As they packed their briefcases for the Christmas break, Members of Parliament (MPs) in London were unaware they had been the targets of one of the most audacious hacking attempts ever mounted, as the world's oldest modern democracy came under a sustained attack aimed at stealing sensitive information. It was launched by cyber criminals almost certainly operating in China.
The hi-tech industrial espionage involved a series of innocuous-looking e-mails targeted at secretaries, researchers, parliamentary staff and even MPs themselves. Each one was specifically tailored to the individual who would receive it.
Once opened, these e-mails tried to download sophisticated spyware that hunts through the recipient's computer and network for potentially valuable documents, which would be automatically sent back to the hackers without the user's knowledge.
The attack, which took place earlier in 2005, was thwarted by the parliament's sophisticated internet security system; no sensitive data is thought to have been lost.
Instead, the House of Commons' IT security staff immediately alerted the UK's National Infrastructure Security Co-ordination Centre (NISCC), a powerful organization linked to UK counter- intelligence (MI5) that is responsible for protecting the UK's critical information systems. Security experts set up an exercise to monitor the attacks, and immediately realized the hackers were well resourced.
"These were not normal hackers," said a source close to the NISCC. "The degree of sophistication was extremely high. They were very clever programmers."
According to research by US investigators, the hackers are thought to have been based in Guangdong Province in southern China. UK and US security experts believe the hackers are working with the tacit approval -- or possibly even direct support -- of authorities in China and are attempting to acquire Western technology in a massive hit and run raid on the world's intellectual property to aid their booming economic growth.
The attack on the House of Commons may be the most eye-catching attack from Chinese-based hackers, but is certainly not unique.
According to a spokesman for MessageLabs, the company responsible for filtering malicious e-mail from government networks, similar spy emails -- called `targeted Trojans' -- were noticed about 18 months ago.
"There were not very many, maybe one every two months, but now they are coming in at the rate of one to two a week," said Maksym Schipka, MessageLab's senior anti-virus researcher.
Last June, the UK government sent out a warning in which Roger Cummings, the head of NISCC, spoke about the threat of attacks from far eastern gangs on the UK critical national infrastructure (CNI) -- the key network of transport, energy, financial, telecommunication and government organizations. At the end of November, Cummings warned that targeted Trojans from foreign powers were a significant threat.
In mid-December, the British Cabinet Office -- which has overall responsibility for UK ministries -- joined in the chorus at a conference at Glamorgan University. Senior civil servant Harvey Mattison, the head of accreditation for the Cabinet Office's Central Sponsor of Information Assurance, the unit responsible for protecting communications between government departments, gave a keynote address on the threat from the far east. "We were given the impression it was coming from one ISP in Guangdong," said a delegate.
Mattison declined to comment except to say that his address was based on details from the NISCC alert.
The UK is not the only country targeted. Key parts of the US have been targeted by far eastern hackers for up to five years. Some of the attacks -- codenamed Titan Rain -- have been traced to just 20 workstations and three routers in Guangdong.
Alan Paller, head of the Sans Institute, the US's top computer crime fighting organization, has stated categorically that the attacks emanate from China. He points to attacks in November 2004, during which hackers grabbed thousands of sensitive documents.
"Of course it's the [Chinese] government [that receives this information]. Governments will pay anything for control of other governments' computers," Paller said.
Other clues -- such as the focus on economic espionage -- suggest the attacks are not the work of run-of-the-mill hackers.
Privately, UK civil servants familiar with NISCC's investigation agree that the attacks on the UK and US are coming from China. This almost certainly means some state sanction or involvement -- perhaps even a "shopping list" of requirements.
Some of the attacks have been aimed at parts of the UK government dealing with human rights issues -- "a very odd target", according to one UK security source.
Meanwhile, the Sans Institute has raised the idea that the Titan Rain attacks might even have a military origin. For example, in the two-and-a-half years of investigation, the hackers never made a mistake.
Intriguingly, the Pentagon in its annual report of the military power of the People's Republic of China, published last year, noted the development of computer attack systems by China's military.
FEROCIOUS FISH-EATER Scientists have found a new species of dinosaur from the Cretaceous Period, a ‘hell heron’ that stalked the rivers, deep in the Saharan desert At a remote Sahara desert site in Niger, scientists have unearthed fossils of a new species of Spinosaurus, among the biggest of the meat-eating dinosaurs, notable for its large blade-shaped head crest and jaws bearing interlocking teeth for snaring fish. It prowled a forested inland environment and strode into rivers to catch sizable fish like a modern-day wading bird — a “hell heron,” as one of the researchers put it, considering it was about 12 meters long and weighed 5-7 tons. The dinosaur presented a striking profile on the Cretaceous Period landscape of Africa some 95 million years ago as it hunted
THE TRAGEDY OF PUNCH: Footage of the seven-month-old Japanese macaque has gone viral online after he was rejected by his mother and formed a bond with a soft toy A baby monkey in Japan has captured hearts around the world after videos of him being bullied by other monkeys and rejected by his mother went viral last week. Punch, a Japanese macaque, was born in July last year at Ichikawa City Zoo. He has drawn international attention after zookeepers gave him a stuffed orangutan toy after he was abandoned by his mother. Without maternal guidance to help him integrate, Punch has turned to the toy for comfort. He has been filmed multiple times being dragged and chased by older Japanese macaques inside the enclosure. Early clips showed him wandering alone with
DRUG WAR: The former president said there was no campaign to kill addicts, but his speeches called for violence and told police to use lethal force if necessary Former Philippine president Rodrigo Duterte earned global infamy for the deadly drug crackdown that led to his arrest over crimes against humanity charges, despite his huge popularity at home. A profane-lipped populist and self-professed killer, Duterte’s anti-crime campaign resulted in the deaths of thousands of alleged dealers and addicts. Rights groups said many of those killed were poor men, often without any proof they were linked to drugs. Yet, while drawing condemnation abroad, tens of millions of Filipinos backed his swift brand of justice — even as he joked about rape in his rambling speeches, locked up his critics and failed to
GAME CHANGER The Russian invasion of Ukraine has shown the utility of small drones for recon, for supporting logistics and for killing across the modern battlefield Five European nations have announced a new program to produce low-cost air defense systems and autonomous drones using Ukrainian expertise, hard-won over the past four years fighting against Russia. Friday’s initiative of the five nations — France, Poland, Germany, the UK and Italy — comes as one of many European efforts to bolster defense along their borders, like a “drone wall ” with Russia and Ukraine to better detect, track and intercept drones violating Europe’s airspace. Both Moscow and Kyiv have cutting-edge drone warfare capabilities forged in the grim laboratory of war where battlefield innovations have rewritten modern battle tactics. Poland is