China: Cyber Criminals Hacked OPM, Not Government Spies
“As users are completely unable to uninstall these malicious apps, the virus developers soon get a massive number of active users.” Cheetah Mobile researcher said.
“With this user base, the virus developer is able to set up a marketing promotion company and become a mobile dealer. Then they have the qualifications to cooperate with ad sponsors, making money by distributing products for advertisers.”
An unknown source familiar with the matter said Obama administration officials told China, "We need to know that you are serious. So we gave them a list, and we said – 'Look, here's the guys. Round them up.'"
"We've removed the apps from the app store that we know have been created with this counterfeit software," Apple spokesperson Christine Monaghan told Guardian. "We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps."
"For the next step, the public security organs will continue to increase their investigation and crackdown on cyber crimes," according to the Chinese Ministry of Public Security.
"The connectivity problems have been identified as a DDoS attack. We're working to mitigate now," GitHub status log read early on Tuesday.
"Cyber attacks are generally anonymous and conducted across borders, and their origins are hard to trace," said Hong Lei, a foreign ministry spokesman. "Not to carry out deep investigation and keep using words such as 'possible' is irresponsible and unscientific."
"This behavior is occurring locally and beyond the reach of our servers," a spokesperson from Facebook told The Verge. "We are investigating the situation."
"APT30’s attempts to compromise journalists and media outlets could also be used to punish outlets that do not provide favorable coverage – for example, both the New York Times and Bloomberg have had trouble securing visas for journalists in wake of unfavorable corruption reporting,", the report said.
"APT30 uses three pieces of malware [SHIPSHAPE, SPACESHIP, FLASHFLOOD] that are believed to have been designed to propagate to removable drives with the intent of eventually infecting and stealing data from computers located on air-gapped networks."
"It means that the Chinese have discarded their fig leaf of quasi-plausible deniability," McReynolds said. "As recently as 2013, official PLA [People's Liberation Army] publications have issued blanket denials such as, 'The Chinese military has never supported any hacker attack or hacking activities.' They can't make that claim anymore."
"It appears that Anthem’s security system did not involve encrypting Social Security numbers and birth dates –- two of the most valuable pieces of information that a thief can have," Susan Morris said in her complaint filed in federal court in Santa Ana, California.
"We're going to need federal legislation to address security issues to keep these huge hacks from happening," says Waldo Jaquith, who leads U.S. Open Data, which works with the public sector and private companies to better understand, store and share data.
"Your Social Security number is not going to change," said Gorup. "This is going to stick with you for life."
"The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China," The New York Times reports.
"An overly broad, opaque, discriminatory approach to cybersecurity policy that restricts global internet and ICT products and services would ultimately isolate Chinese ICT firms from the global marketplace and weaken cybersecurity, thereby harming China's economic growth and development and restricting customer choice," the paper read.
Want more Interesting Articles to your Inbox every Morning? We'll keep you up to date with Latest News and In-Depth coverage of Current and Future Trends in Information technology. Subscribe & WIN a Free Pass to NULLCON 2016
No Thanks, I Don't want to Learn anything New