Chinese hackers stealing digital info from PH gov't agencies | Inquirer Technology

Chinese hackers stealing digital info from PH gov’t agencies

By: - NewsLab Lead / @MSantosINQ
/ 07:04 PM May 15, 2015
Countries hit by Naikon cyber espionage group

Countries hit by Naikon cyberespionage group. INFOGRAPHICS BY KASPERSKY LABS

Has China been hacking into computers of Philippine government and military organizations and stealing sensitive information for the past years?

Computer security firm Kaspersky Labs said in their latest cybersecurity bulletin that a Chinese-speaking hacker group called “Naikon” had successfully infiltrated governments around the South China Sea region including the Philippines.


Naikon had been conducting “at least five years of high volume, high profile, geopolitical attack activity” and had a “high success rate in infiltrating national organizations in Asean countries,” Kaspersky said.

READ: Spy vs spy: Two cyberespionage groups engage in online skirmish

“In the spring of 2014, we noticed an increase in the volume of attack activity by the Naikon [group]. The attackers appeared to be Chinese-speaking and targeted mainly top-level government agencies and civil and military organizations in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, Nepal, Thailand, Laos and China,” Kaspersky said in their security bulletin posted on

“An attack typically starts with an email carrying an attachment that contains information of interest to the potential victim. The document may be based on information from open sources or on proprietary information stolen from other compromised systems,” Kaspersky principal security researcher Kurt Baumgartner said in the bulletin.

Once the victim opens the attachment, a spyware program is installed on the computer without the victim’s knowledge. A decoy document will open to make the victim think nothing suspicious happened.

The spyware program is capable of getting information from the victim’s computer and sending it back to the hacker.

READ: 87% of Filipino Internet users have been victims of cybercrimes–DOJ

“There are 48 commands in the module’s repertoire, which a remote operator can use to effectively control the victim computer,” Baumgartner said.

“This includes taking a complete inventory, downloading and uploading data, installing add-on modules, or working with the command line.” he said.


Gov’t agencies hit in ‘Country X’

Kaspersky Labs provided an example of the how deep Naikon can infiltrate a government’s computer systems using “Country X.”

“Analysis revealed that the cyberespionage campaign against Country X had been going on for many years. Computers infected with the remote control modules provided attackers with access to employees’ corporate email and internal resources and access to personal and corporate email content hosted on external services,” Baumgartner said.

“A few of these organizations were key targets and under continuous, real-time monitoring,” Baumgartner said.

• Office of the President
• Military Forces
• Office of the Cabinet Secretary
• National Security Council
• Office of the Solicitor General
• Intelligence Services
• Civil Aviation Authority
• Department of Justice
• Federal Police
• Executive/Presidential Administration and Management Staff

Kaspersky did not explicitly state which country in Southeast Asia is Country X.

State-sponsored cyberespionage

Kaspersky believes Naikon is among the many state-sponsored cyberespionage groups looking to steal information from other governments.

READ: Hacker targets info on MH370 probe

Their highly sophisticated hacking methods and well-organized attacks against government agencies are not something that a single hacker would be able to do, Vicente Diaz, principal security researcher of the global research and analysis team of Kaspersky Labs, said in a previous interview.

“We were initially suspicious of that [idea] because of the type of targets that they are targeting. Who could be interested in information from one ministry, or from one military organization? Obviously this kind of information could be very useful for some governments,” Diaz said.

“In the last years, this has become more or less public. A lot of governments are saying they are investing in cyberespionage, they have [hacking] tools [and] they have [hacking] teams and they are doing this all the time,” Diaz said.

West Philippine Sea maritime dispute

China is involved in a maritime dispute with neighboring countries, namely Philippines and Vietnam, over its nine-dash claim that covers nearly the entire South China Sea including parts of the Spratly Group of Islands.

Philippines has already filed an arbitration case against China in the International Tribunal on the Law of the Sea. China has refused to participate in the proceedings insisting it has undisputed sovereignty in the region.

China has started reclamation projects in several reefs in the Spratly Islands off the coast of Palawan despite strong protests from the Philippine government.


Filipino hackers fight back, deface Chinese sites

Chinese websites hacked over poaching, Spratlys reclamation

Obama says US, China must develop cyber rules

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: China, Computers, Cyber Espionage, Cyber security, Government, hacking, Internet, naikon, Philippines, spyware
Read Next
Don't miss out on the latest news and information. facebook follow

Subscribe to INQUIRER PLUS to get access to The Philippine Daily Inquirer & other 70+ titles, share up to 5 gadgets, listen to the news, download as early as 4am & share articles on social media. Call 896 6000.

For feedback, complaints, or inquiries, contact us.
Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our technology news

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2023 | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.