Second Chinese Army Unit Linked to Corporate Cyber-Espionage

A Chinese hacking group that has attacked U.S. and European aerospace and communications companies is almost certainly linked to the Chinese military, a U.S. Internet security company said Monday.

A Chinese hacking group that has attacked U.S. and European aerospace and communications companies is almost certainly linked to the Chinese military, a U.S. Internet security company said Monday.

[ Did China's Army Hack U.S. Companies? ]

"Putter Panda" has been active for several years, and a trail of Internet postings and domain registrations by one of its members points to it being part of Unit 61486 of China's People's Liberation Army, said Irvine, California-based CrowdStrike in a 62-page report.

The unit is different from the one recently named by the U.S. Department of Justice in a series of indictments of Chinese citizens.

CrowdStrike said the link between the attacks and the Chinese army was established through a number of Internet postings, photo uploads and domain registrations made by one of the group's members.

The same name, Chen Ping, or associated email addresses and aliases were used to register a number of domain names that were used to host malware or control hacking tools. Some contain the names of major Japanese gaming companies, such as Konami and Namco, while others mention Kyocera, BMW and Nestle. There's also one named "Windows Updote," an easily missed incorrect spelling of Microsoft's Windows Update.

Accounts on websites and blogs pointed to Chen living in Shanghai and having an interest in Internet security. In one photo uploaded after a drinking session with friends, two PLA officers' peaked caps can be seen in the background.

Another picture posted by Chen from "the office" shows several large satellite dishes on the grounds of the building's compound. The dishes have been located at a Shanghai building known to house a PLA signals intelligence unit. As if to make the link clearer, Chen at one point registered one of his domain names to the building's address.

"When you look at operational security of some of the folks involved in this high-profile cyber-espionage, you would think they would be a little more careful about how they operate," said George Kurtz, president and CEO of CrowdStrike.

But despite its poor operational security, Unit 61486 is a determined adversary, the report said.

"They are roughly equivalent to the other actors we've seen coming out of China," said Adam Meyers, CrowdStrike's vice president of intelligence. "They've got a whole bunch of custom stuff they have built, a lot of different tools, and they have some degree of capability."

In late May, the U.S. Department of Justice indicted five Chinese nationals on charges of hacking U.S. companies to obtain trade secrets.A It was the first time the U.S. had formally indicted state-sponsored hackers.

The Chinese government denied the claims and called them "fabricated," and in a subsequent report the government said it was a victim of U.S. cyberattacks.

That response was part of the motivation for CrowdStrike's new report, Kurtz said.

"We see a lot on the ground, where we see first hand the intellectual property theft taking place," he said. "We really wanted to put this story out there to say it isn't a one-off in terms of the U.S. government's indictments. It's a sustained, coordinated and systematic campaign against companies around the globe."

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com

This story, "Second Chinese Army Unit Linked to Corporate Cyber-Espionage" was originally published by IDG News Service .

Join the discussion
Be the first to comment on this article. Our Commenting Policies