Advertisement
Advertisement
Cybersecurity
Get more with myNEWS
A personalised news feed of stories that matter to you
Learn more
The US Department of Homeland Security emblem is pictured at the National Cybersecurity & Communications Integration Centre (NCCIC) located just outside Washington in Arlington, Virginia, on September 24, 2010. Photo: Reuters

China-linked hackers used VPN flaw to target US defence industry, researchers say

  • Ivanti researchers say hackers utilised a VPN vulnerability to access systems belonging to some customers
  • FireEye researchers suspect at least one of the two hacking groups worked for Beijing

At least two groups of China-linked hackers have spent months using a previously undisclosed vulnerability in American virtual private networking devices to spy on the US defence industry, researchers and the devices’ manufacturer said Tuesday.

Utah-based IT company Ivanti said in a statement the hackers took advantage of the flaw in its Pulse Connect Secure suite to break into the systems of “a very limited number of customers.”

The Ivanti logo and cyber binary codes are seen in this illustration taken on April 20, 2021. Photo: Reuters

Ivanti said that while mitigations were in place, a fix for the issue would be unavailable until early May.

Ivanti provided no detail about who might be responsible for the espionage campaign but, in a report timed to Ivanti’s announcement, cybersecurity company FireEye Inc said it suspected that at least one of the hacking groups operates on behalf of the Chinese government.

“The other one we suspect is aligned with China-based initiatives and collections,” said Charles Carmakal, a senior vice-president of Mandiant, an arm of FireEye, ahead of the report’s release.

Advertisement

Tying hackers to a specific country is fraught with uncertainty, but Carmakal said his analysts’ judgment was based on a review of the hackers’ tactics, tools, infrastructure and targets – many of which echoed past China-linked intrusions.

Chinese Embassy spokesperson Liu Pengyu said China “firmly opposes and cracks down on all forms of cyberattacks,” describing FireEye’s allegations as “irresponsible and ill-intentioned.”

FireEye declined to name the hackers’ targets, identifying them only as “defence, government, and financial organisations around the world.” It said the group of hackers suspected of working on Beijing’s behalf were particularly focused on the US defence industry.

In a statement, the cyber arm of the Department of Homeland Security said it was working with Ivanti “to better understand the vulnerability in Pulse Secure VPN devices and mitigate potential risks to federal civilian and private sector networks.”

Advertisement

The US National Security Agency declined to comment. US officials have repeatedly accused Chinese hackers of stealing American military secrets over the years through various means.

Lately networking devices, which can be hard for companies to monitor, have emerged as a favoured avenue for digital spies.

01:40

Chinese PLA officers charged with stealing personal data of Americans in Equifax credit agency hack

Chinese PLA officers charged with stealing personal data of Americans in Equifax credit agency hack

In 2020 FireEye warned that Beijing-aligned hackers were targeting devices manufactured by Citrix Systems Inc and Cisco Systems Inc to break into a host of companies in what it described as one of the broadest campaigns by a Chinese actor that it had seen in years.

Advertisement

The timing of the latest series of hacks was not made explicit, although FireEye’s report said it investigated them “early this year.”

Carmakal added that the hackers were operating from US digital infrastructure and borrowing the naming conventions of their victims to camouflage their activity so they would look like any other employee logging in from home.

“We are seeing pretty advanced tradecraft,” he said.

Advertisement
3