In what must be every process engineer's post-
Stuxnet nightmare, a group of Chinese cybersoldiers, known by US security firms as the "Comment Crew" or "Shanghai Group," are trying to penetrate America's critical infrastructure, which has included hacking one company that enables remote monitoring of oil and gas pipelines, according to a
New York Times article by David Sanger, the reporter who originally broke the Stuxnet computer virus story. These attacks have been traced back to a building on the outskirts of Shanghai, which is the headquarters of the People's Liberation Army (P.L.A.) Unit 61398. Digital evidence painstakingly detailed in a
60-page study by Mandiant, an American computer security firm, and confirmed by American intelligence officials, leaves little doubt about the attackers' intentions. Along with at least 937 Command and Control servers hosted in 13 countries, the report posits a large and varied support staff:
(the cybersoldiers) would need to be directly supported by linguists, open source researchers, malware authors, industry experts who translate task requests from requestors to the operators, and people who then transmit stolen information to the requestors.
Mandiant estimates that the group's 130,663 square foot building can house as many as 2,000 people; the security company also obtained an internal memo from state-owned China Telecom discussing the installation of high-speed fiber-optic lines. (David Sanger interviews Kevin Mandia, founder of Mandiant.)
A digitally weaponized world
Although the report can't put the hackers in the building, it emphatically states that there is no other reason why so many attacks have come from such a small geographical area. Watch Mandiant forensically dissect an observed attack, referring to the attackers as the Advanced Persistent Threat (APT) group or APT1: