Report: All Those Hackings Came From the Chinese Military

What's Hot


How to Cut the Cable TV Cord in 2017Family

8 Major Freebies and Discounts You Get With Amazon PrimeSave

Study: People Who Curse Are More HonestFamily

8 Creative Ways to Clear ClutterAround The House

15 Things You Should Always Buy at a Dollar StoreMore

Pay $2 and Get Unlimited Wendy’s Frosty Treats in 2017Family

5 Reasons to Shop for a Home in DecemberFamily

This Free Software Brings Old Laptops Back to LifeMore

Should You Donate to Wreaths Across America? A Lesson in Charitable GivingAround The House

6 Reasons Why Savers Are Sexier Than SpendersCredit & Debt

Resolutions 2017: Save More Money Using 5 Simple TricksCredit & Debt

10 Free Things That Used to Cost MoneyAround The House

7 New Year’s Resolutions to Make With Your KidsFamily

10 Simple Money Moves to Make Before the New YearFamily

The 3 Golden Rules of Lending to Friends and FamilyBorrow

Heard about the hacks on Coca-Cola, Halliburton, and The New York Times? It may all be coming from one building in China, and one company is outing some of the alleged hackers.

Quartz reports a computer security company called Mandiant has traced hacks on newspaper, energy, and military contractor companies (among others) to a unit of the Chinese military.

The 74-page report is freely available and goes into depth about why the company believes “Unit 61398,” which they call “APT1,” is behind the attacks.

The group is housed in a 12-story building in Shanghai, and Mandiant has been monitoring their activity since 2006. In all, over 140 companies have been hacked.

While the firm believed staying quiet was the best way to gather information and work toward preventing the attacks – so the Chinese wouldn’t realize Mandiant was on to them –  they’ve changed their minds since Chinese officials denied the accusation their government was involved and said that speculating otherwise was “unprofessional”…

Without establishing a solid connection to China, there will always be room for observers to dismiss APT actions as uncoordinated, solely criminal in nature, or peripheral to larger national security and global economic concerns. We hope that this report will lead to increased understanding and coordinated action in countering APT network breaches.

The report includes details of patterns in the attacks, profiles some of the specific hackers themselves, and offers up many of their passwords and tactics.

Stacy Johnson

It's not the usual blah, blah, blah

I know... every site you visit wants you to subscribe to their newsletter. But our news and advice is actually worth reading! For 25 years, I've been making people richer without making their eyes glaze over. You'll be glad you did. I guarantee it!

💰🗣📰

Read Next: 10 Overlooked Expenses That Ruin Your Budget

Check Out Our Hottest Deals!

We're always adding new deals and coupons that'll save you big bucks. See the deals to the right and hundreds more in our Deals section.

Click here to explore 1,829 more deals!