Chinese Military Tied to Prolific Hacking Group Targeting U.S. Aerospace Industry

In this Tuesday, Nov. 26, 2013 photo, a crew member of Chinese People's Liberation Army (PLA) Navy monitors on the deck of the China's aircraft carrier, the Liaoning, sailing on the East China Sea for sea trials. The Liaoning departed for its first-ever sea trials in the South China Sea, a mission likely to draw scrutiny amid Beijing's drive to assert its claims to those waters and their island groups. (AP Photo) CHINA OUT

In operation since 2007, “Putter Panda” is latest group to be implicated by researchers 

For Ars TechnicaDan Goodin reports: Investigators said they have identified a secretive hacking group that has spent years systematically targeting US partners in the space and satellite industry, most likely on behalf of the Chinese military.

“Putter Panda is a determined adversary group, conducting intelligence-gathering operations targeting the Government, Defense, Research, and Technology sectors in the United States, with specific targeting of the US Defense and European satellite and aerospace industries.”

— Crowdstrike researchers

The group typically gains a foothold in sensitive networks by attaching booby-trapped documents to e-mails, according to a 62-page report published Monday by Crowdstrike, a firm that conducts forensic investigations on behalf of customers who have suffered security breaches. When employees click on the documents, the attackers are able to gain control over their PCs. The attackers then use the PCs to take control of servers housing blueprints, customer lists, or other sensitive data. The group, dubbed as Putter Panda, is connected to Unit 61486 of the People Liberation Army’s (PLA’s) Third General Staff Department, according to the report.

“Putter Panda is a determined adversary group, conducting intelligence-gathering operations targeting the Government, Defense, Research, and Technology sectors in the United States, with specific targeting of the US Defense and European satellite and aerospace industries,” Crowdstrike researchers wrote. “The PLA ’s GSD Third Department is generally acknowledged to be China’s premier Signals Intelligence (SIGINT) collection and analysis agency, and the 12th Bureau Unit 61486, headquartered in Shanghai, supports China’s space surveillance network.”

The report is the latest to charge the Chinese military with supporting a comprehensive espionage campaign targeting key US intelligence. Last year, Crowdstrike competitor Mandiant documented the activities of Unit 61398, a PLA-sponsored hacking group that had siphoned terabytes of sensitive data from 141 organizations in the previous seven years. Last month the US Justice Departmentformally charged five members of Unit 61398 with hacking US companies and stealing their trade secrets. Chinese officials have denied claims it sponsors hacking and has countered with claims the US is behind its own set of hacks….(read more)

Ars Technica


One Comment on “Chinese Military Tied to Prolific Hacking Group Targeting U.S. Aerospace Industry”

  1. […] Pundit from another Planet In operation since 2007, “Putter Panda” is latest group to be implicated by researchers […]


Leave a Reply to Chinese Military Tied to Prolific Hacking Group Targeting U.S. Aerospace Industry - iVoter.com | iVoter.com Cancel reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.