Never miss a story

Get subscribed to our newsletter


×
A building alleged to house a Chinese military-led hacking group is shown in Shanghai in a file photo. RFA

Hackers based in China have targeted at least 27 universities in the United States in search of maritime military secrets, security research firm iDefense has found as part of ongoing research.

According to a threat report by iDefense, the security research arm of Accenture, Chinese hacking groups have targeted 27 U.S. universities, and the number may rise as their research continues.


The hackers use spear phishing, meaning that they pose as partner universities to the target.

If the e-mails are opened, they unleash malware that allows hackers based in China to access stored research, iDefense reported.

The Massachusetts Institute of Technology (MIT) was among the targets, which also included the University of Washington, it said.

The Wall Street Journal reported that Penn State and Duke University were also targeted. One can also use firewall tester online to be secured at their part.

All of the targets had researchers working on submarine technology or related fields, including oceanography.


The hackers use spear phishing, meaning that they pose as partner universities to the target. Pixabay

iDefense said the hackers are likely affiliated with a group known as MUDCARP, and also referred to as TEMP.PERISCOPE, Periscope and Leviathan.

“Collection requirements appear to include several very specific submarine technologies produced by multiple cleared defence contractors (and their respective supply chains),” iDefense’s report said.

“Any technology or program that involves the delivery or launching of a payload from a submerged submarine, or undersea autonomous vehicles, is of high interest to MUDCARP,” it said.

State backing

The report comes after a March 4 report by FireEye, where researchers looking into the activities of MUDCARP, which it names APT40 (advanced persistent threat) were fairly confident that it had Chinese state backing.

It said the group targets organizations operating in Southeast Asia, especially relating to recent elections there, or linked to the South China Sea disputes and other actors who could affect the Chinese Communist Party’s Belt and Road infrastructure development plan, the FireEye report said.

“APT40 uses a variety of malware and tools to establish a foothold, many of which are either publicly available or used by other threat groups,” it said. “APT40 will often target VPN and remote desktop credentials to establish a foothold in a targeted environment.”


If the e-mails are opened, they unleash malware that allows hackers based in China to access stored research, iDefense reported. Pixabay

Once the foothold is established, APT40 “uses a mix of custom and publicly available … tools to escalate privileges,” it said, including online dumps of leaked user data.

Naval development

Chieh Chung, a research fellow at the National Policy Foundation on the democratic island of Taiwan, said China’s People’s Liberation Army (PLA) has been putting huge resources into to developing its navy in recent years.

“[Information about] the Yellow Sea, the East China Sea, and the hydrological environment associated with the South China Sea are very important for maritime operations, especially for submarines,” Chieh told RFA.

“If [they] use such methods to collect data stored in other countries over a long period of time, they will succeed in filling the gaps in their own data pretty quickly,” he said.

“Much of this information, especially seabed topography, seawater salinity changes, and so on, are deemed classified by many countries.”

Chieh said it wouldn’t always be obvious to victims that they are being “phished,” because e-mails could be sent by researchers in the same field, while attachments could be articles or reports on hydrology.

“They may even pretend to be a sender with whom [the target] has a real-life connection, and trick them into opening the e-mail that way,” he said.


iDefense said the hackers are likely affiliated with a group known as MUDCARP, and also referred to as TEMP.PERISCOPE, Periscope and Leviathan. Pixabay

Habits, awareness

Lin Ying-yu of Taiwan’s Chungcheng University said the key to preventing cyberattacks still resides with people, rather than defensive software.

“The focus is on users’ habits and awareness of information security,” Lin said. “All students and employees need to know that this threat exists.”

He said cyber attacks originating in China have shown a resurgence in recent years after a relatively quiet period.

Chinese rights activist and tech expert Pu Fei said the only effective way to prevent such attacks is through “air gaps”: physical barriers between classified material and the internet.

ALSO READ: “They Don’t Make Prayerful Offerings When They Harvest,” Story Of The Native American Church

“There is no such thing as a firewall that is 100 percent effective,” Pu said. “I still think that the best method is to cut computers that need top-level security off physically.”

“They shouldn’t be connected to the internet, or to any internal network,” he said. “That is a pretty safe way to go.” (RFA)


Popular

Wikimedia Commons

Amitabh Bachchan, during his speech to the crowd of over 80,000 people at the Reliance Industries' annual event, said that the legacy left by Dhirubhai has had a positive impact on millions of people's lives worldwide.

Amitabh Bachchan is adored by the public for his unforgettable on-screen performances as well as his magnetic demeanour. Not only do fans love Amitabh Bachchan's outstanding performance, but the actor's heartwarming words are also highly regarded. A much moved Amitabh Bachchan, during his speech to the crowd of over 80,000 people at the Reliance Industries' annual event, said that the legacy left by Dhirubhai has had a positive impact on millions of people's lives worldwide.

When Bollywood superstar Amitabh Bachchan became bankrupt in the late 1990s, Dhirubhai Ambani stepped forward to give him financial assistance. In his speech, Bachchan remembered that Dhirubhai had sent Anil Ambani to offer him financial assistance during the crisis, which he had respectfully declined. Lenders began knocking on his door, losses mounted, and his bank account dwindled to nothing. He said, "Dhirubhai's money might have gotten me out of the problem quickly. However, I respectfully declined his offer and gradually began to find work again, which let me pay off my debt."

Keep Reading Show less
Photo by Xavier Mouton Photographie on Unsplash

Irrespective of the age of your child, it is vital for parents to offer that extra support and assistance following an unsettling event.

In comparison to adults, children are prone to getting traumatized by troubling events easily, and this makes it important for parents to help their children when the times are tough. It could be a brutal accident, an unprecedented pandemic, a violent crime, or other disasters but with the right parental support, children have a higher chance of coming out stronger from an awful situation.

Anuja Kapur, Psychologist shares few tips wherein you can assist your child when tough times comes calling:

Every child responds differently to disturbing events:
What children feel about a current disaster in their life and how they react to it can come and go in waves. Children can act moody and withdrawn at times, struck with sorrow and fear at other times. There's no absolute "right" or "wrong" way to feel after a traumatic event so make sure not to dictate what your child or how your child should feel and react to the event.

a boy crying tears for his loss Children can act moody and withdrawn at times, struck with sorrow and fear at other times. | Photo by Kat J on Unsplash

Keep Reading Show less
Photo by Andreas Haslinger on Unsplash

European consumers will be able to use a single charger for all their portable electronics - an important step to increase convenience and reduce waste.

The European Commission, the executive arm of the European Union (EU), has announced plans for smartphone and other electronics manufacturers to fit a common USB-C charging port on their devices in an effort to reduce waste. In addition to phones, the rules will apply to other devices like tablets, headphones, portable speakers, videogame consoles, and cameras, reports The Verge. The decision will have a huge impact on Apple, as the company still uses its own Lightning connector to charge iPhones. The proposals only cover devices using wired, not wireless and a USB-C port is only mandatory for devices that charge using a cable.

Different charging cables "Chargers power all our most essential electronic devices | Photo by Solen Feyissa on Unsplash

Keep reading... Show less