标题: To Catch a Chinese Hacker, or Two [打印本页] 作者: choi 时间: 3-14-2013 08:27 标题: To Catch a Chinese Hacker, or Two Barbara Demick, China Hacker's Angst Opens a Window Onto Cyber-Espionage; Young man's blog provides a rare glimpse of the secretive hacking establishment of the Chinese military, whose efforts have become a growing concern to the US. los Angeles Times, Mar 13, 2013. http://www.latimes.com/news/nati ... na-hacking-20130313,0,4812955.story
("He [hacker surnamed Wang] drew particular inspiration from the Fox series "Prison Break," and borrowed its name for his blog")
three consecutive paragraphs:
"Richard Bejtlich, Mandiant's security chief, said posts written by the blogger, who called himself 'Rocy Bird,' provided the most detailed first-person account known to date of life inside the hacking establishment. Although the blog was discontinued four years ago [real family name is Wang; posted some 625 entries online 2006-2009], the techniques described in it remain the same.
"The hacker, whose real family name is Wang, posted some 625 entries between 2006 and 2009. 'Fate has made me feel that I am imprisoned,' he wrote in his first entry on Sina.com. 'I want to escape.'
"Los Angeles Times reporters tracked down Wang and his blog through an email address that was listed on a published 2006 paper about hacking. A coauthor of the paper was Mei Qiang, identified by Mandiant as a key hacker who operated under the alias 'Super Hard' in Unit 61398.
(c) The report also says, "Wang earned his master's degree in Internet security at age 25 at the Information Engineering University, run by the PLA in Zhengzhou, Henan province."
(i) This is the paper at issue:
, where the link "全文链接: 查看全文>>" leads to a total blank.
(ii) The same paper also appears (actually APPEARED) in www.ecice06.com
in "PDF/Adobe Acrobat" file format and whose URL was
(A) from Google search:
"www.ecice06.com/.../downloadArticleFile.d"
(B) Clicking the preceding link leads to
(d) The report further states, "Wang is believed to be living in Chengdu. One of his last online traces was a comment posted on Dianping, a popular restaurant review site, about an ice cream parlor in that city."
"Investigators have unearthed birthdays, photographs, profiles on Kaixin (a Chinese version of Facebook), shopping and dining preferences. One hacker's user name appeared in a forum for flower-arranging enthusiasts.
"They logged on to personal email or social networking sites from work, or used their real phone numbers to register Gmail or Hotmail accounts later used for phishing attacks. Mei Qiang, Wang's research partner, posted a note on a software developer's message board looking for extra work.
"'I'm good at writing hacking tools, such as Trojan viruses,' read the advertisement posted in 2005. It was taken down last month after it was discovered by an investigator based in India who runs a blog called Cyb3rSleuth.
(f) Please recall my Yilubbs.com posting dated Feb 19, 2013, which is about ANOTHER Chinese hacker.
A Portrait of a Chinese Hacker. Cloaked by malware, aliases, and misspellings computer spies are usually invisible. This one made a mistake. A special investigation by Dune Lawrence and Michael Riley. Bloomberg BusinessWeek, Feb 18, 2013 http://www.businessweek.com/arti ... s-identity-unmasked
(ZHANG Changhe)