周三,微软公司首先确认了这一黑客行动,并得到了美国、英国和其他盟国有关当局的证实。
微软提到,据报道,这个名为“伏特台风”的黑客组织入侵了关岛和美国的政府、制造、通信和IT组织,这是西太平洋的一个重要军事哨所。
尽管大多数黑客受害者的身份仍然未知,但美国海军部长卡洛斯·德尔·托罗(Carlos Del Toro)周四告诉CNBC,海军受到了入侵的影响。
泄露的程度目前还不清楚。美国海军发言人拒绝谈论他们的“网络”状况。
与此同时,美国国家安全局网络安全部主任周四告诉CNN,来自中国的黑客仍然可以访问他们已经聚焦的最敏感的美国网络。乔伊斯进一步解释说,这些入侵在范围和规模上都表现得非常厚颜***。
美国国家安全局的一名代表拒绝置评,而是引用了美国国家安全局和其他美国机构就中国黑客网络发布的一份新闻稿。
微软表示,它有“适度的信心”,这些违规行为是为了在未来发生危机时中断通信。
该公司披露这一消息之际,人们越来越担心中国可能会采取军事行动,以实现对自治的台湾岛的主权要求。
美国国家安全局的行动总监在8月在该间谍机构工作了39年后退休,他表示,这次行动符合一种众所周知的渗透网络的方式,即访问那些处于边缘的网络,而不是他所说的“靶心”,然后若干年都不被发现。
Darby说,有趣的是,黑客只是从家庭路由器进入美国海军的基础设施,他不熟悉这起案件的细节。
他解释说,可怕的是,当事情开始发生时,它们可能会引发破坏性或破坏性的攻击。如果他们在这些网络中,他们很容易造成严重破坏。你必须识别并堵住允许他们进入网络的漏洞,然后根除它们。
美国国家安全局与遍布英国、澳大利亚、加拿大和新西兰的情报机构合作,分享了有关黑客的更多细节。这些国家是一个主要情报联盟的成员,该联盟被称为“五眼联盟”(Five Eyes),其中包括共享网络安全信息。
然而,中国否认了各种黑客指控。
中国外交部发言人毛宁指出,这份极不专业的报告证据链断裂,是拼凑而成的。
显然,这是美国为了满足其地缘政治议程,通过“五眼联盟”引入的一场集体造谣活动。众所周知,“五眼”是世界上最大的情报组织,美国国家安全局是世界上最大的黑客组织。
早些时候,美国指责中国黑客组织从事间谍活动和窃取知识产权,包括2015年对美国人事管理局(Office of Personnel Management)的意外数据泄露和2017年对Equifax的黑客攻击。
2014年,参议院的一个小组发现,与中国政府有关联的黑客访问了军事承包商的数据,包括航空公司和科技巨头的数据。
目前尚不清楚,为什么微软、美国及其盟友决定把这个黑客网络放在聚光灯下,尤其是在本周。谷歌(Google)子公司Mandiant Intelligence的首席分析师约翰·胡尔特奎斯特(John Hultquist)说,其中一个原因可能是,在***可能与中国大陆发生冲突之前,让***公司抢先一步防御这群中国黑客。
保护关键基础设施免受重大和破坏性网络攻击的责任落在***部门身上。他们应该保护网络,Hultquist提到。
这就是为什么让他们掌握情报是如此重要的原因。如果不这样做,它就是徒劳的。
有关这些攻击的细节分享了对中国黑客可能的破坏努力的罕见见解,中国黑客窃取知识产权和间谍活动的能力是众所周知的。相比之下,网络安全专家记录了俄罗斯对关键基础设施的攻击,包括对乌克兰电网的黑客攻击,这也是有案可查的。
Krebs Stamos Group的顾问Dakota Cary表示,该黑客组织已经存在很长时间了。
当他们跨过一条线去获取有军事价值的东西时,就会被改变。
英文原文
The hacking mission was first identified on Wednesday by Microsoft Corp. and confirmed by relevant authorities in the US, the UK, and other allied nations.
