Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

New report says cyberspying group linked to China's army

Mandiant said in a report that the group was a People's Liberation Army unit under cover

A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically an unit that goes under the cover name "Unit 61398".

Security company Mandiant said in a report released Tuesday that an Advanced Persistent Threat group it called APT1 was one of the most persistent of China's cyberthreat actors because of its likely government support.

"In seeking to identify the organization behind this activity, our research found that People's Liberation Army (PLA's) Unit 61398 is similar to APT1 in its mission, capabilities, and resources," Mandiant said in its report. "PLA Unit 61398 is also located in precisely the same area from which APT1 activity appears to originate."

Unit 61398 is said to be located in a 130,663 square-foot building on Datong Road in Gaoqiaozhen, in the Pudong New Area of Shanghai.

The nature of the work of "Unit 61398" is considered by China to be a state secret, but Mandiant said it believes it engages in harmful computer network operations.

The group has a sinister track record, according to Mandiant, as since 2006, it has observed APT1 compromise 141 companies spanning 20 major industries. 87 percent of the target companies are headquartered in countries where English is the native language, and are in industries that China has identified as strategic.

APT1 uses tools that the security firm finds have not been used by other groups, including two tools for stealing emails called GETMAIL and MAPIGET. Once the group has established access, it periodically revisits the victim's network over several months or years to steal a variety of intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists from the leadership of the victim organizations, Mandiant said.

The Chinese government was not immediately available for comment. The government has been accused recently of hacking into emails of major newspapers, which it has denied.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: no company, security, Mandiant
Latest Blog Posts
Whitepapers
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • Smarter Data Centre Outsourcing: Considerations for CFOs
    Deloitte explores the business and finance implications associated with managing data centres. This paper outlines the options available to structure an organisations data centre and complementary IT services and provides the key considerations that need to be reviewed when determining which option works best for them.
    Learn more »
  • All Flash and Databases - Storage Switzerland
    This webcast explores how All-Flash enterprise storage compares to traditional disk-centric arrays. Learn how to best leverage Flash so databases thrive and limitations of I/O disappear, while exploring the pitfalls and peculiarities of Flash, and how to optimise its performance as a storage solution to ensure reliance, predictability and cost savings for a variety of enterprise workloads.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments