Cybersecurity

The Chinese Army Is Trying to Hack a Missouri Water Plant

Dmitry Bruskov/Shutterstock.com

The question of whether the Chinese military is on a hacking offensive has largely been answered -- and, despite Chinese government protestations, it sure looks like a pretty big “yes.” However, beyond the widely reported infiltration of foreign companies, the question of what else it’s hacking remains hazy.

But new research confirms one of the scarier possibilities: that the Chinese army is going after critical US infrastructure.

This all came out of a project by Kyle Wilhoit, a researcher at a security company called Trend Micro, that set up decoy “honeypots,” as decoy infrastructure systems are known, in 12 different countries. Wilhoit’s construction of a rural Missouri water plant honeypot attracted the notorious APT1, a crackerjack Chinese military hacking team sometimes known as Comment Crew, according to research he presented at the Black Hat security conference in Las Vegas. The group gained access in December 2012 through a Microsoft Word document containing malware unique to APT1.

“I actually watched the attacker interface with the machine,” he told the MIT Technology Review, referring to APT1. “It was 100 percent clear they knew what they were doing.”

Threatwatch Alert

Insider attack / Stolen credentials / Stolen device

Former Hospital Contractor Nicks Equipment Worth $100,000 Allegedly to Afford Pill Addiction

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
// 4:40 PM ET
X CLOSE Don't show again

Like us on Facebook