China's Defense Ministry calls accusations of state-sponsored hacking groundless

China's Defense Ministry points to flaws in claims that the nation's military supports cyberespionage

China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence.

The ministry made the statement after U.S. security firm Mandiant released a 74-page report documenting evidence, including IP addresses, that traced a large number of international cyberattacks to what it claims is likely to be a unit of China's People's Liberation Army based in Shanghai. The so-called "Unit 61398" has stolen data, such as intellectual property, from at least 141 companies since 2006, it said.

China's Defense Ministry, however, said in a statement online that Mandiant's claims were groundless. It added that the report made its conclusion by only relying on IP addresses to trace the cyberattacks to China.

"As we all know, hacking attacks occur almost everyday by using stolen IP addresses. This is a common practice and is a matter of common sense," the ministry said. "Secondly, there still is no standard definition for 'cyber attack', and the report's claim that the daily gathering of online information construes as cyber espionage lacks a legal basis."

The ministry further added that cyber attacks are both transnational and occur anonymously, making them hard to pinpoint. "China is one the major victims of cyber attacks," it said. "According to the IP addresses found, a considerable number of the attacks come from the U.S., but we have not blamed the U.S. side for this."

In the past, Chinese authorities have consistently denied supporting cyberattacks, despite mounting reports of sophisticated hacking coming from the nation that has shut down activist sites and allegedly breached systems from companies including Google.

Mandiant's report said it was "highly unlikely" the Chinese government was unaware of the hacking attacks, and was possibly supporting the cyberespionage.

Security expert Jeffrey Carr cast doubt on the conclusions of the Mandiant report. "My problem is that Mandiant refuses to consider what everyone that I know in the Intelligence Community acknowledges -- that there are multiple states engaging in this activity; not just China," he said in a blog post.

Join the CSO newsletter!

Error: Please check your email address.

Tags Government use of ITsecuritydata breachgovernmentMandiantmalware

More about Google

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Michael Kan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts