Home » Zhejiang city in China named top source of monitored cyber attacks
A study by a US-based internet security firm has revealed that there may be more targeted cyber attacks originating from China than previously uncovered.
Analysts at Symantec identified Shaoxing , a city in Zhejiang , as the top source of all cyber attacks monitored this month from more than 12 billion e-mail connections the company processed. The report, titled "The Nature of Cyber Espionage," said more than a quarter of those targeted attacks - described as malicious e-mails sent in small volumes to gain access to sensitive corporate data - had originated in China, based on researchers' analysis of sender location rather than the more commonly used identifier of e-mail server location. Earlier analysis, based on e-mail server location, had China accounting for only 17.8 percent of attacks this month, the report said.
Paul Wood, the senior analyst at MessageLabs Intelligence, the research arm of Symantec, said its analysis was not connected with previous research by Google. "A large proportion of targeted attacks we tracked were sent from legitimate webmail accounts located in the US, and therefore the internet protocol address of the sending mail server is not a useful indicator of the true origin of the attack," Wood said. "We analysed the headers of the messages and identified the IP address of the sender, revealing the true source of these targeted attacks," Wood said. "This is the first time we've presented the difference between this detection method and the one based on the mail server address."
MessageLabs said the targeted attacks were frequently business-related or linked to some newsworthy event, sent from a webmail account with a fake "From" address crafted to appeal to the recipient. That approach gave the impression that the file attached contained important information. The recipient only had to open an attachment - couched in document types such as .pdf, .doc, .xls or .ppt - for the computer to be compromised.
The MessageLabs Intelligence report said the most frequently targeted job roles of addressees were: director, senior official, vice-president, manager and executive director. The most targeted individuals included those listed as "expert: Asian defence policy", "diplomatic mission", "expert: international finance", "human rights activist" and "expert: Asian security".
I want to hear from you. Tell me how we can improve.
This month in Security magazine, we explore how Corning's global security group ensured business continuity and employee safety during the global COVID-19 pandemic. Also, we highlight the global security team at Uber and their recent security programs and initiatives. Industry experts discuss travel safety programs, career hackers, working for terrible bosses, group attribution error and more.