AGL 40.03 Increased By ▲ 0.02 (0.05%)
AIRLINK 129.31 Increased By ▲ 2.31 (1.82%)
BOP 6.80 Increased By ▲ 0.11 (1.64%)
CNERGY 4.64 Increased By ▲ 0.13 (2.88%)
DCL 8.63 Decreased By ▼ -0.01 (-0.12%)
DFML 40.95 Decreased By ▼ -0.09 (-0.22%)
DGKC 85.74 Increased By ▲ 0.13 (0.15%)
FCCL 33.00 Decreased By ▼ -0.11 (-0.33%)
FFBL 66.53 Increased By ▲ 0.43 (0.65%)
FFL 11.46 Decreased By ▼ -0.09 (-0.78%)
HUBC 110.58 Decreased By ▼ -0.53 (-0.48%)
HUMNL 14.63 Decreased By ▼ -0.19 (-1.28%)
KEL 5.24 Increased By ▲ 0.07 (1.35%)
KOSM 8.11 Increased By ▲ 0.45 (5.87%)
MLCF 40.07 Decreased By ▼ -0.14 (-0.35%)
NBP 60.51 No Change ▼ 0.00 (0%)
OGDC 195.47 Increased By ▲ 1.37 (0.71%)
PAEL 27.10 Increased By ▲ 0.38 (1.42%)
PIBTL 7.64 Increased By ▲ 0.27 (3.66%)
PPL 155.82 Increased By ▲ 2.03 (1.32%)
PRL 27.37 Increased By ▲ 1.16 (4.43%)
PTC 18.56 Increased By ▲ 1.38 (8.03%)
SEARL 85.10 Decreased By ▼ -0.50 (-0.58%)
TELE 7.90 Increased By ▲ 0.33 (4.36%)
TOMCL 34.88 Increased By ▲ 0.49 (1.42%)
TPLP 9.22 Increased By ▲ 0.40 (4.54%)
TREET 16.81 Decreased By ▼ -0.01 (-0.06%)
TRG 62.86 Increased By ▲ 0.31 (0.5%)
UNITY 27.75 Increased By ▲ 0.46 (1.69%)
WTL 1.30 No Change ▼ 0.00 (0%)
BR100 10,184 Increased By 72.7 (0.72%)
BR30 31,403 Increased By 215 (0.69%)
KSE100 95,857 Increased By 861 (0.91%)
KSE30 29,683 Increased By 201.6 (0.68%)

The governments of the United States and several other countries, US defence contractors, the United Nations and the International Olympic Committee have been targets of a massive global cyber spying campaign, US computer security firm McAfee said Wednesday.
California-based McAfee did not identify the "state-actor" believed to be behind the sophisticated hacking effort dubbed "Operation Shady RAT," which it traced back to at least 2006, but analysts pointed the finger at China. The report identified 72 "compromised" parties including the governments of Canada, India, South Korea, Taiwan, the United States and Vietnam.
Others included computer networks of the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee, Asian and Western national Olympic committees, the World Anti-Doping Agency, a Department of Energy Department lab, and around a dozen US defence firms, McAfee said. McAfee vice president for threat research Dmitri Alperovitch, the lead author of the report, said "Operation Shady RAT" was a "five-year targeted operation by one specific actor."
"What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth," Alperovitch said. "What is happening to all this data - by now reaching petabytes as a whole - is still largely an open question," he said.
"However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat," he said, "not to mention the national security impact of the loss of sensitive intelligence or defence information."
James Lewis, a cybersecurity expert at the Washington-based Center for Strategic and International Studies, said the evidence may not be "conclusive in a legal sense," but suspicion points towards China. "You can think of at least three other large programs attributed to China that look very similar," Lewis told AFP. "It's a pattern of activity that we've seen before. It's in line with other activities."
In June, Google said that a cyber spying campaign originating in China had targeted Gmail accounts of senior US officials, military personnel, journalists and Chinese political activists. In January of last year, Google announced it was halting censorship of its Internet search engine in China after coming under attack along with 20 other companies from hackers based in China.
In February, McAfee said in another report that hackers in China have penetrated computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information. McAfee said it had discovered the "Shady RAT" series of cyber attacks by gaining access to a command and control server used by the intruders and examining their logs.
"After painstaking analysis of the logs, even we were surprised by the enormous diversity of the victim organisations and were taken aback by the audacity of the perpetrators," McAfee said. "In all, we identified 72 compromised parties," McAfee said, although "many more were present in the logs but without sufficient information to accurately identify them."

Copyright Agence France-Presse, 2011

Comments

Comments are closed.