Science Fiction Dictionary
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

 

China's PLA Unit 61398 Working On Kuang Grade Mark Eleven Penetration Program

Substantial digital forensic evidence links the headquarters of China's People's Liberation Army unit 61398 with a multi-year effort to hack into the computer systems of American military units and corporations. Now, it appears that this group is attempting to break into the infrastructure that controls America's electrical power, gas lines and waterworks.


(Headquarters of China's PLA unit 61398 in Shanghai)

An unusually detailed 60-page study, to be released Tuesday by Mandiant, an American computer security firm, tracks for the first time individual members of the most sophisticated of the Chinese hacking groups — known to many of its victims in the United States as “Comment Crew” or “Shanghai Group” — to the doorstep of the military unit’s headquarters. The firm was not able to place the hackers inside the 12-story building, but makes a case there is no other plausible explanation for why so many attacks come out of one comparatively small area...

While Comment Crew has drained terabytes of data from companies like Coca-Cola, increasingly its focus is on companies involved in the critical infrastructure of the United States — its electrical power grid, gas lines and waterworks. According to the security researchers, one target was a company with remote access to more than 60 percent of oil and gas pipelines in North America. The unit was also among those that attacked the computer security firm RSA, whose computer codes protect confidential corporate and government databases.

Mandiant's report is available online; here are some of their conclusions:

The nature of “Unit 61398’s” work is considered by China to be a state secret; however, we believe it engages in harmful “Computer Network Operations.”
» Unit 61398 is partially situated on Datong Road (大同路) in Gaoqiaozhen (高桥镇), which is located in the Pudong New Area (浦东新区) of Shanghai (上海). The central building in this compound is a 130,663 square foot facility that is 12 stories high and was built in early 2007.
» We estimate that Unit 61398 is staffed by hundreds, and perhaps thousands of people based on the size of Unit 61398’s physical infrastructure.
» China Telecom provided special fiber optic communications infrastructure for the unit in the name of national defense.
» Unit 61398 requires its personnel to be trained in computer security and computer network operations and also requires its personnel to be proficient in the English language.

APt1 has systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously.

» Since 2006, Mandiant has observed APT1 compromise 141 companies spanning 20 major industries.aPt1 has systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously.
» Since 2006, Mandiant has observed APT1 compromise 141 companies spanning 20 major industries.
» APT1 has a well-defined attack methodology, honed over years and designed to steal large volumes of valuable intellectual property.
» Once APT1 has established access, they periodically revisit the victim’s network over several months or years and steal broad categories of intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists from victim organizations’ leadership.
» APT1 uses some tools and techniques that we have not yet observed being used by other groups including two utilities designed to steal email — GETMAIL and MAPIGET.
» APT1 maintained access to victim networks for an average of 356 days. The longest time period APT1 maintained access to a victim’s network was 1,764 days, or four years and ten months.
» Among other large-scale thefts of intellectual property, we have observed APT1 stealing 6.5 terabytes of compressed data from a single organization over a ten-month time period.
» In the first month of 2011, APT1 successfully compromised at least 17 new victims operating in 10 different industries.
» APT1 has a well-defined attack methodology, honed over years and designed to steal large volumes of valuable intellectual property.aPt1 has systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously.
» Since 2006, Mandiant has observed APT1 compromise 141 companies spanning 20 major industries.
» APT1 has a well-defined attack methodology, honed over years and designed to steal large volumes of valuable intellectual property.
» Once APT1 has established access, they periodically revisit the victim’s network over several months or years and steal broad categories of intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists from victim organizations’ leadership.

Fans of sf author William Gibson recall that the Chinese intrusion programs were the best technology you could get:

`What is this thing?' he asked the Hosaka. `Parcel for me.'
`Data transfer from Bockris Systems GmbH, Frankfurt, advises, under coded transmission, that content of shipment is Kuang Grade Mark Eleven penetration program. Bockris further advises that interface with Ono-Sendai Cyberspace 7 is entirely compatible and yields optimal penetration capabilities, particularly with regard to existing military systems...'

