Belfast Telegraph

UK Website Of The Year

OPM hack: US blames China for huge cyberattack, as new era of cyberwarfare and internet terrorism arrives

Published 05/06/2015

US officials have claimed that the Chinese hackers stole the data. China denies the claims
US officials have claimed that the Chinese hackers stole the data. China denies the claims

One of the most damaging cyberattacks on the US government took place this year. And nobody, even those that had been hit, knew.

The US government said last night that it had lost control of data held by the Office of Personal Management (OPM), which holds information about all of the staff employed by the US government. Nobody knows who stole it or why — but that is the reality of modern warfare.

As internet networks become ever more important and the attacks more sophisticated, both nation-on-nation attacks as well as those by criminal and terrorists are becoming increasingly damaging. The huge hit on the OPM could be the beginning of the launch of full-scale and outright — but often unnoticed — warfare, of the kind that has now been going on quietly for years.

Who?

The US has accused China, and China has denied it. It’s likely nobody will ever know who’s right.

The lack of clear perpetrator is partly because of how easy it is to hide such attacks — they can be carried out on foreign soil, by for-hire hackers who might not even know who they’re working for — and also because so many people are hacking so many others, meaning that there’s a range of people with the means and the motive for such cyberattacks.

Even if the US is able to trace the attacks to China, it doesn’t mean that the government is involved. Many such attacks are carried out by gangs of cyber-criminals, who will take on any attack for a big enough fee.

Chinese officials, including a spokesperson from the Chinese Embassy, have made the same point.

"Cyberattacks conducted across countries are hard to track, and therefore the source of attacks is difficult to identify. Jumping to conclusions and making hypothetical accusation is not responsible and counterproductive," Zhu Haiquan told CNN.

The only real way to attribute cyberattacks is to find a person sat at a computer typing the malicious code, security experts say. Anything else is possible to fake.

Cybercriminals and national states are all involved in the hacking business. The big fear among some security researchers is that terrorists will also join — conducting cyberattacks that can be as economically damaging and even as deadly as physical attacks using chemical or , at a fraction of the cost.

“It’s possible” that traditional terrorists will also start moving into cyberattacks as well as physical ones, Eugene Kaspersky the Russian security expert who founded the eponymous cybersecurity firm, told The Independent in March. “Traditional crime already came to cyberspace. So they employ software engineers.”

“It’s a worst case scenario” that such a thing would happen, Kaspersky said. Such an attack would the end of the evolution of cyberthreats — which have been used by criminals, nation states, and potentially terrorist groups to catastrophic effect.

How?

It’s unclear exactly how the hackers got into the US government systems. Initial reports seem to indicate that the US wasn’t even aware of the attack until it came to increase its defences, finding the information breach after it had happened, and that they aren’t sure how many people are affected.

The hackers appear only to have taken data. That is terrifying and could be hugely damaging for those affected, but it’s one of the less directly threatening options available to hackers.

In recent years, hackers have managed to take control of physical objects and huge machinery. So much of the world’s most important equipment and machinery is now networked — the entire

There have only been two known hacks to cause physical harm. The first was the famous Stuxnet virus, which was created by US and Israeli hackers and planted in Iranian nuclear plants to sabotage key equipment. The second was revealed late last year, when investigators said that still unknown attackers snuck into the computers controlling a German steel mill and stopping a furnace from being shut down and causing massive damage.

Similar systems are present in all of our most important infrastructure. If hackers were able to, they could cause huge damage by wreaking havoc on our electric grid, financial services and other key networks, all from the comfort of their own computer.

Such attacks are likely to increase, as networks become yet more integrated and cybercriminals, terrorists and nation states become ever more sophisticated in their hacking. Those key industries that could be hit by such an attack are working hard to make themselves safe — but those that would benefit from attacking them are likely working just as hard.

Why?

US officials have claimed that the Chinese hackers stole the details so that they can be used to put together a database of the country’s officials and others, presumably to be used for traditional intelligence efforts.

But hackers’ motives are often as difficult as finding out who’s really doing the hacking. In the Sony hacks, for instance, the stated aim was stopping the release of The Interview — but it could just as easily be anything else.

Further reading

US data breach: hackers steal personal information of four million federal employees

Bureau 121: North Korea's hacker army 'could kill people and destroy cities', says defector who trained them

Google, Apple and other tech firms write letter to Obama asking him to prevent encryption backdoors

Hackers dupe Irish Central Bank with elaborate money transfer scam

Google Malaysia hacked: cyber-attack re-directs page to hacker website

Could your online porn viewing history be publicly released?

Cyber-crime thriller Blackhat used former hacker Chris McKinlay to teach the cast to code

FREAK security flaw: Apple and Google users being spied on for a decade

Lizard Squad hacks Lenovo website, week after Superfish controversy

Gemalto sim card database hack: NSA and GCHQ stole details to listen in on phone calls

Independent News Service

Your Comments

COMMENT RULES: Comments that are judged to be defamatory, abusive or in bad taste are not acceptable and contributors who consistently fall below certain criteria will be permanently blacklisted. The moderator will not enter into debate with individual contributors and the moderator’s decision is final. It is Belfast Telegraph policy to close comments on court cases, tribunals and active legal investigations. We may also close comments on articles which are being targeted for abuse. Problems with commenting? customercare@belfasttelegraph.co.uk

Read More