Chinese national arrested in Los Angeles on U.S. hacking charge

BY

-

Fri, 25 Aug 2017 - 09:29 GMT

BY

Fri, 25 Aug 2017 - 09:29 GMT

A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture - REUTERS

A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture - REUTERS

SAN FRANCISCO - 25 August 2017: U.S. authorities on Thursday accused a Chinese national visiting the United States of providing malware that has been linked to the theft of security clearance records of millions of American government employees.

Yu Pingan of Shanghai was arrested on Monday at Los Angeles airport after a federal criminal complaint accused him of conspiring with others wielding malicious software known as Sakula, a Justice Department spokesman said on Thursday.

The complaint said the group attacked a series of unnamed U.S. companies using Sakula, the same rare program involved in U.S. Office of Personnel Management (OPM) hacks detected in 2014 and 2015. The filing did not mention the OPM hacks.

The arrest could provide information on the OPM hacks which U.S. officials have blamed on the Chinese government.

In an FBI affidavit linked to the complaint, an FBI agent said he believed Yu provided versions of Sakula to two unnamed men that he knew would be used to carry out attacks on the firms.

Yu's court-appointed attorney, Michael Berg, said Yu was a teacher with no affiliation with China's government.

"He says he has no involvement in this whatsoever," Berg said, adding that Yu came to Los Angeles for a conference.

The Justice Department and San Diego FBI declined to comment further.

Chinese Foreign Ministry spokeswoman Hua Chunying told a regular press briefing on Friday that she was not aware of the situation, but that China actively seeks to guarantee overseas Chinese individuals' legal rights. China opposes of all forms criminal internet activity, she added.

The court filings said Sakula had rarely been seen before the attacks on U.S. companies and Yu knew the software he was providing would be used in the hacks carried out between 2010 and 2015.

Though the victims are not named, some companies appeared to be in the aerospace and energy industries.

Adam Meyers, vice president at U.S. security firm CrowdStrike, said software flaws and one of the internet protocol addresses cited in the complaint matched up with attacks on a U.S. turbine manufacturer, Capstone Turbine, and a French aircraft supplier.

Meyers said Sakula could be used by multiple groups, but that all of the known targets would be of interest to the Chinese government.

The OPM breach was a subject of U.S.-China talks, and the Chinese government previously told American diplomats it had arrested some criminals in the case.

Yu remains in jail pending a court hearing on his detention next week.

Comments

0

Leave a Comment

Be Social