Hip Hop
By Kevin Whelan Posted June 28, 2019 In ITC's Threat of the Week

Hip Hop

Regular readers of these ramblings will remember that we first reported about the nefarious activities of the Chinese hacking outfit APT10 way back in April 2017 after its activities were brought to public attention through brilliant work by PwC, BAE Systems and (the obviously silent(ish) partner) the UK National Cyber Security Centre (NCSC).

To recap, the story went something like this: In a totally planned, brilliantly executed series of cyber programmes, APT10 acting on behalf of, instructed by, and paid by (you get the picture) the Chinese Government allegedly, infiltrated companies the world over to steal their Intellectual Property in order to advance the Chinese economy without having to do the hard yards (the research, the sweat, the toil).

A key facilitator in this epic hack was the use of third-party providers which could then be used to ‘hop’ into the provider’s managed service customers, set up a VPN back to Beijing, sorry base and syphon off the blueprints.

Unsurprisingly, many of the big managed service types kept their heads down and hands in their pocketsthroughout this and subsequent announcements, the most recent of which was in April this year. We did say: ‘What will almost certainly turn out to be the thin end of this wedge…..’

In between April 2017 and this glorious London Summer’s day, we have seen the most proficient, efficient, ‘we are not worthy’ work of the aforementioned terracotta army building, paper inventingexplosives pioneering Nation.

When you think about it, we really shouldn’t be surprised, should we? This is after all a country that killed all of the sparrows (and other feathered friends besides) by ‘encouraging’ the (sizeable) population to, amongst other things, keep them flying by scaring them until they simply fell from the sky. Ironically that plan spectacularly backfired because the number of bugs (and insects) caused carnage. Will history repeat itself?

So we have been banging this drum (away from nature) for some time and have often been accused of being paranoid, possibly in the tinfoil hat brigade (do watch that video, the toilet roll is amongst the most awkward items on the desk). What we needed was a ruthless, detailed and credible (so far) journalistic team to tell it like it is.

Step forward the esteemed Mr Jack Stubbs and colleagues who have released a very comprehensive report which details at least some of the scope of the APT10 activity.

It turns out that our tin helmets and dread warnings about the sky falling on your heads were not wasted.

According to Reuters not only HPE and IBM (the original suspects) but also Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation and DXC Technology (the new/old HPE, so boring) were compromised by APT10 and then used to harvest the Intellectual Property goodness of pretty much everyone.

Wowser. If you were writing a science fiction novel about a culture trying to progress rapidly by appropriating the hard work of the enemy, sorry friendly neighbours, you would probably struggle to imagine or describe the scale of this larceny.

This week it was widely reported that Hackers infiltrated the networks of at least ten cellular telcos around the world, and remained hidden for years, as part of a long-running tightly targeted surveillance operation’. Although we do like to hand out a prize, we won’t be giving one out for guessing which outfit has been fingered for this dastardly activity!

So what do you think, should we build critical national infrastructure including 5G using Huawei equipment? We think you know what our survey says.

The trouble with this sort of infiltration and subsequent exfiltration is that it is so very hard to spot, let alone get rid of. It keeps coming back.

ITC has fought these fires from detection, through removal, to protection against the very same miscreants of which we speak. We would be more than happy to share our experiences with you and help you have a good look at your environment. Of course less subtle actors lurking on your stuff would be identified and dealt with, probably before we engaged the big guns.

If you are anxious, intrigued or would just like to discuss this massive heist, do contact us at: [email protected] or call 020 7517 3900. If you are at or going to Glasto, leave it a week or so or wear your tin hat.

要查看或添加评论,请登录

Tom Millar的更多文章

  • Sonic Boom

    Sonic Boom

    It has been an un-seasonably frenetic week in the Cyber Security coal mines this week, so much so that this week’s rant…

    2 条评论
  • Barr Humbug

    Barr Humbug

    Unfortunately we will not be talking about the legendary A.G.

    3 条评论
  • Mug Shot

    Mug Shot

    Unless you have been participating in one of those tiresome live ‘off the grid’ challenges, and we mean a proper one…

  • To Fine, To Serve

    To Fine, To Serve

    Unless you have been stricken with memory loss, brainwashed by positive corporate messaging, or otherwise impaired, you…

  • Silence is Golden

    Silence is Golden

    Do you remember reports about a Russian cybergang called Silence? They launched successful attacks against a number of…

  • Delphic Oracle

    Delphic Oracle

    For some time, we have heard rumours circulating in some of the darker parts of the web about issues with Oracle’s…

  • G-Spam

    G-Spam

    This week, the brilliant/devious (delete as applicable) folks at Kaspersky called out the mighty Google for allowing…

  • HackFest

    HackFest

    This week has seen a large number of hacking announcements; it is going to be tricky to squeeze even the interesting…

  • Mine Host

    Mine Host

    A couple of weeks ago we talked about a serious vulnerability (wormable, apparently) now called BlueKeep in the…

  • Patient Zero

    Patient Zero

    Have you heard of the mystery hacker SandboxEscaper? To refresh your memories, SandboxEscaper is an avid Windows…

社区洞察

其他会员也浏览了