Canada markets closed
  • S&P/TSX

    19,366.69
    +230.88 (+1.21%)
     
  • S&P 500

    4,173.85
    +61.35 (+1.49%)
     
  • DOW

    34,382.13
    +360.68 (+1.06%)
     
  • CAD/USD

    0.8263
    +0.0040 (+0.49%)
     
  • CRUDE OIL

    65.51
    +1.69 (+2.65%)
     
  • BTC-CAD

    59,571.21
    -2,389.18 (-3.86%)
     
  • CMC Crypto 200

    1,398.33
    +39.77 (+2.93%)
     
  • GOLD FUTURES

    1,844.00
    +20.00 (+1.10%)
     
  • RUSSELL 2000

    2,224.63
    +53.68 (+2.47%)
     
  • 10-Yr Bond

    1.6350
    -0.0330 (-1.98%)
     
  • NASDAQ

    13,429.98
    +304.99 (+2.32%)
     
  • VOLATILITY

    18.81
    -4.32 (-18.68%)
     
  • FTSE

    7,043.61
    +80.28 (+1.15%)
     
  • NIKKEI 225

    28,084.47
    +636.46 (+2.32%)
     
  • CAD/EUR

    0.6799
    -0.0003 (-0.04%)
     

Suspected Chinese hackers spied on US, European targets

·2 min read

Suspected state-backed Chinese hackers exploited widely used networking devices to spy for months on dozens of high-value government, defence industry and financial sector targets in the U.S. and Europe, according to FireEye, a prominent cybersecurity firm.

FireEye said Tuesday that it believes two hacking groups linked to China broke into several targets through Pulse Connect Secure devices, which numerous companies and governments use for secure remote access to their networks.

After FireEye released a blog post detailing its findings Tuesday, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency issued an alert saying it was aware of “ongoing exploitation" of Pulse Connect Secure that is “compromising U.S. government agencies, critical infrastructure entities, and private sector organizations.” The agency did not provide additional details about which organizations were breached.

Ivanti, the Utah-based owner of Pulse Connect Secure, said a limited number of customers “experienced evidence of exploit behaviour ." The company said the hackers used three known exploits and a previously unknown one.

The company says it will release a patch in early May.

Charles Carmakal, the chief technology officer at FireEye, said it is still trying to piece together details about the hack but that available evidence suggests the hackers are aligned with the Chinese government.

Carmakal, whose company discovered in December the monthslong SolarWinds hacking campaign attributed to Russian cyberspies, said the Pulse Connect Secure hack had several notable aspects: The hackers were highly skilled, were able to evade multifactor authentication and could stay hidden on a penetrated network even if software was reset or upgraded.

“Their tradecraft is really good,” he said.

Neither FireEye nor Ivanti would specify who was targeted. But Carmakal said those hacked were government agencies in both the U.S. and Europe as well as U.S-based defence companies “you would anticipate the Chinese government being interested in.”

“They're very high-profile victims,” he said.

A spokesman for the Chinese Embassy, Liu Pengyu, said “it is irresponsible and ill-intentioned to accuse a particular party when there is no sufficient evidence around.”

The new disclosure comes at a time of heightened interest in U.S. cybersecurity defences . U.S. officials are still grappling with the aftereffects of the SolarWinds intrusion, which struck agencies including the Treasury, Justice and Homeland Security departments.

The breach exposed vulnerabilities in the supply chain as well as weaknesses in the federal government’s own cyber defences .

Alan Suderman, The Associated Press