Chinese hackers spied on Europeans before G20 meeting - researcher

BOSTON Tue Dec 10, 2013 4:27am IST

A dish with the logo of the G20 Summit is pictured in the banquet room for the attendees of the G20 Summit in Constantine Palace in Strelna near St. Petersburg, September 5, 2013. REUTERS/Sergei Karpukhin/Files

A dish with the logo of the G20 Summit is pictured in the banquet room for the attendees of the G20 Summit in Constantine Palace in Strelna near St. Petersburg, September 5, 2013.

Credit: Reuters/Sergei Karpukhin/Files

Stocks

   

BOSTON (Reuters) - Chinese hackers eavesdropped on the computers of five European foreign ministries before last September's G20 Summit, which was dominated by the Syrian crisis, according to research by computer security firm FireEye Inc.

The hackers infiltrated the ministries' computer networks by sending emails to staff containing tainted files with titles such as "US_military_options_in_Syria," said FireEye, which sells virus fighting technology to companies. When recipients opened these documents, they loaded malicious code onto their personal computers.

For about a week in late August, California-based FireEye said its researchers were able to monitor the "inner workings" of the main computer server used by the hackers to conduct their reconnaissance and move across compromised systems.

FireEye lost access to the hackers after they moved to another server shortly before the G20 Summit in St. Petersburg, Russia. FireEye said it believes the hackers were preparing to start stealing data just as the researchers lost access.

The U.S. company declined to identify the nations whose ministries were hacked, although it said they were all members of the European Union. FireEye said it reported the attacks to the victims through the Federal Bureau of Investigation.

A spokeswoman for the FBI, Jenny Shearer, declined to comment.

"The theme of the attacks was U.S. military intervention in Syria," said FireEye researcher Nart Villeneuve, one of six researchers who prepared the report. "That seems to indicate something more than intellectual property theft...The intent was to target those involved with the G20."

The September 5-6 G20 summit was dominated by discussion of the Syrian crisis, with some European leaders putting pressure on U.S. President Barack Obama to hold off on taking military action against Syrian President Bashar al-Assad.

Villeneuve said he is confident that the hackers are from China based on a variety of technical evidence, including the language used on their control server, and the machines that they used to test their malicious code.

Villeneuve said he did not have any evidence, however, that linked the hackers to the Chinese government.

"All we have is technical data. There is no way to determine that from technical data," Villeneuve said.

Officials with the Chinese Embassy in Washington could not immediately be reached for comment.

ONE OF DOZENS

Western cybersecurity firms monitor several dozen hacking groups operating in China, most of which they suspect of having ties to the government. The firms also suspect the hacking groups of stealing intellectual property for commercial gain.

China has long denied those allegations, saying it is the victim of spying by the United States. Those claims gained some credibility after former National Security Agency contractor Edward Snowden began leaking documents about U.S. surveillance of foreign countries, including China.

FireEye said it has been following the hackers behind the Syria-related attack for several years, but this is the first time the group's activites have been publicly documented. The company call the group "Ke3chang," after the name of one of the files it uses in one of its pieces of malicious software.

FireEye said it believed the hackers dubbed the Syria-related campaign "moviestar" because that phrase was used as a tag on communications between infected computers and the hackers' command-and-control server.

In 2011, the group ran another operation dubbed "snake," which enticed victims with a file that Fireye said contained nude pictures of Carla Bruni, the Italian-French singer, songwriter and model who in 2008 married then French President Nicolas Sarkozy.

The host name for that campaign's command-and-control server contained the string "g20news," which might indicate that it was related to the G20 Finance Ministers meeting in Paris in 2011, FireEye said.

The email address used to send those malicious files had the phrase "consulate" in it, which also bolstered the possibility that the attack was politically motivated, Villeneuve said.

He said researchers only gathered evidence about "snake" through reviewing emails and malicious code. They did not have access to its command-and-control server, which they did in the case of the "moviestar" attack. (Editing by Tiffany Wu and Grant McCool)

FILED UNDER:
Comments (0)
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.

  • Most Popular
  • Most Shared

China's Twitter

REUTERS SHOWCASE

No-hire Trial

No-hire Trial

Tech workers seek to use Steve Jobs evidence in upcoming trial on no-hire accords  Full Article 

Apartheid-era Case

Apartheid-era Case

Ford, IBM to face renewed U.S. lawsuit over apartheid-era abuses  Full Article 

Online Banking

Online Banking

China issues banking rules to strengthen online payment security  Full Article 

Web Control

Web Control

China calls on Russia, central Asia allies to tighten Internet controls.  Full Article 

In Demand

In Demand

Microsoft's Xbox One sales cross 5 million.  Full Article 

Digital Currency

Digital Currency

Mt. Gox suitors seek support to save bitcoin exchange.  Full Article 

Reuters India Mobile

Reuters India Mobile

Get the latest news on the go. Visit Reuters India on your mobile device.  Full Coverage