Mandiant, the FireEye-owned incident response firm, has denied hacking the computers of a top-tier Chinese government hacking crew known as APT1. The company is responding to a portion of a new book by the New York Times’ reporter David Sanger, which looks into Mandiant’s 2013 report on the Chinese hacking group called APT1. Sanger, the New York Times national security reporter who exposed the Stuxnet attack on Iran’s nuclear enrichment facility, released his book “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age,” this week. The book explores Russian, Chinese, and US hacking against critical infrastructure and how this impacts the public’s confidence in traditional weapons. FireEye today effused a section of the book that details the alleged techniques Mandiant’s researchers used to expose the work of and attribute hacking atcivity APT1, which uncovered alleged direct links to China’s People’s Liberation Army. The book alleges that Mandiant analysts “could actually look inside the room where the hacks originated”. “As soon as they detected Chinese hackers breaking into the private networks of some of their clients — mostly Fortune 500 companies — Mandiant’s investigators reached back through the network t activate the cameras on the hacker’s own laptops.
Read full news article on CSO