Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Chinese hacking threat set to grow

Trouble from behind the wall.

Article comments

The number of Chinese hackers is set to increase according to a new report from Symantec. The company noted the steep rise in the number of Internet users with a commensurate interest in criminal hacking and government spying.

"China’s hacking scene is clearly an active one," the Symantec report said. "These individuals and groups are known for discovering vulnerabilities, writing exploit code and developing sophisticated hacking techniques."

China ranks second behind the US as far as malicious activity on the Internet as a whole, Symantec said, citing its own data. The country had 131 million Internet users as of the end of 2006, accounting for about 10 percent of its population and 11 percent of the world's Internet users.

A well-known cyberwar between Chinese and American hackers erupted in April 2001 following the collision of a US military spy plane and Chinese fighter. US government websites were hacked and defaced with slogans such as "Beat down imperialism of American," courtesy of a group calling itself the Honker Union of China.

Not to be out-hacked, US hackers responded over China's handling of the incident, which involved an awkward demand for an apology.

But perhaps more disturbing have been the efficient ways Chinese hackers are believed to have obtained sensitive information. In June 2004, South Korea was reportedly victimised by a concerted attack using Trojan horse programs - which appear harmless but have malicious functions - to pilfer classified documents on weapons systems.

In total, 211 South Korean government computers are believed to have been compromised, in addition to 67 other machines belonging to companies, media groups and universities, according to Symantec.

Chinese computer gurus have also experimented with the "pump-and-dump" scheme, a trick used to inflate stock prices for profit, Symantec said. Starting in October 2004, a group used a Trojan horse to steal account details for users of several online stock traders, then used the accounts to run-up certain stocks.

The victims lost more than US$1.3 million, with the attackers profiting around $114,000.

But in recent years, some of the bad guys have come clean, starting up their own computer security companies. China now has about six anti-virus vendors, in addition to a number of computer security research and consulting groups.

However, there's "growing concern of an escalated cyber threat from China, from the perspective of both governments and enterprises," Symantec said.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *