AIRLINK 191.84 Decreased By ▼ -1.66 (-0.86%)
BOP 9.87 Increased By ▲ 0.23 (2.39%)
CNERGY 7.67 Increased By ▲ 0.14 (1.86%)
FCCL 37.86 Increased By ▲ 0.16 (0.42%)
FFL 15.76 Increased By ▲ 0.16 (1.03%)
FLYNG 25.31 Decreased By ▼ -0.28 (-1.09%)
HUBC 130.17 Increased By ▲ 3.10 (2.44%)
HUMNL 13.59 Increased By ▲ 0.09 (0.67%)
KEL 4.67 Increased By ▲ 0.09 (1.97%)
KOSM 6.21 Increased By ▲ 0.11 (1.8%)
MLCF 44.29 Increased By ▲ 0.33 (0.75%)
OGDC 206.87 Increased By ▲ 3.63 (1.79%)
PACE 6.56 Increased By ▲ 0.16 (2.5%)
PAEL 40.55 Decreased By ▼ -0.43 (-1.05%)
PIAHCLA 17.59 Increased By ▲ 0.10 (0.57%)
PIBTL 8.07 Increased By ▲ 0.41 (5.35%)
POWER 9.24 Increased By ▲ 0.16 (1.76%)
PPL 178.56 Increased By ▲ 4.31 (2.47%)
PRL 39.08 Increased By ▲ 1.01 (2.65%)
PTC 24.14 Increased By ▲ 0.07 (0.29%)
SEARL 107.85 Increased By ▲ 0.61 (0.57%)
SILK 0.97 No Change ▼ 0.00 (0%)
SSGC 39.11 Increased By ▲ 2.71 (7.45%)
SYM 19.12 Increased By ▲ 0.08 (0.42%)
TELE 8.60 Increased By ▲ 0.36 (4.37%)
TPLP 12.37 Increased By ▲ 0.59 (5.01%)
TRG 66.01 Increased By ▲ 1.13 (1.74%)
WAVESAPP 12.78 Increased By ▲ 1.15 (9.89%)
WTL 1.70 Increased By ▲ 0.02 (1.19%)
YOUW 3.95 Increased By ▲ 0.10 (2.6%)
BR100 11,930 Increased By 162.4 (1.38%)
BR30 35,660 Increased By 695.9 (1.99%)
KSE100 113,206 Increased By 1719 (1.54%)
KSE30 35,565 Increased By 630.8 (1.81%)

The governments of the United States and several other countries, US defence contractors, the United Nations and the International Olympic Committee have been targets of a massive global cyber spying campaign, US computer security firm McAfee said Wednesday.
California-based McAfee did not identify the "state-actor" believed to be behind the sophisticated hacking effort dubbed "Operation Shady RAT," which it traced back to at least 2006, but analysts pointed the finger at China. The report identified 72 "compromised" parties including the governments of Canada, India, South Korea, Taiwan, the United States and Vietnam.
Others included computer networks of the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee, Asian and Western national Olympic committees, the World Anti-Doping Agency, a Department of Energy Department lab, and around a dozen US defence firms, McAfee said. McAfee vice president for threat research Dmitri Alperovitch, the lead author of the report, said "Operation Shady RAT" was a "five-year targeted operation by one specific actor."
"What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth," Alperovitch said. "What is happening to all this data - by now reaching petabytes as a whole - is still largely an open question," he said.
"However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat," he said, "not to mention the national security impact of the loss of sensitive intelligence or defence information."
James Lewis, a cybersecurity expert at the Washington-based Center for Strategic and International Studies, said the evidence may not be "conclusive in a legal sense," but suspicion points towards China. "You can think of at least three other large programs attributed to China that look very similar," Lewis told AFP. "It's a pattern of activity that we've seen before. It's in line with other activities."
In June, Google said that a cyber spying campaign originating in China had targeted Gmail accounts of senior US officials, military personnel, journalists and Chinese political activists. In January of last year, Google announced it was halting censorship of its Internet search engine in China after coming under attack along with 20 other companies from hackers based in China.
In February, McAfee said in another report that hackers in China have penetrated computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information. McAfee said it had discovered the "Shady RAT" series of cyber attacks by gaining access to a command and control server used by the intruders and examining their logs.
"After painstaking analysis of the logs, even we were surprised by the enormous diversity of the victim organisations and were taken aback by the audacity of the perpetrators," McAfee said. "In all, we identified 72 compromised parties," McAfee said, although "many more were present in the logs but without sufficient information to accurately identify them."

Copyright Agence France-Presse, 2011

Comments

Comments are closed.