The Official Chinese 🇨🇳 Espionage & Cold War Thread

☑︎#VoteDemocrat

The Original
Bushed
WOAT
Supporter
Joined
Dec 9, 2012
Messages
302,255
Reputation
-34,066
Daps
611,791
Reppin
The Deep State
Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing

Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing
Dec. 11, 2018
Please disable your ad blocker.

Advertising helps fund Times journalism.

A Chinese ship near Los Angeles. On Tuesday, President Trump said the United States and China were having “very productive conversations” on trade.David McNew/Getty Images

12DC-USCHINA-articleLarge.jpg

A Chinese ship near Los Angeles. On Tuesday, President Trump said the United States and China were having “very productive conversations” on trade.David McNew/Getty Images
WASHINGTON — The cyberattack on the Marriott hotel chain that collected passport information or other personal details of roughly 500 million guests was part of a Chinese intelligence-gathering effort that hacked health insurers, other hotels and the security clearance files of millions more Americans, according to two people briefed on the preliminary results of the investigation.

The hackers are suspected of working on behalf of the Ministry of State Security. The discovery comes as the Trump administration plans a series of actions targeting China’s trade, cyber and economic policies.

The Justice Department is preparing to announce new indictments against Chinese hackers working for the intelligence and military services, according to four government officials who spoke on condition of anonymity. The Trump administration also plans to declassify intelligence to reveal concerted efforts by Chinese agents, dating to 2014 or earlier, to build a database containing names of executives and American government officials with security clearances.

And the administration is considering an executive order intended to make it harder for Chinese companies to obtain critical telecommunications equipment, a senior American official with knowledge of the plans said.

Please disable your ad blocker.

Advertising helps fund Times journalism.

The coordinated moves could be announced within days. They stem from a growing concern within the administration that the 90-day trade truce negotiated between President Trump and President Xi Jinping in Buenos Aires two weeks ago may do little to change China’s behavior — including coercing American companies to hand over valuable technology if they seek to enter the Chinese market, as well as the theft of industrial secrets on behalf of state-owned companies.

The hack of Marriott’s Starwood chain, which was only discovered in September and revealed late last month, is not expected to be part of the coming indictments. But two of the government officials said it has added urgency to the administration’s crackdown, given that Marriott is the top hotel provider for United States government and military personnel.

It also is a prime example of what has vexed the Trump administration as China reverted over the past 18 months to the kind of cyber intrusions into American companies and government agencies that former President Barack Obama thought he had ended with a 2015 agreement with Mr. Xi.

Geng Shuang, a spokesman for the Chinese Ministry of Foreign Affairs, denied any knowledge of the Marriott hack. “China firmly opposes all forms of cyberattack and cracks down on it in accordance with the law,” he said. “If offered evidence, the relevant Chinese departments will carry out investigations according to the law.”

“China is one of the major victims of threats to cyber security including cyberhacking,” he said.

A Marriott spokeswoman, Connie Kim, said the company was focused on ”how we can best help our guests” and said the firm “had no information about the cause of this incident and we have not speculated about the identity of the attacker.”

Please disable your ad blocker.

Advertising helps fund Times journalism.

Trade negotiators on both sides of the Pacific Ocean have been working on an agreement that would involve a commitment by China to increase purchases of American goods and services by $1.2 trillion over the next several years, along with addressing some intellectual property concerns.

On Tuesday, Mr. Trump said that the United States and China were having “very productive conversations” as top American and Chinese officials held their first talks via telephone since the two countries agreed to the trade truce on Dec. 1.

But while top administration officials insist that the trade talks are proceeding on a separate track, the broader crackdown on China could undermine Mr. Trump’s ability to reach an agreement with Mr. Xi.

American charges against senior members of China’s intelligence services — in tandem with the targeting of high-profile technology executives, like Meng Wanzhou, the chief financial officer of the communications giant Huawei and daughter of its founder — risk hardening opposition in Beijing to negotiating with Mr. Trump.

China has been angered by the arrest of Ms. Meng, who has been detained in Canada on suspicion of fraud involving violations of United States sanctions in Iran. She was granted bail of 10 million Canadian dollars, or $7.5 million, while awaiting extradition to the United States, a Canadian judge ruled on Tuesday.

Mr. Trump, in an interview with Reuters on Tuesday, said that he would consider intervening in the Huawei case if it would help serve national security and help get a trade deal done with China. Such a move would essentially pit Mr. Trump against his own Justice Department, which coordinated with Canada to arrest Ms. Meng as she changed planes in Vancouver.

“If I think it’s good for what will be certainly the largest trade deal ever made — which is a very important thing — what’s good for national security — I would certainly intervene if I thought it was necessary,” Mr. Trump said.

American business leaders have been bracing for retaliation from China, which has demanded the immediate release of Ms. Meng and accused both the United States and Canada of violating her human rights.

On Tuesday, the International Crisis Group said that one of its employees, a former Canadian diplomat, had been detained in China. The disappearance of the former diplomat, Michael Kovrig, could further inflame tensions between China and Canada. “We are doing everything possible to secure additional information on Michael’s whereabouts as well as his prompt and safe release,” the group said in a statement on its website.

