The NY Times had first dibs on a preview of the 60-page study released today by computer security firm Mandiant, which "tracks for the first time individual members of the most sophisticated of the Chinese hacking groups — known to many of its victims in the United States as 'Comment Crew' or 'Shanghai Group' — to the doorstep of [a Chinese] military unit’s headquarters."
Those headquarters are located in the building shown above (image via Mandiant's report). You can download the report for yourself here (PDF): "APT1: Exposing One of China's Cyber Espionage Units."
Mandiant claims APT1 "has conducted a cyber espionage campaign against a broad range of victims since at least 2006." More highlights from the report:
Our analysis has led us to conclude that APT1 is likely government-sponsored and one of the most persistent of China's cyber threat actors. The scale and impact of APT1's operations compelled us to write this report. In an attempt to bolster defenses against APT1 operations Mandiant is also releasing more than 3,000 indicators as part of the appendix to this report, which can be used with our free tools and our commercial products to search for signs of APT attack activity.
• APT1 is believed to be the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.
• APT1 has systematically stolen hundreds of terabytes of data from at least 141 organizations.
• APT1 focuses on compromising organizations across a broad range of industries in English-speaking countries.
• APT1 maintains an extensive infrastructure of computer systems around the world.
• In over 97% of the 1,905 times Mandiant observed APT1 intruders connecting to their attack infrastructure, APT1 used IP addresses registered in Shanghai and systems set to use the Simplified Chinese language.
• The size of APT1’s infrastructure implies a large organization with at least dozens, but potentially hundreds of human operators.
• In an effort to underscore that there are actual individuals behind the keyboard, Mandiant is revealing three personas that are associated with APT1 activity.
• Mandiant is releasing more than 3,000 indicators to bolster defenses against APT1 operations.
Boing Boing editor/partner and tech culture journalist Xeni Jardin hosts and produces Boing Boing's in-flight TV channel on Virgin America airlines (#10 on the dial), and writes about living with breast cancer. Diagnosed in 2011. @xeni on Twitter. email: firstname.lastname@example.org.