Microsoft mentioned that the hacking group, named the Volt Typhoon, had reportedly breached government, manufacturing, communications, and IT organizations in Guam and the US, a critical military post in the western Pacific Ocean.
While the identities of most of the hacking victims remain unknown, the Secretary of the US Navy, Carlos Del Toro, on Thursday, informed CNBC that the Navy had been impacted by the intrusions.
The extent of the breach was not known right away. A spokesperson for the US Navy refused to talk about the status of their “networks.”
In the meantime, the director of the cybersecurity department at the National Security Agency, informed CNN on Thursday that the hackers from China could still have access to the most sensitive US networks that they’ve already targeted. Joyce explained further that the intrusions stood out in how brazen they were in both — scope and scale.
An NSA representative declined to comment and referred instead to a release published by the NSA and other US-based agencies on the Chinese hacking network.
Microsoft stated that it had “moderate confidence” and that the breaches were conducted to upend communications in the event of a future crisis.
The firm’s disclosure came amid rising concerns that China may take military action to enable its claim for the self-ruled island of Taiwan.
The NSA’s director of operations until his retirement, after spending 39 years at the spy agency in August, said that the operation had matched a well-known way of infiltrating networks by accessing those at the edges rather than at what he referred to as the bulls-eye and then being undetected for several years.
The interesting bit is that the hackers got in from just home routers into the US Navy’s infrastructure, said Darby, who is unfamiliar with the details of this case.
The scary part is that they could introduce destructive or disruptive attacks when things start hitting the fan, he explained. If they are in these networks, they can easily wreak havoc. You have to identify and plug the vulnerabilities that permitted them to get into the networks and then eradicate them.
The NSA, in collaboration with intelligence agencies spread across the UK, Australia, Canada, and New Zealand shared further details on the hackers. Those nations are part of a chief intelligence alliance, which includes sharing of cybersecurity information, referred to as the Five Eyes.
China has, however, denied all kinds of hacking accusations.
The highly unprofessional report — a patchwork with a broken chain of evidence, has been observed by China’s Foreign Ministry Spokesperson Mao Ning.
Apparently, this was a collective disinformation campaign introduced by the US via the Five Eyes to satisfy its geopolitical agenda. It is well-known that Five Eyes is the largest intelligence association in the world, and the NSA is the biggest hacking group in the world.
The US has earlier accused the Chinese hacking group of espionage and theft of intellectual property, including an unforeseen data breach of the Office of Personnel Management (2015) and a hack of Equifax (2017).
In 2014, a Senate panel discovered that Chinese government-affiliated hackers had accessed the data of military contractors, including that of airlines and tech majors.
It is not yet clear why Microsoft, the US, and its allies decided on shining a spotlight on the hacking network, particularly this week. A reason may be to offer private firms a head start on defending from this group of Chinese hackers way before a possible conflict over Taiwan with China, mentioned John Hultquist, the chief analyst associated with Mandiant Intelligence, which is a subsidiary of Google.
The burden of safeguarding critical infrastructure from major and disruptive cyberattacks lies with the private sector. They ought to defend the networks, Hultquist mentioned.
That is why it is so essential that intelligence makes its way into their hands. If it does not, it is futile.
Details regarding the alleged attacks share rare insights into the probable sabotage efforts by Chinese hackers, whose theft of intellectual property and espionage capabilities are quite well-known. By contrast, cybersecurity specialists have documented Russia’s attacks on crucial infrastructure, including the hacking of the power grid in Ukraine, which is also well documented.
A consultant at the Krebs Stamos Group, Dakota Cary said that the hacking organization has been around for a long time.
When they stepped over a line to get something of military operational value, that is when it got altered.
免责申明:本文仅代表作者观点,不代表中国海员之家立场。其真实性及原创性未能得到中国海员之家证实,在此感谢原作者的辛苦创作,如转载涉及版权等问题,请作者与我们联系,我们将在第一时间处理,谢谢!联系邮箱:cnisu@54seaman.com
评论 (0人参与)