Security Market Segment LS
Wednesday, 04 March 2020 09:39

Chinese infosec firm accuses CIA-backed group of numerous hacks Featured

Chinese infosec firm accuses CIA-backed group of numerous hacks Pixabay

In an unusual turn of events, a Chinese security firm has accused a group known as APT-C-39, which it claims is affiliated to the US Central Intelligence Agency, of hacking into Chinese Government agencies and companies over the last 11 years.

The accusations were made by the Chinese security firm 360 Core Security (Qihoo Security) and named former CIA employee Joshua Adam Schulte as being the person who leaked material to WikiLeaks which the latter published under the name Vault 7. Schulte is currently on trial for this very alleged offence.

This is the second time a Chinese security firm has blamed the CIA for hacking; last September, Qi An Xin accused the American intelligence agency of breach aviation industry targets between 2012 and 2017.

The US Government often issues indictments against foreign hackers — mostly from China, Russia, Iran or North Korea — and though these are just allegations which have to be proved in court, they are treated as the gospel truth by Western media which report them as such.

And American security firms — like FireEye and CrowdStrike — are often prone to make pronouncements on the origin of a hack, even though attribution is the most difficult thing to do in this trade.

The Chinese government rarely, if ever, issues anything in writing, instead making broad and expansive accusations at media conferences.

Qihoo said it had concluded after analysing the leaked Vault 7 materials and its own past research, that there had been targeted attacks against China's aviation industry, scientific research institutions, petroleum industry firms, Internet companies and government agencies.

The attacks were claimed to have spanned the period from September 2008 to June 2019 and took place mainly in provinces such as Beijing, Guangdong, and Zhejiang.

The alleged CIA attackers were claimed to have targeted system developers who were engaged in IT for civil aviation such as flight control systems, freight information services, settlement and distribution services and passenger information systems.

"We speculate that in the past 11 years of infiltration attacks, CIA may have already grasped the most classified business information of China, even of many other countries in the world," Qihoo said.

"It does not even rule out the possibility that now CIA is able to track down the real-time global flight status, passenger information, trade freight and other related information.

"If the guess is true, what unexpected things will CIA do if it has such confidential and important information? Get important figures‘ travel itinerary, and then pose political threats, or military suppression?"

The company cited the following as evidence that led it to conclude that APT-C-39 was a CIA front:

  • it uses massive exclusive cyber weapons in the CIA's Vault 7 project;
  • Technical details of most samples of APT-C-39 are consistent with those described in the Vault 7 documents;
  • Before the Vault 7 was disclosed by WikiLeaks, the APT-C-39 already used relevant cyber weapons against targets in China;
  • Some attack weapons used by the APT-C-39 are associated with the NSA; and
  • APT-C-39 group’s weapons compilation time is located in the US time zone.

Thanks to Catalin Cimpanu for a link to the claims made by Qi An Xin.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments