Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Private U.S. Report Accuses Another Chinese Military Unit of Hacking

CrowdStrike said the hacking targeted the U.S. space, aerospace and communications sectors.

Reuters / Pichi Chuang

A private U.S. cyber security company on Monday accused a unit of China’s military of conducting far-reaching hacking operations to advance the country’s satellite and aerospace programs.

Security company CrowdStrike said Shanghai-based unit 61486 of the People’s Liberation Army 12th bureau has attacked networks of Western government agencies and defense contractors since 2007.

CrowdStrike said the hacking targeted the U.S. space, aerospace and communications sectors. The cyber spying targeted “popular productivity applications such as Adobe Reader and Microsoft Office to deploy custom malware through targeted email attacks,” CrowdStrike said.

Less than three weeks ago the U.S. Justice Department took the unprecedented step of unsealing indictments against five members of another People’s Liberation Army unit that allege they stole trade secrets.

CrowdStrike said it was publicizing a report previously sent to clients to show that the issue was broader than many realize.

“After the Chinese response, where they basically said this is all fabricated, we said why don’t we unleash something that’s undeniable,” said CrowdStrike co-founder Dmitri Alperovitch. He said the company had briefed U.S. intelligence agencies before publishing its report.

CrowdStrike said an individual named Chen Ping registered website domain names used in some of the intrusions. Chen’s personal blog appears to put his age as 35, and he identified himself as a soldier, the report said.

Chen’s email is tied to profiles, blogs and forum postings, CrowdStrike said. Among material on those sites was a photo album titled “office” that includes a building CrowdStrike identified as the Shanghai headquarters of the military unit in question.

Chen did not respond to requests for comment sent to the email addresses provided by CrowdStrike.

But a spokeswoman for China’s foreign ministry poured scorn on the report, saying she had a strong sense of “déjà vu” about the allegations, adding it was ridiculous to suggest any hacker would openly advertise what he did.

“I think this is both curious and puzzling. Have you ever seen a thief in the street who advertises on his chest that he is a thief? Honestly speaking, I think what the U.S. has done here cannot be accepted as correct,” spokeswoman Hua Chunying told a daily news briefing in Beijing.

Revelations by former U.S. intelligence contractor Edward Snowden that the United States carried out widespread online surveillance showed that the U.S. had no right to point fingers when it came to hacking, she added.

“The United States cannot pretend that it is the victim. They are a hacker empire. I think everyone in the world knows this,” Hua said.

CrowdStrike was founded by former senior executives at big antivirus company McAfee, now part of Intel . It has contracts and other ties to the U.S. government.

The new report is likely to add to the escalating tensions over cyber security issues between the world’s two largest economies.

Chinese officials have already responded sharply to last month’s indictments, pulling out of talks on hacking issues and accusing the United States of plundering Chinese political and military secrets.

However, China on Monday confirmed that it will participate for the first time in a major U.S.-hosted naval drill being held near the Pacific island of Guam later this month. China is sending four ships including a destroyer and frigate, regardless of deep mistrust on both sides.

(This refiled version of the story changes translation to “hacker empire” from “hacker enemy state” in paragraph 13)

(Additional reporting by David Brunnstrom in Washington and Ben Blanchard in Beijing; Editing by Cynthia Osterman and Simon Cameron-Moore)

This article originally appeared on Recode.net.

More in Technology

Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady
Future Perfect
Some deaf children are hearing again because of a new gene therapySome deaf children are hearing again because of a new gene therapy
Future Perfect

A medical field that almost died is quietly fixing one disease at a time.

By Bryan Walsh