Chinese hackers increasingly view Russia as extraction, Bloomberg reports with reference to the chief antivirus expert “Kaspersky Lab” Alexander Gostev. According to Gostev, in the first seven months of 2016 “Kaspersky Lab” recorded 194 hacker attacks on the network of Russian companies, which is almost three times more than for the whole of 2015 (72).
According to the company targets organized from China of cyberattacks, which were used more than 50 varieties of “Trojans”, in January—July of 2016 were at least 35 companies and agencies. Gostev declined to name specific companies, but said that came under attack seven enterprises of the military-industrial complex specializing in the development and production of missiles, radar, shipbuilding, and four companies related to the aviation industry, two enterprises of the nuclear industry and five ministries.
While the actual number of attacks could be much higher, as only 10% of corporate clients according to “Kaspersky Lab” about attacks on their networks, said Gostev.
Direct evidence that the organization of hacker attacks cost the Chinese authorities, the experts “Kaspersky Lab” no, but a clear preference for cyber-espionage hacking financial networks and methods of work of Chinese hackers show, according to Gostev, that attack is likely to either be approved or funded by the state, and in some cases, might have been military.
“They work on the principle of vacuum, downloading all indiscriminately, and then someone analyzes the stolen data. To handle such volumes [of information] needs hundreds of specialists,” explained Gostev.
In early summer, the company CrowdStrike reported on the rise of Chinese hackers outside the United States. According to the company, the Chinese are interested mainly in the Russian and Ukrainian military targets, the Indian political groups and the Mongolian mining industry.
The representative of the company “Kaspersky Lab Kurt Baumgartner told Reuters then about the “flurry of espionage activities against the Russian government institutions and technology firms, as well as against other purposes in India, Japan and South Korea.” The expert stressed that the hackers “used tools and infrastructure that depend on Chinese characters”.