Titan Rain
Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years.[1] The attacks originated in Guangdong, China.[2] The activity is believed to be associated with a state-sponsored advanced persistent threat. It was given the designation Titan Rain by the federal government of the United States.
Titan Rain hackers gained access to many United States defense contractor computer networks, which were targeted for their sensitive information,[1] including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.
Attackers
The attacks are believed to be the result of actions by People's Liberation Army Unit 61398. [3] These hackers attacked both the US government (Defense Intelligence Agency) and the UK government (Ministry of Defence). In 2006, an "organised Chinese hacking group" shut down a part of the UK House of Commons computer system.[4] The Chinese government has denied responsibility.
Consequences
The U.S. government has blamed the Chinese government for the 2004 attacks. Alan Paller, SANS Institute research director, stated that the attacks came from individuals with "intense discipline" and that "no other organisation could do this if they were not a military". Such sophistication has pointed toward the People's Liberation Army as the attackers.[5]
Titan Rain reportedly attacked multiple organisations, such as NASA and the FBI. Although no classified information was reported stolen, the hackers were able to steal unclassified information (e.g., information from a home computer) that could reveal strengths and weaknesses of the United States.[6]
Titan Rain has also caused distrust between other countries (such as the United Kingdom and Russia) and China. The United Kingdom has stated officially that Chinese hackers attacked its governmental offices. Titan Rain has caused the rest of the world to be more cautious of attacks not just from China but from other countries as well.
See also
References
- Bodmer, Sean; Kilger, Max; Carpenter, Gregory; Jones, Jade (July 24, 2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. ISBN 978-0071772495., ISBN 978-0071772495
- "TIME Magazine Archive Article -- the Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them) -- Sep. 05, 2005".
- "Connect the Dots on State-Sponsored Cyber Incidents - Titan Rain".
- Norton-Taylor, Richard (September 5, 2007). "Titan Rain - how Chinese hackers targeted Whitehall". The Guardian. Retrieved 2018-05-10.
- "The lesson of Titan Rain: Articulate the dangers of cyber attack to upper management". Homeland Security News Wire. December 14, 2005. Retrieved 2018-05-10.
- "The 7 worst cyberattacks in history (that we know about)". Dvice. September 22, 2010. Archived from the original on November 12, 2014.
External links
- Graham, Bradley (2005-08-25). "Hackers Attack Via Chinese Web Sites". Washington Post.
- Espiner, Tom (2005-11-23). "Security experts lift lid on Chinese hack attacks". ZDNet News. Archived from the original on 2006-12-11.
- Thornburgh, Nathan (2005-08-25). "Inside the Chinese Hack Attack". Time.com.
- Thornburgh, Nathan (2005-08-29). "The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them)". Time.
- Brenner, Bill (2005-08-31). "Myfip's Titan Rain connection". SearchSecurity.com.
- Onley, Dawn S.; Wait, Patience (2007-08-21). "Red Storm Rising". Government Computing News.
- Norton-Taylor, Richard (2007-09-05). "Titan Rain - how Chinese hackers targeted Whitehall". theguardian.com.
- Winkler, Ian (2005-10-20). "Guard against Titan Rain hackers". computerworld.com.