King, Crown Prince congratulate Jordan's monarch on Independence Day    Comoros Supports Saudi Arabia's Bid to Host World Expo 2030    flynas relaunches loyalty program 'nasmiles' with new incentives    CITC publishes public consultation on 'Network Neutrality Regulations Document'    Saudi Ports Record 24.28% Increase in Cargo Throughput Volumes During April    Red Sea Development Company Adds Three Globally Renowned Hotel Brands to its Luxury Portfolio    LuLu launches biggest mango showcase with 'Kingdom of Mangoes 2022'    Saudi, Syrian arrested after attempting to smuggle drugs    Saudi Ministry of Justice Launches Indicator for Financial Flow of Enforcement Applications on portal    China Stocks Gain on Economic Support Vows    Human Resources Ministry to employ 18,000 occupational health professionals    942 environmental violations detected since April    Deputy UN chief praises resilience of Bali students in face of disaster threats    North Korea fires missiles hours after Biden leaves Asia    Trump's man trounced in key Georgia primary    Indians are getting fatter – and it's a big problem    Flying reptile: Remains of scary prehistoric creature discovered    Premier League approves Chelsea sale to Boehly consortium    Al-Jadaan: Saudi Arabia will 'ultimately' consider cutting VAT    Prince Fahd lauds remarkable achievements of Tabuk University    Prince Abdulaziz congratulates Al-Shaibani on scaling Mount Everest    GCC Secretary-General Meets with Minister of State for Foreign Affairs of Bangladesh at Davos Forum    Saudi Physics Team Wins 3 Global Awards in 2022 European Olympiad    KSrelief Participates in High-Level Regional Meeting on Youth    SAMA Governor, CMA Chairman Express Gratitude to Saudi Leadership for Approving FinTech Strategy    Women's green futsal team wins bronze in Gulf Games    SFDA Warns against Jif Peanut Butter Products    DCO and WEF Launch Digital FDI Initiative to Boost Global Digital FDI Flows    Saudi Press: Saudi Arabia Exerts Exceptional Efforts to Achieve Security and Stability in Yemen    How Syrian singer Rasha Rizk dazzled millennials at Jeddah Season?    Shoura members propose equal blood money for men and women, Muslim and non-Muslim    Ithra Participates in Cannes Film Festival with New Films to Support Saudi Talents    Exclusive launching of Michael Schumacher Digital Experience at Jeddah F1 Grand Prix    Mbappé signs new 3-year PSG deal after rejecting Real Madrid    Saudi Aramco: London Championship to Witness Participation of World's Best Female Golfers    Saudi Arabia Heads to Cannes International Film Festival to Promote Country's Flourishing Industry and Support Emerging Talent on World Stage    President of SAFF Participates in AFC General Assembly Meeting    Saudi Athletes Achieve Great Victories in the 2nd Day of the GCC Games Tournament in Kuwait    Jazan Hosts West Asian Beach Soccer Championship    Bollywood actor's tweet reignited debate over Hindi as India's national language    SFDA Advises to Wash Dates Well Before Eating    SFDA Advises Against Mixing Surplus of Iftar and Suhoor with Different Foods or Surplus from Other Days    Ministry calls on imams to avoid long supplications in Tahajjud Prayer    Nothing wrong with a Muslim celebrating birthdays, says Saudi scholar    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    Pilgrims Perform Dhuhr and Asr Prayers at Arafat Holy Site    Council of Senior Scholars: Muslim Brothers' Group Don't Represent Method of Islam, rather only Follows its Partisan Objectives, Violating our Graceful Religion    Eid Al-Adha Prayer Performed at the Grand Holy Mosque    

Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.

Big US data breaches offer treasure trove for hackers
Published in The Saudi Gazette on 08 - 06 - 2015

WASHINGTON — A massive breach of US federal computer networks disclosed this week is the latest in a flood of attacks by suspected Chinese hackers aimed at grabbing personal data, industrial secrets and weapons plans from government and private computers.
The Obama administration on Thursday disclosed the breach of computer systems at the Office of Personnel Management and said the records of up to 4 million current and former federal employees may have been compromised.
US officials have said on condition of anonymity they believe the hackers are based in China, but Washington has not publicly blamed Beijing at a time when tensions are high over Chinese territorial claims in the South China Sea. China has denied involvement.
It was the second computer break-in in less than a year at the OPM, the federal government's personnel office.
The first breach has been linked to earlier thefts of personal data from millions of records at Anthem Inc, the second largest US health insurer, an attack also blamed on Chinese hackers, and Premera Blue Cross, a healthcare services provider.
Guidance Software, a cybersecurity firm, said the first signs of data “exfiltration” were originally detected with Einstein, a US government intrusion detection system. That activity, it said, was eventually traced back to a machine under the control of Chinese intelligence.
“It's a different form of Cold War at this point,” said Rob Eggebrecht, co-founder and chief executive of Denver-based InteliSecure, a private cybersecurity firm.
Eggebrecht said his firm had seen a spike in attacks on private company networks by Chinese actors over the past three months. The latest was a previously undisclosed breach at a US pharmaceutical group, which cost the firm hundreds of millions of dollars in sensitive research and development work.
Eggebrecht declined to identify the firm, which he said only learned of the major breach within the last 72 hours.
“We've seen a huge uptick in opportunistic exfiltration of high-value data,” he said, adding that the attack on the pharma company involved malicious software installed together with the Chinese-language search engine Baidu.
Admiral James Winnefeld, vice chairman of the Joint Chiefs of Staff, told a cyber conference at West Point military academy last month that US adversaries like China and Russia were rapidly increasing their assaults on military networks.
“We're hemorrhaging information at a dizzying rate, evidenced by the uncanny similarity of some of our potential adversaries' new platforms to those we've been developing,” said Winnefeld.
China has in recent years introduced two new stealth fighters that analysts say bear a striking resemblance to the F-22 and F-35 built by Lockheed Martin Corp. Lockheed redoubled security efforts focused on suppliers after a “significant and tenacious” attack on its computer networks in 2011 that was enabled by lax security at a supplier.
US senators have added $200 million in funding to their proposed fiscal 2016 budget to fund a detailed study of the cyber vulnerabilities of major weapons systems.
The move came after the Pentagon's chief weapons tester told Congress that nearly every major weapons program tested in 2014 showed “significant vulnerabilities” to cyber attack, including misconfigured and unpatched software.
US government officials and cyber analysts say Chinese hackers are using high-tech tactics to build massive databases that could be used for traditional espionage goals, such as recruiting spies, or gaining access to secure data on other networks.
The latest incident gives hackers access to a treasure trove of personal information, including birth dates, Social Security numbers, previous addresses, and security clearances.
All that data could help hackers identify information about specific targets, including potential passwords for websites that may be portals to information about weapons systems or other research data.
“They can dig down into that data and learn more about the individuals, what their hobbies are, what their vices are, what skeletons they have in their closet,” said Babak Pasdar, president and chief executive of Bat Blue Network, a cybersecurity firm.
He said he was involved in a recent case in which hackers gained access to private data of a website administrator by finding passwords on a public website linked to the person's hobby.
“This empowers the malevolent cyber actor to target a huge number of people with phishing and other schemes to reel in information,” said one US defense official. “The more targets you have, the more likely you are to score.” — Reuters

Clic here to read the story from its source.