Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said.
In a report released on Monday, FireEye said the cyber espionage operations dated back to at least 2005 and “focused on targets – government and commercial – who hold key political, economic and military information about the region.”
“Such a sustained, planned development effort coupled with the (hacking) group’s regional targets and mission, lead us to believe that this activity is state-sponsored – most likely the Chinese government,” the report’s authors said.
Bryce Boland, Chief Technology Officer for Asia Pacific at FireEye and co-author of the report, said the attack was still ongoing, noting that the servers the attackers used were still operational, and that FireEye continued to see attacks against its customers, who number among the targets.
Reuters couldn’t independently confirm any of the assertions made in the report.
China has always denied accusations that it uses the Internet to spy on governments, organizations and companies.
Asked about the FireEye report on Monday, foreign ministry spokesman Hong Lei said: “I want to stress that the Chinese government resolutely bans and cracks down on any hacking acts. This position is clear and consistent. Hacking attacks are a joint problem faced by the international community and need to be dealt with cooperatively rather than via mutual censure.”
The Cyberspace Administration of China, the Internet regulator, didn’t immediately respond to written requests for comment.
China has been accused before of targeting countries in South and Southeast Asia. In 2011, researchers from McAfee reported a campaign dubbed Shady Rat which attacked Asian governments and institutions, among other targets.
Efforts by the 10-member Association of Southeast Asian Nations (ASEAN) to build cyber defenses have been sporadic. While ASEAN has long acknowledged its importance, “very little has come of this discourse,” said Miguel Gomez, a researcher at De La Salle University in the Philippines.
The problem is not new: Singapore has reported sophisticated cyber espionage attacks on civil servants in several ministries dating back to 2004.
The campaign described by FireEye differs from other such operations mostly in its scale and longevity, Boland said.
He said the group appeared to include at least two software developers. The report did not offer other indications of the possible size of the group or where it’s based.
The group remained undetected for so long it was able to re-use methods and malware dating back to 2005, and developed its own system to manage and prioritize attacks, even organizing shifts to cope with the workload and different languages of its targets, Boland told Reuters.
The attackers focused not only on governments, but on ASEAN itself, as well as corporations and journalists interested in China. Other targets included Indian or Southeast Asian-based companies in sectors such as construction, energy, transport, telecommunications and aviation, FireEye said.
Mostly they sought to gain access by sending so-called phishing emails to targets purported to come from colleagues or trusted sources, and containing documents relevant to their interests.
Boland said it wasn’t possible to gage the damage done as it had taken place over such a long period, but he said the impact could be “massive.” “Without being able to detect it, there’s no way these agencies can work out what the impacts are. They don’t know what has been stolen.”
Pornchai Rujiprapa, Minister of Information and Communication Technology for ASEAN member Thailand, said the government was proposing a new law to combat cyber attacks as existing legislation was outdated.
“So far we haven’t found any attack so big it threatens national security, but we are concerned if there is any in the future. That’s why we need a new law to handle it,” he told Reuters.