Chinese Military Personnel Charged with Hacking into Credit Reporting Agency Equifax
Articles,  Blog

Chinese Military Personnel Charged with Hacking into Credit Reporting Agency Equifax


Thank you for joining us- before getting started
I just like to express my outrage at the assassination of two. New York City police officers as if
you know. Your hand I want. The full support of this administration and this department
of justice. I’m here to announce the indictment of Chinese military hackers specifically for
members of the Chinese people’s Liberation Army. Into the computer system it reporting
agencies Equifax. And for stealing the sensitive personal information of nearly half. All American.
And also- Equifax’s Hordern intellectual property. One of the largest state region history. Came
to light into fat in the summer of two thousand seventeen when a fact stuff. The scale of
the theft was occurring. As alleged in the indictment the heart is obtained the names
birthdates and social security numbers nearly a hundred fifteen and Americans. And the drive
senses proximate Lee can least only an American. Americans and impose substantial costs and
burdens on them as they had to take measures to protect themselves from identity theft.
As described in the basement actors are looking to Equifax’s network through upon our ability
in the company. Salute system. Once work backer spent weeks conducting work since uploading
millet software and steep and stealing log in pencils wall to set up the stage the steel.
Today fact system well yes the hackers also. Compile data database designs used to store
personal information those trade secrets were the product of decades of investment. Work
by the company. Today’s announcement comes after two years of investigation. According
to the nine count indictment handed down by the grand jury in Atlanta for members of the
church is people liberate me let have third to hack a quote. There’s met number espionage.
This guy of attack. Wrecking industry is a peace with other Chinese illegal acquisitions
of sensitive personal. For years we have witnessed China’s voracious out the personal data of
Americans including the theft of personnel records from the office of personnel management
the interest in in I hope. Anthem health insurance companies and now the wholesale theft of credit
and other information from the fact. Has it well you he’s in for. China’s differ of our
special intelligence. As well as the creek Chen of intelligence targeting packages. In
addition to the staff so sensitive personal data our cases reveal a pattern of state sponsored
murder in truth ands and thefts by China targeting trade secrets and confidential business information.
Tax by the group group and as a P. T. ten which worked in association with the Chinese
ministry of state security. Or M. assets to target managed service providers in their
aunts worldwide across industry. Acts by M. S. S. intelligence officers who sought to
steal intellectual property relating to herbal fan engines by using both insiders and computer
operation. And hacks by P. L. A. officers who targeted victims in the nuclear power
metals and solar products industries for the economic benefit Chinese company. Indeed the
percent of our- espionage prosecutions have implicated the Chinese government. And about
60% of all trade secret staff cases in recent years involves some connection with China.
We normally don’t bring criminal charges against members another country’s military or intelligence
service outside the United States in general traditional military and intelligence activity
is a separate sphere of conduct ought not be subject of the domestic criminal law. There
are extra is however. Since we have brought charges against intelligence officers operating
under in the United States and more recently we have charge state sponsor actors for computer
into gins the United States for the best of intellect pretty for do you. Their private
sector putting bank interference with our democratic elections what those cases the
deliberate indiscriminate staff the vast amounts of sensitive personal date of civilians occurred
he cannot count and Ste. The United like other nations gather intelligence throughout its-
I’m sure that national security and foreign policy decision makers have access to timely
accurate and insightful information. But we collect information only for legitimate national
security purposes we don’t indiscriminately violate the privacy of ordinary citizens today’s
indictment not have been possible without the hard work of a dedicated team of FBI agents
federal prosecutors Atlanta and washing DC. In addition the branch office of international
affairs provided valuable assistance and work with other copies to pick your evidence. And
fax X. Cooper. Through the in. Was critical to our development of this case. I’ll take
a- a question before- turning the floor over to two others pier ten of our listeners Graham
says the- religion will provide the part from on. It is Ukraine by his what is the process
for this are from. Who will you about and his system that you feel. For yourself. Well
I was I’ve said the D. DO has the Abu to have an open door to any who wishes. To nation
that that they thank relevant but as I did say to do Gramm N. N. not have to be very
careful. In with it with respect any information coming from the Ukraine. Are there a lot of-
and does in the Ukraine there lot of cross currents. Are and we can take a thing we were
from the- a into. Says in the fee. Are so that there are any information in about Ukraine
could be carefully screwed. By the department- and its Telligent community community partners.
That we could assess its provenance and it credit. That true for information the list
to the- writing the crane including anything- Giuliani my. Are the media is the US attorney
for a laptop- who will take it from here DJ. Thank you Terry Jr bar I would like to- commend
the federal agents of the FBI. And also the prosecutors in the pop justice for the great
work. In this matter and I want to emphasize the Bible cooperation medical facts provided
there to one that reported. He intrusion to the long force and we took it from there and
there they’ve been very very helpful from through about. We have. To have. Where is
the scale of this stuff in terms of prosecutions it’ll Spartan brought. It to China is this
the largest stuff. Use is a legend that Chinese hackers have committed. Well I’ll refer back
to the attorney general statement that is one of the largest in terms of number of civilians
information that’s been hacked in the overall picture I’ll defer to assist in November.
Benefactor your- I guess it depends how you count but in terms of the number of people’s
information was stolen it may very well be the biggest that we have certainly as age
you said one of the biggest obviously there’s a lot of. Wasted that. Question. Yes yeah
so then we get to questions that after this yeah yeah. All right no problem. I thank you
thank you at the FBI we’ve been saying for years that China will do anything it can to
replace the United States as the world’s leading superpower China’s targeting our tech G. and
our secrets has been for some time that. But is general noted he sleeps in die more than
being just an American. Fifty million Americans this is the largest theft of sensitive PI.
State sponsored by state sponsored hackers ever recorded. This indictment is also a reminder
that with their attacks on our economy our cyber infrastructure and our citizens China
