News / USA

Symantec Says Hacker Group Found in China, Linked to Big Cyberattacks

The website of the U.S. Central InaThe website of the U.S. Central Intelligence Agency (CIA) in Washington is unresponsive and unavailable after reports that the website had been attacked by internet hackers, June 15, 2011.
The website of the U.S. Central InaThe website of the U.S. Central Intelligence Agency (CIA) in Washington is unresponsive and unavailable after reports that the website had been attacked by internet hackers, June 15, 2011.
Reuters
Computer security experts have discovered a group of highly sophisticated computer hackers operating for hire, a U.S computer security firm said on Tuesday, and it linked the group to some of the best-known cyber-espionoge attacks out of China in recent years.

Symantec Corp said the hacker group, which it dubbed “Hidden Lynx,” was among the most technically advanced of several dozen groups believed to be running cyber espionage operations out of China. Unlike a previous report by another company, Symantec did not allege Chinese government involvement in the cyberattacks.

Symantec's 28-page report said its researchers believe the Hidden Lynx group may have been involved with the 2009 Operation Aurora attacks, the most well-known cyber espionage campaign uncovered to date against U.S. companies.

In Operation Aurora, hackers attacked Google Inc and dozens of other companies including Adobe Systems Inc. Google disclosed the attacks in January 2010, in which hackers tried to read Gmail communications of human rights activists and also attempted to access and change source code at targeted companies.

Symantec researcher Liam O'Murchu said his firm was unable to determine which individuals were behind Hidden Lynx or if it was linked to the Chinese government.

A separate study, released in February from the U.S. computer security firm Mandiant, said a secretive unit of the Chinese military was engaged in cyber espionage on American companies. Beijing vehemently denied the accusations in that document, which contained photos of the building that Mandiant alleged was the unit's headquarters.

Symantec believes the group is based in China, O'Murchu said, because much of the infrastructure used to run the attacks is based there and because the malicious software was written using Chinese tools and with Chinese code.

The Symantec report also provides new details about who is behind several recent attacks, including a breach at cyber security firm Bit9 and follow-on attacks at three Bit9 clients.

It also connects Hidden Lynx to a major campaign dubbed Voho, which was discovered last year by the security firm RSA, which is owned by EMC Corp. Voho targeted hundreds of organizations including financial firms, technology and healthcare companies, defense contractors and government agencies.

Symantec described the Hidden Lynx group as a “professional organization” staffed by between 50 and 100 people with a variety of skills needed to breach networks and exfiltrate data. The arsenal of tools included Trojan Naid and Trojan Moudoor, which the gang use to siphon data from infected computers.

Symantec, which sells software and services to protect corporate and consumer computer systems from cyber attacks like the ones mentioned in the report, said Naid was also used by hackers  in Operation Aurora.

The Hidden Lynx hackers “were either responsible for the Aurora attack or were working in conjunction with the Aurora attackers,” O'Murchu said.

You May Like

US Firms Concerned About China's New Cyber Regulations

New rules would require technology companies doing business in financial sector to hand over their source code, adopt Chinese encryption algorithms More

WHO Focus on Ebola Shifts to Ending Outbreak

Focus to be less on building facilities and more on efforts to find infected people, manage their cases, engage with communities and ensure proper burials More

US Scientist Who Conceived of Groundbreaking Laser Technology Dies

Charles Townes, Nobel laureate, laser co-creator paved way for other scientific discoveries: CDs, eye surgery, metal cutters to name a few technologies that rely on lasers More

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Super Bowl Ads Compete for Eyes on TV, Webi
X
January 29, 2015 9:58 AM
Super Bowl Sunday (Feb. 1) is about more than just the NFL's American football championship and big parties to watch the game. Viewers also tune in for the world famous commercials that send Facebook and Twitter abuzz. Daniela Schrier reports on the social media rewards for America’s priciest advertising.
Video

Video Super Bowl Ads Compete for Eyes on TV, Web

Super Bowl Sunday (Feb. 1) is about more than just the NFL's American football championship and big parties to watch the game. Viewers also tune in for the world famous commercials that send Facebook and Twitter abuzz. Daniela Schrier reports on the social media rewards for America’s priciest advertising.
Video

Video Theologians Cast Doubt on Morality of Drone Strikes

In 2006, stirred by photos of U.S. soldiers mistreating Iraqi prisoners, a group of American faith leaders and academics launched the National Religious Campaign Against Torture. It played an important role in getting Congress to investigate, and the president to ban, torture. VOA's Jerome Socolovsky reports.
Video

Video Freedom on Decline Worldwide, Report Says

The state of global freedom declined for the ninth consecutive year in 2014, according to global watchdog Freedom House's annual report released Wednesday. VOA's William Gallo has more.
Video

Video As Ground Shifts, Obama Reviews Middle East Strategy

The death of Saudi Arabia’s king, the collapse of a U.S.-friendly government in Yemen and a problematic relationship with Israel’s leadership are presenting a new set of complications for the Obama administration and its Middle East policy. Not only is the U.S. leader dealing with adversaries in Iran, the Islamic State and al-Qaida, but he is now juggling trouble with traditional allies, as White House correspondent Luis Ramirez reports.
Video

Video MRI Seems to Help Diagnose Prostate Cancer, Preliminary Study Shows

Just as with mammography used to detect breast cancer, there's a lot of controversy about tests used to diagnose prostate cancer. Fortunately, a new study shows doctors may now have a more reliable way to diagnose prostate cancer for high risk patients. More from VOA's Carol Pearson.
Video

Video Smartphones About to Make Leap, Carry Basic Senses

Long-distance communication contains mostly sounds and pictures - for now. But scientists in Britain say they are close to creating additions for our smartphones that will make it possible to send taste, smell and even a basic touch. VOA’s George Putic reports.
Video

Video NASA Monitors Earth’s Vital Signs From Space

The U.S. space agency, NASA, is wrapping up its busiest 12-month period in more than a decade, with three missions launched in 2014 and two this month, one in early January and the fifth scheduled for January 29. As VOA’s Rosanne Skirble reports, the instruments being lifted into orbit are focused on Earth’s vital life support systems and how they are responding to a warmer planet.
Video

Video Saved By a Mistake - an Auschwitz Survivor's Story

Dagmar Lieblova was 14 when she arrived at Auschwitz in December 1943, along with her entire Czech Jewish family. All of them were to die there, but she was able to leave after several months due to a bureaucratic mix-up which saved her life. Now 85, with three children and six grandchildren, she says she has a feeling of victory. This report by Ahmad Wadiei and Farin Assemi, of RFE/RL's Radio Farda is narrated by RFE’s Raymond Furlong.

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More

All About America

AppleAndroid