He slotted the Chinese virus, paused, then drove it home.
`Okay,' he said, `we're on..."
`Christ on a crutch,' the Flatline said, `take a look at this.'
The Chinese virus was unfolding around them. Polychrome shadow, countless translucent layers shifting and recombining. Protean, enormous, it towered above them, blotting out the void.
`Big mother,' the Flatline said.
(Read more about Gibson's Kuang Grade Mark Eleven Penetration Program)

Via NYTimes; be sure to download this report from Mandiant - Exposing One of China’s Cyber Espionage Units.

Scroll down for more stories in the same category. (Story submitted 2/19/2013)

Follow this kind of news @Technovelgy.

| Email | RSS | Blog It | Stumble | del.icio.us | Digg | Reddit |

Would you like to contribute a story tip? It's easy:
Get the URL of the story, and the related sf author, and add it here.

Comment/Join discussion ( 1 )

Related News Stories - (" Computer ")

AI Worms That Spread
'...there were so many worms and counterworms loose in the data-net now' - John Brunner, 1975.

Great. Now AIs Have Access To Hacking Tools
'... when you and the Flatline punch through that ice and scramble the cores.' - William Gibson, 1984.

Tongue-Controlled Tong Wearable Mouth Computer
'Griff found the white and pink map distracting and switched it off using his tongue mouse.' - Greg Bear, 2007.

Interpol Launches Metaverse For Law Enforcement
'CopSpace sheds some light on matters, of course. Blink and it descends in its full glory.' - Charles Stress, 2007.

 

Google
  Web TechNovelgy.com   

Technovelgy (that's tech-novel-gee!) is devoted to the creative science inventions and ideas of sf authors. Look for the Invention Category that interests you, the Glossary, the Invention Timeline, or see what's New.

 

 

 

 

Science Fiction Timeline
1600-1899
1900-1939
1940's   1950's
1960's   1970's
1980's   1990's
2000's   2010's

Current News

SpaceX Wants A Moonbase Alpha
'And he had been sent with troops, supplies and bombs to command Russia's most trusted post, the Moonbase.'

Vast Apartment Living Will Get Even More Vast
'What is your population', I asked. 'About eighty millions.'

NASA Wants Self-Driving Or Remote-Controlled Vehicles For Lunar Astronauts
'THE autobus turned silently down the wide street of Hydropole. Robot-guided, insulated from noise and cold...'

Elon Musk Says Robotaxis Will Be Ready This August, 2024
'The car had no steering wheel, and no one drove!'

Moonwalkers AI-Controlled Electric Shoes
Now that's power walking that Hugo Gernsback would have approved.

Steve Jobs: 'Capture The Next Aristotle - With AI'
'It was disturbing to think of the Flatline as a construct...'

No Tips! Robotic Food Delivery In Phoenix
'...he rewired the delivery robot so that it would serve him midnight snacks.'

Electric Catamaran 'Explorer Eco 40m' Has 'Solar Skin'
'On went the electric-yacht faster and still faster.'

Orbital Mechanics, The Liftoff, The Turnover, The Retrograde Burn
'...the huge vessel had spun, with a sickening lurch, through a complete half-circle, the instant the power was reversed.'

Harvest Power From Tears And Blinking With Smart Contact Lens
'...he realized that it was not quite a clear lens. Speckles of colored brightness swirled and gathered in it.'

Europa Clipper Plate Carries A Special Message
'...a universal cryptogram — yet it is one which can be interpreted by any intelligent creature on any planet in the Solar System!'

Micro-Robots Are Smallest, Fully Functional
'With a whir, the Scarab shot from the concealing shadows of the corner where it had hidden itself.'

AI Enhances Images Your Brain Sees
'I could have sworn the psychomat showed pictures almost as sharp and detailed as reality itself'

Illustrating Classic Heinlein With AI
'Stasis, cold sleep, hibernation, hypothermia, reduced metabolism, call it what you will - the logistics-medicine research teams had found a way to stack people like cordwood and use them when needed.'

Deflector Plasma Screen For Drones ala Star Wars
'If the enemy persists in attacking or even intensifies their power, the density of the plasma in space will suddenly increase, causing it to reflect most of the incoming energy like a mirror.'

DIY Robotic Hand Made After Loss Of Fingers
'I made them... with the fine work of the watchmaker...'

More SF in the News Stories

More Beyond Technovelgy science news stories

Home | Glossary | Invention Timeline | Category | New | Contact Us | FAQ | Advertise |
Technovelgy.com - where science meets fiction™

Copyright© Technovelgy LLC; all rights reserved.