The Inside Scoop on Hacking: Russia and China in Cyberspace

June 11, 2017

Tags: Hacking, Chinese hackers, Russian hackers, Hacking Targets, Cyber Security



With everyone on Capitol Hill discussing the hacking or non-hacking of the DNC by Russia, this is a must-see video.

In this interview with Defense News TV, Richard Bejtlich explains the anatomy of a hack. An intrusion is much longer than a split-second invasion in real time. Often the invader is inside the system for years before the target is aware.

Yes. You read that right. The intruder is inside the system for years. A little computer science helps to clarify the current discussion on Capitol Hill.

Richard is one of the top cybersecurity experts in the United States. I have interviewed him a number of times, most recently in Washington, D. C.

The interviews explain the motivations and practice of cyber espionage by China for my new book, "The Lamborghini and the LaoGai: The Two Faces of China's Rise."His list of top offenders are China, Russia, Iran and North Korea. With the Iranians working with the North Koreans.

This analysis is enough to make anyone nervous, but if you go to the FireEye website, you will find a map of worldwide threats in cyberspace. Go if you want to loose sleep at night.

(See my blog archive for my interview with Beijtlich on the Mandiant report on APT 1, the People's Liberation Army building in Shanghai, the location of the IP address of the five Chinese who were indicted in an American court as the Chinese hacking team.)

Chinese Hackers Attack 2 Hong Kong Government Sites

September 6, 2016

Tags: Hacking, China, Cyber Espionage, APT 3

Richard Bejtlich, a top American expert at FireEye computer security, says that the hacking group APT 3 is no joke. They have hacked two Hong Kong government agencies. This is in advance of the Hong Kong Legislative Council elections.

Is this an attempt to influence the elections? No one knows.

China Daily, the official newspaper of the Chinese Communist Party, condemns calls for Hong Kong independence, but this is nothing new.

According to iSight, a FireEye group that tracks malware around the world, the APT 3 group is among the most sophisticated of hackers. They use the latest techniques.

The group's relationship to the Beijing government is not known. Fireye traced the APT 1 group to a PLA address in Shanghai, making the group a part of the People's Liberation Army.

(more…)