People’s Republic of China’s Huawei boss says US business block on telecoms equipment group will backfire

See on Scoop.itChinese Cyber Code Conflict

Ren Zhengfei breaks silence over government’s refusal to do business with Chinese group on cyber-security grounds. By Anthony Doesburg

Red-DragonRising‘s insight:

Mr. Ren Zhegfei declares telecom technology war on US commercial enterprises…standby to standby…continued by saying the People’s Republic of China already has all the intellectual property of the United States, China is the Middle Kingdom…

See on www.guardian.co.uk

London Calling: Did Allwinner outsell Intel, Qualcomm?

See on Scoop.itChinese Cyber Code Conflict

London Calling: Did Allwinner outsell Intel, Qualcomm?

Red-DragonRising‘s insight:

People’s Republic of China’s State Owned Enterprise (SOE) Allwinner Technologies Co. Ltd. (Zhuhai, People’s Republlic of China) has sold more tablet computer processors than all Western commercial manufacturers combined! If you use a tablet in ICS or SCADA environments check your tablets’ processor country of orign ASAP! Then contact me to figure out what to do next to protect your enterprise from Chinese hacking efforts….check out their website:

http://www.arm.com/community/partners/display_company/rw/company/allwinner-technology-co-ltd/

See on www.eetimes.com

Welcome Red Dragon Rising

J0289893

Please join me in welcoming Red Dragon Rising to the fold. The Dragon team will be posting a variety of international threat intelligence information, cyber warfare research and engaging commentary. Stay tuned here for a new strain of content on the site, which will be meshed in with the traditional content we have been bringing you throughout the years. 

You can also find the Dragon team on Twitter @RedDragon1949.

As always, thanks for reading and let us know what you think of the new content and some of the intelligence we will be sharing.

US Senate Bill Calls For ‘Watch List’ Of Nations Cyberspying On U.S., Trade Sanctions — Dark Reading

See on Scoop.itChinese Cyber Code Conflict

China faces increasing political pressure from the U.S. to curb its cyberespionage activity, but legislation not certain

Red-DragonRising‘s insight:

"In a week that began with the rare move of the Pentagon calling out the Chinese government and military for attacks on U.S. government networks, some key senators have drafted a bill that would create a watch list of nations conducting cyberespionage against the U.S., and spell out just what technologies and products are being stolen — as well as which foreign firms benefit from the intellectual property stolen from the U.S."

See on www.darkreading.com

Pentagon Report Points to Chinese Cyberspying, Military Buildup – The Epoch Times

See on Scoop.itChinese Cyber Code Conflict

The Obama administration has for the first time publicly identified the Chinese regime as the source of a wide ranging campaign of cyberespionage.

Red-DragonRising‘s insight:

MicroSolved’s own Bill Hagestad is quoted in this Chinese Cyber Espionage piece by the Epoch Times:

 

“The Office of the Secretary of Defense is getting it correct albeit not entirely historically correct from a Chinese view,” says William Hagestad II, author of ’21st Century Chinese Cyberwarfare’ and Chinese cyber security consultant, in an email.  “The People’s Republic of China will go the full measure of preventing foreign commercial and yes, military domination of the Chinese information domain in the 21st Century.” 

 

See on www.theepochtimes.com

Mao’s granddaughter accused over People’s Republic of China rich list – UK Telegraph

See on Scoop.itChinese Cyber Code Conflict

The granddaughter of Chairman Mao has been named on China’s rich list, with a fortune of nearly £530 million.

Red-DragonRising‘s insight:

The irony of Chairman Mao Tse Tung’s granddaughter being on the list of the ‘superrich’ within the People’s Republic of China…perhaps it was the intellectual property theft or prolific Chinese cyber espionage…

See on www.telegraph.co.uk

Red Dragon Rising has arrived @ State of Security

Chinese Red Dragon Character  web

Good day friends –

Red Dragon Rising has now arrived and will begin posting items of interest about the People’s Republic of China (中華人民共和國) and her use of the computer as a weapon system…

Please expect to enjoy the latest and most current news and updates about the Middle Kingdom on the State of Security!

Semper Fidelis;

謝謝您

紅龍

OpUSA:: Feint or Fail?

So, yesterday was the date of the much awaited OpUSA, originally proclaimed to be a decisive attack on the US banking and government infrastructures. Thankfully, there seemed to be little impact on US banking or government, and while some commercial and even government sites did get attacked, the sustained impact seemed to be fairly well contained.

Below are a few thoughts on OpUSA and observations made from the data we saw around the Internet (in no particular order):

  • Anonymous groups seemed to be alluding to some infighting, with some groups mocking others and some fragments calling the entire operation a fake. There does seem to be some form of power struggle or competition going on inside the loose alignment of cells, at least from what conversations could be reviewed on Twitter, other social media and the paste bin releases.
  • Many of our team considered the possibility that OpUSA was a feint, designed to attract media attention and recruit new talent, even as primary groups and forces remained on the side lines. From a strategic point, this might make sense, though the in-fighting argument above seems more likely.
  • There seemed to be a large focus on attacking sites primarily powered by PHP. Certainly there are groups and cells inside the movement where their primary focus is PHP attacks and their exploits and tools are solely geared to PHP compromises. Other platforms are likely to remain in scope and within reach, but the majority of the attacks and compromises released yesterday seemed to revolve around PHP.
  • The 10,000 credit card release was MOSTLY a bust. All of the cards we saw were already expired. HOWEVER, it should be noted that SSNs, security questions and other PII was included in that release, so the impacts are broader than just credit card information.
  • Lots of released account credentials, software licenses and such also came out with associated tag lines during the operation. Additionally, many of the folks posting released data to the paste bins and on Twitter also usually release a good deal of pirated software, media and music from what we could tell. It is likely that some of the actors involved in the movement also participate in software and media piracy.
  • At least 3 credit unions were included in the released target lists. This was interesting, especially given the previous Anonymous stance that citizens should replace banks with credit unions. One has to wonder why these three particular CUs were targeted or if they were merely tokens. 

Other than the usual chatter and jeers, there seemed to be little unique about OpUSA and the efforts identified with the campaign. The media is picking up on some additional items here and there, but largely, the operation was seen as being a smaller or less successful campaign than previous attack sets.