Help

BI’s Article search uses Boolean search capabilities. If you are not familiar with these principles, here are some quick tips.

To search specifically for more than one word, put the search term in quotation marks. For example, “workers compensation”. This will limit your search to that combination of words.

To search for a combination of terms, use quotations and the & symbol. For example, “hurricane” & “loss”.

Login Register Subscribe

China-based campaign breached satellite, defense firms: Symantec

Reprints
China-based campaign breached satellite, defense firms: Symantec

(Reuters) — A sophisticated hacking campaign launched from computers in China burrowed deeply into satellite operators, defense contractors and telecommunications companies in the United States and southeast Asia, security researchers at Symantec Corp. said on Tuesday.

Symantec said the effort appeared to be driven by national espionage goals, such as the interception of military and civilian communications.

Such interception capabilities are rare but not unheard of, and the researchers could not say what communications, if any, were taken. More disturbing in this case, hackers infected computers that controlled the satellites, so that they could have changed the positions of the orbiting devices and disrupted data traffic, Symantec said.

"Disruption to satellites could leave civilian as well as military installations subject to huge [real world] disruptions," said Vikram Thakur, technical director at Symantec. "We are extremely dependent on their functionality."

Satellites are critical to phone and some internet links as well as mapping and positioning data.

Symantec, based in Mountain View, California, described its findings to Reuters exclusively ahead of a planned public release. It said the hackers had been removed from infected systems.

Symantec said it has already shared technical information about the hack with the U.S. Federal Bureau of Investigation and Department of Homeland Security, along with public defense agencies in Asia and other security companies.

Mr. Thakur said Symantec detected the misuse of common software tools at client sites in January, leading to the campaign's discovery at unnamed targets. He attributed the effort to a group that Symantec calls Thrip, which may be called different names by other companies.

Thrip was active from 2013 on and then vanished from the radar for about a year until the last campaign started a year ago. In that period, it developed new tools and began using more widely available administrative and criminal programs, Mr. Thakur said.

Symantec provides the most widely used paid security software for consumers and an array of higher-end software and services for companies and public agencies.

 

 

 

Read Next

  • Challenge to anti-hacking law rejected on appeal

    (Reuters) — A divided federal appeals court on Tuesday gave the U.S. Department of Justice broad leeway to police password theft under a 1984 anti-hacking law, upholding the conviction of a former Korn/Ferry International executive for stealing confidential client data.