{"id":15293,"date":"2019-05-10T10:45:03","date_gmt":"2019-05-10T18:45:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/10\/news-9042\/"},"modified":"2019-05-10T10:45:03","modified_gmt":"2019-05-10T18:45:03","slug":"news-9042","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/10\/news-9042\/","title":{"rendered":"DOJ Says Chinese Hackers Attacked Anthem, but Not Why"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cd586612948ca2e63b090ea\/master\/pass\/Security-Anthem-Hacked-RTR4OETR.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 10 May 2019 17:30:28 +0000<\/strong><\/p>\n<p><span class=\"lede\">The hack of <\/span>health insurance giant Anthem Inc. has loomed large in the public consciousness since it <a href=\"https:\/\/www.wired.com\/2015\/02\/breach-health-insurer-exposes-sensitive-data-millions-patients\/\">first came to light in 2015<\/a>\u2014not just as one of the biggest breaches of all time, but also as a potential example of the Chinese government&#x27;s longstanding <a href=\"https:\/\/www.wired.com\/story\/marriott-hack-china-2014-opm-anthem\/\">cyber espionage campaign<\/a>. Hackers stole names, birth dates, addresses, Social Security numbers, and employment details from 78 million Anthem customers. And for years China was <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/02\/27\/security-firm-finds-link-between-china-and-anthem-hack\/?utm_term=.1b3dd695c333\" target=\"_blank\">reported<\/a> to be behind it.<\/p>\n<p>But when the Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/pr\/member-sophisticated-china-based-hacking-group-indicted-series-computer-intrusions-including\" target=\"_blank\">unsealed an indictment<\/a> Thursday evening charging two Chinese nationals for the Anthem attack, any indication of the alleged hackers&#x27; motives or affiliation was noticeably absent.<\/p>\n<p class=\"paywall\">The US government accused 32-year-old Fujie Wang and an unnamed codefendant of being \u201cmembers of a hacking group operating in China\u201d who \u201cused extremely sophisticated techniques to hack into the computer networks of the Victims.\u201d In addition to Anthem, the indictment alleges they were responsible for three other large corporate intrusions, against a basic materials company, a communications firm, and a tech company. But it does not go on to characterize their motivations or goals.<\/p>\n<p class=\"paywall\">\u201cThe allegations in the indictment unsealed today outline the activities of a brazen China-based computer hacking group that committed one of the worst data breaches in history,\u201d Assistant Attorney General Brian Benczkowski said in a statement on Thursday. \u201cThese defendants allegedly attacked US businesses operating in four distinct industry sectors, and violated the privacy of over 78 million people.\u201d Why? The indictment doesn&#x27;t say.<\/p>\n<p class=\"paywall\">The DOJ&#x27;s silence on this point is particularly conspicuous in light of other recent indictments, in which the department has alleged definite connections to the Chinese government, including charges unsealed in <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1106491\/download?utm_medium=email&amp;utm_source=govdelivery\" target=\"_blank\">November<\/a> and <a href=\"https:\/\/www.wired.com\/story\/doj-indictment-chinese-hackers-apt10\/\">December<\/a>.<\/p>\n<p class=\"paywall\">While the US and China agreed to a milestone hacking moratorium in 2015, in more recent years the Chinese government appears to have returned to a pattern of persistent hacking that began in the early 2000s. In an attempt to deter this resurgence, the US and its allies have unsealed indictments in recent months detailing and condemning various network intrusions and data breaches that date back to 2006.<\/p>\n<p class=\"paywall\">\u201cMore than 90 percent of the department\u2019s cases alleging economic espionage over the past seven years involve China,\u201d then-deputy attorney general Rod Rosenstein said in a December press conference announcing a wave of indictments that specifically tied hackers to the Chinese government. \u201cMore than two-thirds of the department\u2019s cases involving thefts of trade secrets are connected to China.\u201d<\/p>\n<p>\u201cLines between government hackers and criminals in many circumstances can be quite blurry.\u201d<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">J. Michael Daniel, Cyber Threat Alliance<\/p>\n<p class=\"paywall\">The Anthem breach is one of the most prominent of these incidents that established an understanding of rampant Chinese state-sponsored hacking\u2014at least in the public sphere. Yet Thursday\u2019s indictment does not tie the incident to the country\u2019s government. Analysts note, though, that amid renewed tensions between the US and Beijing over trade policy in recent weeks, there could be a number of reasons that the indictment doesn\u2019t weigh in on the hackers\u2019 connections.<\/p>\n<p class=\"paywall\">\u201cAttribution is hard, but even with attribution, in situations like this there are concerns of escalation or counter-strikes,\u201d says Ben Johnson, chief technology officer of Obsidian Security, who has monitored the Anthem breach since its disclosure. \u201cSo I think the government is being careful.\u201d<\/p>\n<p class=\"paywall\">And as Johnson and others point out, even when law enforcement can attribute an intrusion to individuals, they may not be able to establish their motives and connections with as much certainty.<\/p>\n<p class=\"paywall\">\u201cI don\u2019t think this indictment really changes the general narrative,\u201d says Cyber Threat Alliance CEO J. Michael Daniel, who served as White House cybersecurity coordinator during the Obama administration. \u201cAmbiguity in the indictment could stem from several causes, including that we don\u2019t know whether they were contractors, criminals, or frankly both at different times. Lines between government hackers and criminals in many circumstances can be quite blurry.\u201d<\/p>\n<p class=\"paywall\">Thursday\u2019s indictment of the Anthem hackers offers context about the incident, and even puts a face to a digital hand, courtesy of photos the FBI released. But word on whether the Chinese government actually had an interest in the historic breach may take years more to come\u2014if it ever does.<\/p>\n<p class=\"related-cne-video-component__dek\">A Woman\u2019s Life in China\u2019s Digital Gulag<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/anthem-hack-indictment-china\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cd586612948ca2e63b090ea\/master\/pass\/Security-Anthem-Hacked-RTR4OETR.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 10 May 2019 17:30:28 +0000<\/strong><\/p>\n<p>For years, China was rumored to be behind the health insurance company&#8217;s massive data breach, but now the Justice Department is noticeably silent on the hackers&#8217; motives and affiliation.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15293","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15293"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15293\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}