【禁闻】三菱被黑 攻击者使用中文操作

【新唐人2011年9月22日讯】日本最大国防承包商“三菱重工”遭遇网路骇客攻击,引发日本国内高度关注,日本媒体报导指出,攻击的病毒当中包含有中文简体字。请看报导。

《朝日新闻》等日本媒体20号报导,8月,“三菱重工”旗下的长崎造船所、神户造船所、爱知县小牧市的名古屋诱导推进系统制作所等,11个工厂和研究所的服务器、电脑共83台确认感染电脑病毒。病毒包含会窃取电脑信息的“特洛伊木马”,有证据显示,被感染的电脑自动跟中国等地的海外服务器连接,某些信息可能泄漏。

报导说,这些工厂和研究所主要负责研发潜艇、导弹防御系统以及核电厂零件,储存了大量日本尖端军事科技文件。

日本主要报纸《读卖新闻》,20号下午发表了一篇 “攻击三菱重工服务器、病毒当中包含中文简体字”的报导文章。

报导说,“被感染的电脑被攻击者遥控,而遥控电脑画面显示使用的是中文。由于可能牵涉娴熟中文的人参与攻击行动,警视厅认为,这有可能是国际性的间谍事件,决定以涉嫌违反禁止不正当进入电脑系统的法律为理由展开调查。……有关官员表示,电脑信息安全公司对有关的电脑病毒进行分析,发现攻击者使用外部的电脑进行操作,画面上有中国大陆使用的简体汉字。”

除“三菱重工”以外,造船和重型机械大公司IHI(旧称‘石川岛播磨重工业’)20号也表示,过去曾接到附加病毒的电子邮件。另外,从事战斗机制造等防卫产业的“川崎重工”20号也说,有人向公司多次发送被认为是用于网络服务器攻击的电子邮件。

另据日本警视厅公布,人事院和内阁府等政府机关管理的主页,在9月17号晚到18号晚受到“分散式拒绝服务(DDoS)”攻击,短时间内有大量数据同时涌入,一度无法正常浏览。

《读卖新闻》的报导还说,中国国内网站从9月12号开始,出现呼吁在“9•18事变”80周年,对日本发动网络攻击的留言,并公布了日本警视厅,人事院等约10个政府机关网址,其中还有具体教授如何使用攻击软件的贴子。

此外,福冈县部分民间机构网站也在同一时间遭到攻击,页面内容被改写为中文。日本相关政府机构的网站去年9月及今年7月也曾遭到攻击,两次的攻击者IP地址有九成来自中国。

据网络安全专家发布的监测结果,近5年,包括联合国和国际奥委会在内的全球70多个机构,都成为骇客攻击的目标,其中一半以上机构都在美国。电脑安全公司迈克菲认为,攻击“可能来自某国政府”,《华盛顿邮报》则直接道出:这些骇客攻击似乎起源于中国。

针对外界指责中共骇客攻击国外网站,中共当局一贯给予否认。不过近期,中共媒体《央视》的军事科技栏目,无意泄露了中共军校研发网络攻击系统,有针对性的攻击美国法轮功网站的实情,给他国针对中共网络攻击的调查留下了证据和参考。

《日本经济新闻》21号发表社论,呼吁对威胁国家安全的服务器攻击做好准备。报导说,涉及国家机密的企业和机关受到来自海外的攻击,应该深切认识到它的危险性,立即准备对应攻击的体制。

新唐人记者尚燕、孙宁综合报导。

Cyber-attack On Mitsubishi, China Suspected

Japan’s largest defense contractor,
Mitsubishi Heavy Industries, Ltd., was subjected to cyber-attacks,
causing public alarm.
Japanese media reported that the virus contains
simplified Chinese characters. Here is the report:

Asahi Shimbun and other Japanese media reported on August 20
that a total of 83 virus-infected computers were found at 11 manufacturing, research, and development sites,
including Nagasaki Shipyard & Machinery Works, Kobe Shipyard
& Machinery Works, and Nagoya Guidance & Propulsion System.
The types of computer viruses found include Trojan horses.
There is evidence that indicates that the infected computers
automatically connected to servers located in countries such as China.
Some information may have been leaked.

The paper said that although these companies build submarines,
guided missiles, and nuclear power stations,
they also store documents containing key military
and technology of Japan.

A major Japanese newspaper, Yomiuri Shimbun, published
an article titled, “Simplified Chinese Used in MHI Cyber-attack,” in the evening edition, on Sept. 20..

The report said, “Simplified Chinese characters were used
by attackers to remotely control the infected PCs.
The Metropolitan Police Department (MPD) now considers this
an international espionage case, as it is believed that those involved had a thorough knowledge of the Chinese language.
The MPD is investigating the case as a violation of the law
on the Prohibition of Unauthorized Computer Access.
An information security firm that copied and
analyzed the virus discovered the simplified Chinese characters on screens used by the senders.”

In addition to Mitsubishi Heavy Industries,
IHI (Ishikawajima-Harima Heavy Industries), which supplies engine parts for containment vessels and
pressurized vessels for nuclear reactors, also reported that
they were victims of a cyber-attack on the Sept. 20.
Kawasaki Heavy Industries, which makes airplanes and
rocket systems, has also been subjected to virus-tainted emails, according to a company spokesman.

The Japan National Police Agency said that websites belonging to
the National Personnel Authority and Cabinet Office,
and others, came under cyber-attack on the evenings of
Sept. 17 and 18, experiencing a so-called Distributed Denial-of-Service (DDoS) attack in which
hackers send a massive amount of data to a targeted website,
overwhelming its ability to respond or function properly.

Yomiuri Shimbun also reported that since Sept. 12, some
Chinese websites are calling for cyber-attacks against
Japanese websites—to mark the 80th anniversary of
the 1931 Manchurian Incident.
Among the proposed targets in Japan, are 10 Japanese
government agency websites, including the Japanese National Police Agency and the National Personnel Authority.
The Chinese websites also provide complete instructions on
how to launch viral-laden software.

At the same time, some private sector websites in Fukuoka
Prefecture also came under cyber-attack, with some web-page content being rewritten in Chinese.
Some Japanese government websites were also attacked
during last September and this past July.
Ninety percent of the attacker IP addresses
have been traced to China.

According to an investigative report released by security experts,
more than 70 institutes world-wide have become targets of hackers in the past five years,
including the United Nations and the International Olympic
Committee, with more than half of agencies located in the United States.
In its report, security firm, McAfee, said the large-scale
cyber-espionage operation was conducted by a “state actor,"
whereas the Washington Post bluntly stated that
“these hackers seem to have originated in China.”

While the Communist regime has routinely denied their
involvement in the cyber-attacks in the international community,
recently, the regime’s state-run media, CCTV,
unintentionally leaked, during one of its programs, evidence
that a Chinese military university is engaged in
cyber-warfare against Falun Gong websites in the United States.
This has provided evidence proving that the Communist regime’s
does engage in cyber-attacks on other countries.

Japan’s Nikkei (Japanese Economic News) editorial commented
on the Sept. 21 that the nation needs to be prepared for cyber-attacks that threaten national security.
The report noted the seriousness of such attacks saying that
when companies and institutions that involve state secrets receive
attacks from overseas, an anti-cyber-attack system
should be immediately deployed.

NTD reporters: Shang Yan and Sun Ning

相关文章
评论