Chinese cyber spies: Pwning U.S. businesses since 2006

What oversees 1 billion citizens, a cyber spy army, and hacks of Coca-Cola and Lockheed Martin? China's government, says Mandiant security

Page 2 of 2

Mandiant also released a five-minute video that shows hackers in various acts of hacking, illustrated via screen captures. And its report is full of fascinating facts. For example, Mandiant released the handles it assigned three of these hackers -- DOTA, SuperHard, and UglyGorilla -- and goes into some detail about each one.

DOTA may have taken his name from a game called Defense of the Ancients and is apparently a "Harry Poter" (sic) fan. SuperHard gets his moniker from his habit of replacing the names of companies within hacked modules with the word "SuperHard" -- so Microsoft Corp. within CMD.exe becomes SuperHard Corp. (That seems about right.) UglyGorilla is apparently just ugly, but his real name is probably the somewhat redundant Wang Dong.

Also: In Chinese hacker slang, an infected computer is called a "meat chicken." Aren't you happy you bothered to read this blog post now?

Make no mistake, this is serious stuff. But the biggest takeaway for me is how thoroughly unsurprising this news is. We were always pretty sure the Chinese were hacking us, though it's unclear whether they were behind the recent attacks on Twitter and Facebook, and Burger King's potty-mouthed tweets. Now we have even more proof.

The question is, what do we do about it? That is, besides stocking plenty of water, batteries, and beef jerky for the day when the Chinese decide it's time to shut off the lights.

How should the United States respond to Chinese hack attacks? Post your defensive strategies below or email me:

This article, "Chinese cyber spies: Pwning U.S. businesses since 2006," was originally published at Follow the crazy twists and turns of the tech industry with Robert X. Cringely's Notes from the Field blog, and subscribe to Cringely's Notes from the Underground newsletter.

| 1 2 Page 2
From CIO: 8 Free Online Courses to Grow Your Tech Skills
View Comments
Join the discussion
Be the first to comment on this article. Our Commenting Policies