," said James Lewis, a senior fellow at the Center for Strategic and International Studies, a Washington think tank.

Lewis said that while data on individuals may not seem significant on the surface, analysis of huge amounts of information can provide a strategic advantage.

"They get the same kinds of big data insights that companies use for targeted advertising," he told AFP.

Reports last week indicated some four million current or former government employees were hit, but a union letter said many more -- every federal employee, every federal retiree, and up to one million former federal employees -- could also have had personal data compromised.

These types of cyberattacks are troublesome because they involve stealth access that allows intruders to remain on computer networks for long periods of time, analysts say.

"It's the difference between a 'smash-and-grab' and a long-term persistent" operation, said Ryan Kazanciyan, chief security architect at Tanium, a California-based security firm.

"If you think about what you can do from the perspective of espionage instead of fraud, that data is incredibly valuable," Kazanciyan told AFP.

"If you want to target someone, this data can be used to conduct spearphishing, it can be used for blackmail."

Potentially, Kazanciyan said the database can be used to help determine the identities and locations of US undercover agents.

- Spy recruiting tool -

John Dickson, a former air force intelligence officer who is now a partner with the security firm Denim Group, said the database contains a trove of important information for a foreign intelligence service, including background checks from people with security clearances.

"This is valuable for an intelligence agency if they want to recruit someone" to spy, he said.

"It has to be a nation-state. Nobody else would be interested in this information."

An analysis of the incident by the Virginia-based security firm ThreatConnect backs the theory that China was behind the breach.

"The primary motivation we see is for espionage," ThreatConnect's Rich Barger said.

"This isn't a criminal act in which they would sell the information or steal identities. This helps understand the inner workings of the US government."

John Schindler, a former National Security Agency officer who is now a consultant, said the data is "the Holy Grail" from an intelligence perspective.

The hack "is unprecedented in its scope, offers our adversaries the opportunity to penetrate our government and use that information to deceive it at a strategic level," he said in a blog post.

- Health hack connection? -

The attack targeting the US Office of Personnel Management could be connected to other data breaches even though they may not seem similar on the surface, say analysts.

In recent months, breaches affecting tens of millions of Americans have been reported at health insurance firms such as Anthem and CareFirst, members of the Blue Cross Blue Shield Association -- which cover many federal government employees.

ThreatConnect said its analysis shows similar software and signatures in both the OPM incident and the health care breaches, suggesting these could be part of the same effort to compile intelligence data.

"We believe there is enough technical evidence to say there is an overlap" between the health care and government workforce data breaches, Barger said.

Anup Ghosh, founder and chief executive of the security firm Invincea, said the incidents suggest a long-term plan "building dossiers on targets of interest."

Combining the data in personnel records with detailed health information provides "very personal and private information," Ghosh said.

"This has people's vulnerabilities. It gives (foreign agents) leverage."

And because public disclosure of these breaches often takes time, Ghosh said he anticipates additional news about hacks affecting US government employees.

"I'm confident you will see more," he said.

Most of the breaches are the result of "spearphishing" using an email that appears to come from a legitimate person and gets the recipient to click on a link that enables the intrusion, Ghosh said.

He noted that the federal government is vulnerable because most defense software is "based on legacy technology from the 1990s" that fails to stop the attacks.

Some of the newer systems aim for real-time monitoring and containment when a network is breached.

"You can't stop people from clicking on links," he said.

"But you can put the malware in virtual containers in a disposable environment."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Union says hackers got sensitive data on all US govt staff
Washington (AFP) June 11, 2015
Suspected Chinese hackers who infiltrated the US government's human resources records have sensitive information on all federal employees, an American union said Thursday. In a letter to authorities, the American Federation of Government Employees said it believes hackers - who others have linked to China - obtained confidential identification numbers that each American needs to get a job, ... read more


CYBER WARS
Crashing comets may explain mysterious lunar swirls

Google Lunar X-Prize meets Yoda

China, Russia plan joint landing on the Moon

NASA's LRO Moves Closer to the Lunar Surface

CYBER WARS
Supersonic NASA parachute torn to pieces in latest test

Rover Ready for Solar Conjunction and Period of Curtailed Operations

NASA Spacecraft Detects Impact Glass on Surface of Mars

Building a Smarter Rover

CYBER WARS
XCOR Selects Matrix Composites to Develop Lynx Chines

Spacecraft glitch shifts orbiting ISS: Russia

NASA's LDSD Project Completes Second Experimental Test Flight

ESA astronaut Samantha Cristoforetti returning home

CYBER WARS
Electric thruster propels China's interstellar ambitions

China Plans First Ever Landing On The Lunar Far Side

China ranked 4th among world space powers

3D printer making Chinese space suit parts

CYBER WARS
Space station back on track after mystery Soyuz glitch

Russia aims for launch of next manned flight to ISS in July

Russian Space Agency Reschedules 6 Flights to ISS for 2015

Crewmembers From ISS to Return to Earth June 11

CYBER WARS
SpaceX achieves pad abort milestone approval for Commercial Crew

Airbus developing reusable space rocket launcher

Angara to launch first manned rocket from Vostochny in 2023

Recent Proton loss to push up launch costs warns manufacturer

CYBER WARS
Hubble in 'Oh Planet, What Art Thou?' 25th Anniversary Video

Astronomers discover a young solar system around a nearby star

Astronomers Discover a Young Solar System Around a Nearby Star

Circular orbits identified for small exoplanets

CYBER WARS
First US deep space weather satellite reaches final orbit

China launches space junk monitoring center

Researchers develop ultra-tough fiber that imitates the structure of spider silk

Turning paper industry waste into chemicals




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.