Entries filed under 'People’s Republic of China'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
June 17, 2013 4:40 PM By Intel Team
There's often a lot of rhetoric in the press and in the security community around threats to the utilities industry, and risk exposure surrounding critical infrastructure. We've determined that the utilities industry (power, water, waste) has been, and likely will continue to be, a target for cyber espionage primarily from Chinese APT groups. We also anticipate that U.S. utilities infrastructure is vulnerable to computer network attack (CNA) from a variety of threat actors motivated by a desire to disrupt, deny access, or destroy. It's important to recognize the difference between actors seeking to steal data or intellectual property, and actors seeking to destroy systems or cause mass destruction. Often the distinction between computer network exploitation (CNE) and CNA gets lost in media coverage that bundles diverse cyber activity together. The type of cyber activity has implications for how we tackle the problem, thus it's key to distinguish.Read more...
May 29, 2013 9:13 PM By Chris Lew
One of the most common criticisms of the hypothesis that the People's Republic of China (PRC) conducts corporate espionage is that Beijing would not risk the political and economic fallout that would occur if their role was discovered and exposed. Along those same lines, most people assume that the PRC would conduct political or military espionage, as most other states do, but not necessarily partake in corporate espionage. From the political science or economic perspectives, there are indeed considerable disadvantages to state-sponsored corporate espionage, but in this case one must be careful to avoid the intellectual bias of mirror imaging. There are three important historical factors that contradict the idea that the PRC would conduct one form of espionage but not the other, and these must be taken into account when attempting to determine Beijing's involvement or lack thereof.Read more...