From the first revelation that the Marriott chain’s computer systems had been breached, there was widespread suspicion in both Washington and among cybersecurity firms that the hack was not a matter of commercial espionage, but part of a much broader spy campaign to amass Americans’ personal data.

While American intelligence agencies have not reached a final assessment of who performed the hack — called “attribution” in the world of cybersecurity — a range of firms brought in to assess the damage quickly saw computer code and patterns familiar to operations by Chinese actors.

The Marriott database contains not only credit card information but passport data. Lisa Monaco, the former White House homeland security adviser, noted at a conference last week that passport information would be particularly valuable in tracking who is crossing borders, what they look like, and other key data.

But officials on Tuesday said it was only part of an aggressive operation whose centerpiece was the 2014 hack into the Office of Personnel Management. At the time, the government bureau loosely guarded the detailed forms that Americans fill out to get security clearances — forms that contain detailed financial data, information about spouses, children, past romantic relationships, and any meetings with foreigners.

Such information is exactly what the Chinese use to root out spies, recruit intelligence agents and build a rich repository of Americans’ personal data for future targeting. With those details and more that were stolen from insurers like Anthem, the Marriott data adds another critical element to the intelligence profile: Travel habits.

James A. Lewis, a cybersecurity expert at the Center for Strategic Studies in Washington, said the Chinese have collected “huge pots of data” to feed a Ministry of State Security database seeking to identify American spies — and the Chinese people talking to them.

“Big data is the new wave for counterintelligence,” Mr. Lewis said.

“It’s Big Data hoovering,” said Dmitri Alperovitch, the chief technology officer at CrowdStrike, who first highlighted Chinese hacking as a threat researcher in 2011. “This data is all going back to a data lake that can be used for counterintelligence, recruiting new assets, anti-corruption campaigns or future targeting of individuals or organizations.”

In the Marriott case, Chinese spies stole passport numbers for up to 327 million people — many of whom stayed at Sheraton Hotels, Westin and W Hotels and other Starwood brands. But Marriott has not said if it would pay to replace those passports, an undertaking that would cost tens of billions of dollars.

Instead, Ms. Kim, the Marriott spokeswoman, said the hotel chain would cover the cost of replacement if “fraud has taken place.” That means the company would not cover the cost of having exposed private data to the Chinese intelligence agencies if they did not use it to conduct commercial transactions — even though that is a breach of privacy and, perhaps, security.

And even for those guests who did not have passport information on file with the hotel, their phone numbers, birth dates and itineraries remain vulnerable.

That data, Mr. Lewis and others said, can be used to track which Chinese citizens visited the same city, or hotel, as an American intelligence agent who was identified in data taken from the Office of Personnel Management or American health insurers that document patients’ medical histories and Social Security numbers.

The effort to amass Americans’ personal information so alarmed government officials that in 2016 the Obama administration threatened to block a $14 billion bid by China’s Anbang Insurance Group Co. to acquire Starwood Hotel & Resorts Worldwide, according to one former official familiar with the work of the Committee on Foreign Investments in the United States, a secretive government body that reviews foreign acquisitions.

Ultimately, the failed bid cleared the way for Marriott Hotels to acquire Starwood for $13.6 billion later that year, becoming the world’s largest hotel chain.

As it turned out, it was too late: Starwood’s data had already been stolen by Chinese state hackers, though the breach was not discovered until this past summer, and disclosed by Marriott on Nov. 30.

It is unclear that any kind of trade agreement reached with China by the Trump administration can address this kind of theft.

The Chinese regard intrusions into hotel chain databases as a standard kind of espionage. So does the United States, which has often seized guest data from foreign hotels.

“One thing is very clear to me, and it is that they are not going to stop this,” Mr. Alperovitch said. “This is what any nation state intelligence agency would do. No nation state is going to handcuff themselves and say ‘You can’t do this,’ because they all engage in similar detection.”

Since 2012, analysts at the National Security Agency and its British counterpart, the G.C.H.Q., have watched with growing alarm as sophisticated Chinese hackers, based in the Chinese city of Tianjin, began switching targets from companies and government agencies in the defense, energy and aerospace sectors, to organizations that housed troves of Americans’ personal information.

At the time, one classified National Security Agency report noted that the hackers’ “exact affiliation with Chinese government entities is not known, but their activities indicate a probable intelligence requirement feed” from China’s Ministry of State Security, the country’s Communist-controlled civilian spy agency.

Katie Benner contributed reporting.



Subscribe to The New York Times.
 

Triipe

All Star
Joined
Apr 11, 2017
Messages
1,210
Reputation
-720
Daps
3,203
Reppin
South Fulton / Mississippi



They attempted and with apparently some success access the data of around 100,000 US Navy personnel in addition to other highly sensitive information. The UK condemed this sht too,and it wasn't just the navy either, they cited about 40+ different targets that were hit and the breaches happened in like 12 or so different states.

