• Home
  • Science
  • Technology
  • Futurism
  • Weather Extreme

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New AI tools make it easy to create fake video, audio and text : NPR

March 23, 2023

Chatbot Start-Up Character.AI Valued at $1 Billion in New Funding Round

March 23, 2023

ROCKET LAUNCH SpaceX Falcon 9 Starlink 5-5

March 23, 2023
Facebook Twitter Instagram
  • Demos
  • Buy Now
Facebook Twitter Instagram YouTube
Futurist JournalFuturist Journal
Demo
  • Home
  • Science
  • Technology
  • Futurism
  • Weather Extreme
Futurist JournalFuturist Journal
Home » Chinese hackers disguised themselves as Iran to target Israel
Futurism

Chinese hackers disguised themselves as Iran to target Israel

NewsBy NewsAugust 10, 2021Updated:August 11, 2021No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

The only obvious countermove to this problem is to put investigators off the trail by going after targets that aren’t really of interest. But that causes its own issues: raising the volume of activity vastly increases the chances of getting caught.  

The fingerprints left by the attackers were enough to eventually convince Israeli and American investigators that the Chinese group, not Iran, was responsible. The same hacking group has used similar deceptive tactics before. In fact, it may even have hacked the Iranian government itself in 2019, adding an extra layer to the deception. 

It is the first example of a large-scale Chinese hack against Israel, and comes in the wake of a set of multibillion-dollar Chinese investments in the Israeli tech industry. They were made as part of Beijing’s Belt and Road Initiative, an economic strategy meant to rapidly expand Chinese influence and reach clear across Eurasia to the Atlantic Ocean. The United States warned against the investments on the grounds that they would be a security threat. (The Chinese embassy in Washington, DC, did not immediately respond to a request for comment.)

Misdirection and misattribution

UNC215 ’ s attack on Israel was not particularly sophisticated or successful, but it shows how important attribution—and misattribution—can be in cyber-espionage campaigns. Not only does it provide a potential scapegoat for the attack, but it also gives diplomatic cover to the attackers: when confronted with evidence of espionage, Chinese officials regularly argue that it is difficult or even impossible to trace hackers.

And the attempt to misdirect investigators raises an even bigger question: How often do false-flag attempts fool investigators and victims? Not that often, says Hultquist.

“The thing about these deception efforts is if you look at the incident through a narrow aperture, it can be very effective,” he says. But even if an individual attack is successfully misattributed, An individual attack may be successfully misattributed, but over the course of many attacks it becomes harder and harder to maintain the charade. That’s the case for the Chinese hackers targeting Israel throughout 2019 and 2020.

“It’s very hard to keep the deception going over multiple operations.”

John Hultquist, FireEye

“Once you start tying it to other incidents, the deception loses its effectiveness,” Hultquist explains. “It’s very hard to keep the deception going over multiple operations.”

The best-known attempt at misattribution in cyberspace was a Russian cyberattack against the 2018 Winter Olympics opening ceremony in South Korea, dubbed Olympic Destroyer. The Russians attempted to leave clues pointing to North Korean and Chinese hackers—with contradictory evidence seemingly designed to prevent investigators from ever being able to come to any clear conclusion. 

“Olympic Destroyer is an amazing example of false flags and attribution nightmare,” Costin Raiu, director of the global research and analysis team at Kaspersky Lab, tweeted at the time.

Eventually, researchers and governments did definitively pin the blame for that incident on the Russian government, and last year the United States indicted six Russian intelligence officers for the attack.

Those North Korean hackers who were initially suspected in the Olympic Destroyer hack have themselves dropped false flags during their own operations. But they were also ultimately caught and identified by both private-sector researchers and the United States government, which indicted three North Korean hackers earlier this year.

“There’s always been a misperception that attribution is more impossible than it is,” says Hultquist. “We always thought false flags would enter the conversation and ruin our entire argument that attribution is possible. But we’re not there yet. These are still detectable attempts to disrupt attribution. We are still catching this. They haven’t crossed the line yet.”

Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News
  • Website

Related Posts

New AI tools make it easy to create fake video, audio and text : NPR

March 23, 2023

How Chromium unlocked tech’s hottest new category: the enterprise browser

March 23, 2023

Unreal Videos Give Us A Glimpse At The Graphics Of The Future

March 23, 2023

Michael Bennet writes Big Tech giants over creepy chatbot stories

March 22, 2023

How can CIOs protect Personal Identifiable Information (PII) for a new class of data consumers?

March 22, 2023

3 Tech Stocks Well Positioned For Growth At A Reasonable Price

March 22, 2023

Leave A Reply Cancel Reply

You must be logged in to post a comment.

Recent Posts
  • New AI tools make it easy to create fake video, audio and text : NPR
  • Chatbot Start-Up Character.AI Valued at $1 Billion in New Funding Round
  • ROCKET LAUNCH SpaceX Falcon 9 Starlink 5-5
  • Climate Freeloaders Are Destroying the Planet
  • How Chromium unlocked tech’s hottest new category: the enterprise browser
Recent Comments
    Demo
    Top Posts

    At Mavericks beach, climate change is reshaping big-wave surfing

    March 22, 20231 Views

    Sims sparks Ga. Tech to 45-22 upset of No. 21 North Carolina

    September 26, 20211 Views

    New AI tools make it easy to create fake video, audio and text : NPR

    March 23, 20230 Views
    Don't Miss

    New AI tools make it easy to create fake video, audio and text : NPR

    March 23, 2023

    Business professor at the University of Pennsylvania’s Wharton School Ethan Mollick used a photo of…

    Chatbot Start-Up Character.AI Valued at $1 Billion in New Funding Round

    March 23, 2023

    ROCKET LAUNCH SpaceX Falcon 9 Starlink 5-5

    March 23, 2023

    Climate Freeloaders Are Destroying the Planet

    March 23, 2023
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Demo
    Most Popular

    At Mavericks beach, climate change is reshaping big-wave surfing

    March 22, 20231 Views

    Sims sparks Ga. Tech to 45-22 upset of No. 21 North Carolina

    September 26, 20211 Views

    New AI tools make it easy to create fake video, audio and text : NPR

    March 23, 20230 Views
    Our Picks

    New AI tools make it easy to create fake video, audio and text : NPR

    March 23, 2023

    Chatbot Start-Up Character.AI Valued at $1 Billion in New Funding Round

    March 23, 2023

    ROCKET LAUNCH SpaceX Falcon 9 Starlink 5-5

    March 23, 2023

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Futurist Journal
    Facebook Twitter Instagram Pinterest YouTube Dribbble
    • Contact Us
    • Privacy Policy
    © 2023 futuristjournal.com - All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.