is one of the most significant threats to our national security today. I’m proud of
our field office in Atlanta and you see their special agent in charge up here Chris hacker
as well as the US attorney BJ from. Hello I’m proud of both our and the US attorney’s
offices in Atlanta these cases are tedious they are technical and there are different
and they take time. The combination up. To us it is as well as- the agents have participated
is a is a valiant effort to get through a case of this impact. As a secret up here would
be the first remind you that cases like this depend on ranks of our many partnerships.
As I mentioned. Folks here in our side basin and FBI headquarters by the US attorney’s
office in the Northern District of Georgia as previously mentioned. By the department
of justice here and by many other law for and into. Beauty partners how. And it barely
two. X. three. We’re thankful for this invaluable as they provided along the way we also want
to thank backs for their close collaboration with us throughout this process I cannot overstate
the ends of victim company working closely with us out true like this. This investigation
and with momentum seven in for free I addresses for service throughout the world. A handful
of Melissa come pro. The hackers try to hide the origin and the location of the internet
affect by using servers around the world to infiltrate Equifax’s network. But their attempts
to cover their tracks failed. We reviewed a ton of forensic data including network logs
and forensic computer image images and we analyze malware. And we obtain legal process
to establish digital footprint linking the hackers to the truth. That’s how we were able
to trace this unprecedented hack back to the individuals who are named in today’s indictment.
This is a testament to hard work and determination of ever involved in this investigation. We’ve
seen so many breaches since two thousand seventeen you’ve seen many of them and with almost become
a country a mute these breaches. You get the notice in the mail are you in the news this.
Thank there goes my credit card number my social security number. My bank account information.
And you sign up for another year of credit card monitoring information. You can’t think
like that country American businesses cannot be complacent about protecting their data.
And their intellectual property from our end please and as American citizens cannot be
complacent about protecting our sensitive personal data. With the long will not hackers
just because they’re halfway around the world. We’ve got to do everything we can to keep
people safe secure and confident online. That’s why we’re here today years after this investigation
began two thousand seventeen calling out the check government for its illegal activity.
This is only the second time in history that we’ve indicted Chinese military Akers. Some
might wonder what good it does when these hackers are seemingly beyond our reach we
answer this question all the time. We tried it we can’t take them into custody. Try them
for law and lock them up. Not today anyway but one day these criminals will slip up and
when they do we’ll be there. I will keep putting pressure on. Bad actors making sure they understand
the risks and the consequences of their actions. We are unique it’s sorties our experiences.
And our capabilities with the help of our partners both at home and abroad to fight
this threat each and every day and we need to do so. When I make one very important our
concern is not with the Chinese people. Or with the Chinese American. It is with the
Chinese government and the Chinese Communist Party. Confronting this threat effectively
does not mean we should not do business with China. Host Chinese business- Chinese students
welcome Chinese visitors or co exist with China as a country on the war on the world
stage. It does mean is it when China violates our criminal laws and international norms
we will not tolerate it and we will hold accountable for. Will protect our name. And it’s ideas
and we will protect our citizens personal information thank you yes. Quick question
we are serious implications in terms of privacy concerns of millions of Americans can you
take a little bit more about. If the case is. Targeting its little other did you mention-
let’s get a intelligence targeting by the Chinese perhaps of government officials another
sensibilities. Sure it I’m not gonna get to. That so. If you get the I have personally
I information you can do a lot with that can be monetized it can be used I. Basic can be
used marketing packages for US government officials- that is certainly a possibility
we have not yet seen that in this case to our knowledge that doesn’t mean it will or
will not happen in the future. Yeah I think thank in Iraq as is very. Is a healthy economy
is tantamount to a healthy national security. You said that- you know some Americans are
immune to this process- our credit cards are stolen they get a notice in the mail what
about the people that are panicking that will panic when they hear this in. Which is. I’m
these could be in China somewhere god where they are right now what you’re message to
them my message to them is certainly they should know already it was announced publicly-
not tradition but the actual intrusion was announced pop Klay previously. That they be
income tax. With a credit on a- is there an number of things they can do- first of all.
Prevention of further attacks I II spear fashion spear phishing attacks do not open links do
not open emails from untrusted servers. Two factor authentication as far as making sure
that their data and their information is. Is hard hard target and checking their credit
scores on a fairly regular basis it awful a step as well. I think they should go about
their daily lives they should not panic but they should make sure that their data and
their information is secure. Yes there are stolen information is already being used there
is not at this time the question that you know how is this different from the- type
of action that. The type of connection that we do here in this country I guess- you know
follow up for you- to the question we ask you to turn the channel before last- was.
That’s what you’re- doing with this Julie I information how is it different. From the
way the FBI has been that the steel dot CA and information. That that you parked in the
second part I want to be fair to the Attorney General I don’t. I don’t like the word lead.
For any Attorney General- first off as far as- what is. The Pataki so important you have
roughly three hundred and twenty million Americans. A hundred and forty five million Americans
lost city of PI that does not sound like. A target in intelligence activity to me that
sounds like very broad collection. Lee posted on the- general’s previous answer based on.
Nation will. Evaluated appropriately. You mentioned that American companies have to
be vigilant but in the case of Equifax they there was an alert when out of March seventeenth
it said you have a full on your. So if I could fax it done update that they were advised
to do with any of the state of the stone. I don’t know the answer and I’ll leave that
to the- civil remedies that have been applied already. Last four. Phone seven question there
is the F. B. I. investigating Joe hunter Biden at this point. I’m such a- I’m not gonna talk
about any investigation as I never would- we do not talk about open investigations.
Yes.

Leave a Reply

Your email address will not be published. Required fields are marked *