:damn:
 

☑︎#VoteDemocrat

The Original
Bushed
WOAT
Supporter
Joined
Dec 9, 2012
Messages
302,255
Reputation
-34,066
Daps
611,791
Reppin
The Deep State


danielmiessler.com
It Appears China is Building a Massive Espionage Database on America | Daniel Miessler
Daniel Miessler
6-7 minutes
How China uses organized and strategic cyberwarfare to win a long-term war against the United States

By in Information Security
Published: January 3, 2019

Russia-and-India-targeted-by-Chinese-Hackers.jpg


I’ve mentioned this in numerous places for the last few years, so I decided it was time to finally put it into a formal piece.

It seems obvious at this point that China is building a massive database of information on American individuals and companies, which they can then use for various purposes—including espionage, intellectual property theft, extortion, and other types of coercion.

2/3 of the intellectual property theft cases that the Department of Justice deals with come from China

Here are some of the attacks that have been linked to China with some significant degree of confidence.

  • OPM: The attack on the Office of Personnel Management was perhaps the worst breach in history in terms of espionage, as what was stolen was the background investigation files for most everyone in the United States with a security clearance. So—just to spell it out—China now has all the dirty laundry for Americans serving in the most sensitive positions in our military and government. Link
  • Equifax: Most of the credit files, and associated financial information, for a massive percentage of the American population. Link
  • Marriott: The Marriott breach captured millions of files on people who travel a lot for business. Link
CYBERWARFARE BY CHINA

Seeing any patterns yet? Here are some more.

China is the single greatest risk to the security of American technologies.

Congressional Advisory Group

  • Google and 34 other companies in 2010, including Northrop Grumman, Symantec, Yahoo, Dow Chemical, and Adobe Systems.
  • Navy Contractor, 2018 Link
  • China using LinkedIn to target people inside high-value companies, 2018 Link
  • Sandia National Labs, 2004 Link
  • Congressman Wolf, 2006 Link
  • Commerce Department, 2006 Link
  • F-35 Program, 2009 Link
  • Think Tank/Law Firm Associated with a Chinese Fugitive, 2017 Link
And this is just a fraction of what’s out there.

Basically, they’re building an organized database of stolen information that they can use to beat us economically and militarily in the long-term.

chinese-hacker.png


I’d like to be mad at them, but I’m not really. They have a mission, and that’s to win the game over the span of decades and centuries—not tomorrow or the next day. They’re strategic and they’re unified.

I wish the US were so organized and cohesive. I really do.

But just because I respect what China is doing, or at least the fact that they’re conscious enough to be doing it to further their unified goals—doesn’t mean that I have to like it.

And here’s a great prediction for 2019 from Chad Loder:

2019 security prediction: A major breach involving one of the DNA testing sites, with China as the likely culprit.

— Chad Loder ❇️ (@chadloder) January 1, 2019
You see the stuff they have already:

  1. Background investigation information for our most sensitive people
  2. Our credit files
  3. Our business travelers
  4. A list of who works at what companies, doing what
Now add a hack of a DNA database to that list. Imagine them having partial (and eventually full) genome information on these same people. Of course right now there aren’t too many practical attacks one can launch using that information, but they did just arrest someone for making CRISPR babies.

This stuff is pretty far off, so don’t think we’re close to bio attacks that only kill certain people. That’s fiction today, and probably will be for quite some time.

The whole technological world is working on personalized medicine right now. And with personalized medicine will inevitably come personalized weapons. I’m not sure how far off those practical attacks are, but I can tell you the answer is not far enough.

But even without personalized weapons based on a DNA breach, the idea that a highly organized and highly trained state-level adversary is actively building these kinds of databases on us, and using that information however they can to secure victory—that’s just extremely frustrating, and exhilarating, and surreal, all at once.

It’s asymmetric in so many ways.

We don’t even have that much information on our own citizens, but it’s being gathered and organized by a hostile government to be used against us. And, even crazier, we wouldn’t be allowed to have that much data in one place if we could do it technically.

I think the possible exceptions are data broker companies, like Acxiom, Nielsen, Corelogic, etc. There’s little doubt in my mind that they’re actively trying to compromise other data brokers like them who have the specific mission of collecting and linking information together on individuals.

Those have to be extremely high on their list of targets.

Summary
  1. China is owning us with impunity, and they’re building massive databases to help them target high-value individuals and companies for information and/or leverage
  2. Most people aren’t aware of this level of organization and strategic, long-term thinking on their part, and they should be
  3. I’m not sure how to fault them for doing this, other than to point out that much of it is illegal. The fact is that this is the new reality for warfare, so every nation should probably have some similar capability
  4. If you want to know where the shoe hasn’t dropped yet, look at DNA Databases, Data Brokers, and Law Firms. Those are places that have deep data, unified data, and sensitive data that would go a long way towards enriching what they already have.
It’s time to get in this game, becuase right now China is not only playing (and winning) without us: they’re doing so without most people even knowing.

Notes
  1. Image from e-hacking news.
 
  • Dap
Reactions: ill
Top