• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Aerospace
December 20 2018 3:27 pm

U.S. Accuses China Of Stealing From Aviation, Satellite And Multiple Other Industries

C

Calvin Biesecker

Chinese hackers in association with China's intelligence services have been hacking into data networks and stealing data and sensitive information from dozens of companies and U.S. government agencies dating back to 2006 and continuing into 2018 in violation of a 2015 accord between the U.S. and China in which the countries agreed not to support the cyber theft of intellectual property, the Department of Justice said on Thursday.

The cyber thefts include data and intellectual property from U.S. companies involved in aviation, space and satellite industries, and from the U.S. Navy and other government agencies.

Two Chinese hackers, who work for a group known as Advanced Persistent Threat (APT)-10 and are linked to the Ministry of State Security, have been targeting and compromising data held by managed service and cloud providers for companies in a dozen countries and in turn providing "sensitive business information that gives competitors and unfair advantage," Deputy Attorney General Rod Rosenstein said.

Deputy U.S. Attorney General Rod Rosenstein. Photo: Dept. of Justice

A DoJ statement outlining charges against the Chinese individuals says they hacked one service provider that manages data and intellectual property for companies and governments globally, over 45 technology companies in at least 12 U.S. states, and U.S. agencies.

The APT10 hacking group cast a wide net to pursue sensitive information from U.S. industries.

Targeted industries and technologies included aviation, satellite and maritime technology, industrial factory automation, automotive supplies, laboratory instruments, banking and finance, telecommunications and consumer electronics, computer processor technology, information technology services, packaging, consulting, medical equipment, healthcare, biotechnology, pharmaceutical manufacturing, mining, and oil and gas exploration and production, the DoJ says.

The Justice Department statement outlines two hacking campaigns, one it calls the Technology Theft Campaign and the other the MSP Theft Campaign, with MSP standing for managed service provider.

The Technology Theft Campaign began around 2006 and resulted in the theft of "hundreds of gigabytes of sensitive data and information from the victims' computer systems," from more than 45 U.S. companies, including seven involved in aviation, space and/or satellite technology, the U.S. Navy, NASA's Goddard Space Center and Jet Propulsion Laboratory, and the Department of Energy's Lawrence Berkeley National Laboratory, the DoJ says.

More than 40 computers were hacked to obtain the Navy data, which includes names, Social Security numbers, birth dates, salary information, personal phone numbers, and email addresses of more than 100,000 personnel, DoJ says.

Computers of more than 25 other technology related companies, including those involved with radar technology, information technology services and computer processors, were successfully accessed, the department says.

The names of the companies that were hacked and had data stolen were not disclosed.

In 2015 then U.S. President Obama and his Chinese counterpart, Xi Jingping reached a deal that prohibits either countries' government from conducting or supporting "cyber-theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors."

Rosenstein highlighted that in the past several months the Justice Department in three cases has charged individuals with stealing data "at the behest of the Chinese Ministry of State Security," which is part of the country's intelligence services.

"In 2015, China promised to stop stealing trade secrets and other confidential business information through computer hacking ‘with the intent of providing competitive advantages to companies or commercial sectors,'" Rosenstein said. "The activity alleged in this indictment violates the commitment that China made to members of the international community."

The DoJ's allegations drew bipartisan condemnation of China's actions.

"President Xi and his lackeys at the Ministry of State Security must understand that they will be held to account for undermining the rules-based international order," Rep. Jim Langevin (D-R.I.), a member of the House Armed Services and Homeland Security Committees, said in a statement. Rep. Will Hurd (R-Texas), who chairs the House Information Technology Subcommittee and is on the Homeland Security and Intelligence Committees, stated,"we are in a hot war with China, and cyber space is the battle space," and added that, "There must be consequences for digital attacks that compromise our national security."

The cyber security company FireEye [FEYE] also issued a statement, saying it has tracked APT10 for years and noted it "is one of the most prolific cyber espionage groups." The company said the group has targeted a number of sectors, including aerospace and the military, telecommunications, high-technology, and government agencies.

"Their move toward compromising managed service providers showcases the danger of supply chain compromises and reflects their continuously evolving tactics," FireEye said. "APT10 is a well-resourced and a global threat."

A joint statement by Secretary of State Michael Pompeo and Homeland Security Secretary Kirstjen Nielsen pointed out that in addition to the Obama-Xi accord China has made the same commitments to major industrialized nations.

"Stability in cyberspace cannot be achieved if countries engage in irresponsible behavior that undermines the national security and economic prosperity of other countries," adding that China's actions threaten "economic competitiveness of companies in the United States and around the globe."

The MSP Theft Campaign involved gaining access to the computers of an MSP to remotely monitor computers and steal user credentials and from there connecting to clients' networks. Eventually, data from the MSP's customers in the financial, telecommunications, consumer electronics, manufacturing, healthcare, biotechnology, mining, automotive supply and drilling sectors was stolen, the DoJ says. Victim companies were located in 12 countries, including the U.S.

s, including the U.S.

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles