Cyber spies break into government computers
Sunday 29 March 2009
A cyber spy network based mainly in China hacked into classified documents from government and private organisations in 103 countries, including the computers of the Dalai Lama and Tibetan exiles, Canadian researchers said.
The work of the Information Warfare Monitor initially focused on allegations of Chinese cyber espionage against the Tibetan community in exile, and eventually led to a much wider network of compromised machines, the internet-based research group said.
"We uncovered real-time evidence of malware (malicious software) that had penetrated Tibetan computer systems, extracting sensitive documents from the private office of the Dalai Lama," investigator Greg Walton said.
The research group said that while it's analysis points to China as the main source of the network, it has not conclusively been able to detect the identity or motivation of the hackers.
Students For a Free Tibet activist Bhutila Karpoche said her organisation's computers have been hacked into numerous times over the past four or five years, and particularly in the past year. She said she often gets e-mails that contain viruses that crash the group's computers.
The IWM is composed of researchers from Ottawa-based think tank SecDev Group and the University of Toronto's Munk Centre for International Studies. The group's initial findings led to a 10-month investigation summarised in the report to be released online today.
The researchers detected a cyber espionage network involving over 1,295 compromised computers from the ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan. They also discovered hacked systems in the embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan.
Once the hackers infiltrated the systems, they gained control using malware - software they install on the compromised computers - and sent and received data from them, the researchers said.
Two researchers at the UK's Cambridge University who worked on the part of the investigation related to the Tibetans are also releasing their own report today.
In an online abstract for The Snooping Dragon: Social Malware Surveillance of the Tibetan Movement, Shishir Nagaraja and Ross Anderson write that while malware attacks are not new, these attacks should be noted for their ability to collect "actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed".
- 4 Women think Irish men are the sexiest, survey finds
- 5 Florida couple forced to register as sex offenders for having sex on public beach
Italian police 'reveal' what Jesus looked like as a young boy
Who should I vote for in the general election? Take The Independent's interactive quiz to find out which party is the right choice for you
Florida couple forced to register as sex offenders for having sex on public beach
Mysterious 'X-Files' sounds heard miles above the Earth
Met Gala 2015: Jason Derulo falling over in epic fashion, the event's most talked about moment, wasn't what it seemed
In defence of liberal democracy
General Election 2015: Post-election 'shambles' looms as 70 per cent of voters say SNP 'should not be able to veto UK government policies'
The Rothschild Libel: Why has it taken 200 years for an anti-Semitic slur that emerged from the Battle of Waterloo to be dismissed?
General Election 2015: UK will be 'run for the wealthy and powerful' if Tories retain power, Labour warns
General election live: SNP suspends two members for disrupting Labour rally
Schools forced to act as 'miniature welfare states' with teachers buying underwear and even haircuts for poor pupils
£35000 - £40000 per annum + car and benefits: Ashdown Group: Marketing Manager...
£18000 - £20000 per annum: Ashdown Group: Helpdesk Analyst - Devon - £20,000 ...
£35000 - £50000 per annum + generous bonus: Ashdown Group: Business Analytics ...
£45000 - £50000 per annum: Ashdown Group: IT Project Coordinator (Software Dev...