AIRLINK 75.50 Increased By ▲ 1.00 (1.34%)
BOP 4.73 No Change ▼ 0.00 (0%)
CNERGY 4.18 Increased By ▲ 0.04 (0.97%)
DFML 40.12 Increased By ▲ 0.77 (1.96%)
DGKC 88.80 Increased By ▲ 3.90 (4.59%)
FCCL 22.99 Increased By ▲ 1.09 (4.98%)
FFBL 30.47 Increased By ▲ 0.26 (0.86%)
FFL 9.23 Decreased By ▼ -0.02 (-0.22%)
GGL 10.14 Decreased By ▼ -0.26 (-2.5%)
HASCOL 6.20 Decreased By ▼ -0.13 (-2.05%)
HBL 106.50 Decreased By ▼ -1.75 (-1.62%)
HUBC 140.10 Decreased By ▼ -0.15 (-0.11%)
HUMNL 10.59 Increased By ▲ 0.29 (2.82%)
KEL 4.77 Decreased By ▼ -0.03 (-0.63%)
KOSM 4.39 Decreased By ▼ -0.03 (-0.68%)
MLCF 38.40 Increased By ▲ 0.90 (2.4%)
OGDC 123.60 Decreased By ▼ -1.04 (-0.83%)
PAEL 24.62 Increased By ▲ 0.18 (0.74%)
PIBTL 6.10 Decreased By ▼ -0.10 (-1.61%)
PPL 114.30 Decreased By ▼ -2.10 (-1.8%)
PRL 24.06 Decreased By ▼ -0.54 (-2.2%)
PTC 13.05 Decreased By ▼ -0.08 (-0.61%)
SEARL 59.60 Increased By ▲ 3.61 (6.45%)
SNGP 61.80 Decreased By ▼ -1.18 (-1.87%)
SSGC 9.66 Decreased By ▼ -0.21 (-2.13%)
TELE 7.85 Decreased By ▼ -0.14 (-1.75%)
TPLP 10.07 Increased By ▲ 0.14 (1.41%)
TRG 65.20 Increased By ▲ 0.70 (1.09%)
UNITY 26.90 Increased By ▲ 0.24 (0.9%)
WTL 1.34 Increased By ▲ 0.02 (1.52%)
BR100 7,701 Decreased By -17 (-0.22%)
BR30 24,706 Decreased By -71.5 (-0.29%)
KSE100 73,754 Decreased By -108.9 (-0.15%)
KSE30 23,617 Decreased By -74.6 (-0.31%)

Cyberspace is becoming a new battleground for the United States and China, amid growing concerns about Chinese industrial espionage through various types of computer worms, security experts say. At least one "Trojan horse" program used to steal files from infected computers has been traced to servers in China, providing further evidence that US companies may be targets, say analysts.
Security firms have long been concerned about various types of malicious software used to steal files or passwords. But some newer programs seem designed as a more sophisticated and targeted effort.
Joe Stewart, a researcher with the US security firm Lurhq, said that by reverse-engineering a recent PC worm known as Myfip, he found a clear connection to China.
"All the e-mails we've traced back with this particular attachment came from a single address in China," Stewart told AFP, adding that it was "highly likely" that the program was used for espionage against US high-tech and manufacturing firms.
Stewart said the program appeared to have been originally developed as a way to steal student exam papers and then expanded so that it can now copy many types of documents, including computer-assisted drawings and Microsoft Word files.
Forbes magazine, which first reported the Chinese origin of Myfip, said the worm had been propagating by spam e-mails that activate the program when recipients click on attachments. Forbes said about a dozen versions of Myfip may have been in circulation and used to steal sensitive documents including mechanical designs and circuit board layouts.
Analysts point out that tracking attacks or malicious software can be tricky because the origins can be disguised.
But Marcus Sachs of SRI International, who also directs the industry-academic SANS Internet Storm Center that monitors cyberattacks, said the evidence against China is solid.
"I believe firmly that the Chinese are using tools like Myfip to conduct industrial espionage on the US and other industrial countries that have mature data networks," he told AFP.
Sachs said the latest types of malicious software, or "malware," represent a new strategy by creators of the programs.
"Most of the credit card theft, money laundering and fraud is coming from Russia or former Soviet Union countries," Sachs said.
"The Chinese seem to be a bit more clever in covering their tracks and are more likely conducting covert raids for corporate secrets, rather than chasing money like their Russian organised crime counterparts."

Copyright Agence France-Presse, 2005

Comments

Comments are closed.