China has Unveiled the Teams of of Hackers for Cyberwar

China has confessed to the existence of special cyber warfare units as intimidation between a nation and United States over cyber espionage continues to rise.

China has been the aim of suspicion relating to high-profile cyberattacks and state-sponsored campaigns for a long time. The nation has continually denied that the groups of military hackers exist who were believed to direct these attacks. However, this time, China has officially imparted the existence of military cyber warfare units — in fact, the state sponsors a series of them who specialize in different areas.

China revealed its hacking team for cyberwar fare

The disclosures of China’s digital war tactics are presented in the latest edition of publication The Science of Military Strategy, which is generated by China’s People’s Liberation Army (PLA) once in a blue moon. Joe McReynolds, a researcher of China’s network warfare and capabilities for the US Center for Intelligence Research and Analysis, told The Daily Beast 

“this is the first time we’ve seen an explicit acknowledgement of the existence of China’s secretive cyber warfare forces from the Chinese side.”

While addressing to the publication, McReynolds said the unmasking is the first time cyber warfare capabilities have been admitted to on both the military and civilian-government sides.

Deniability, naturally, has now been lost — and whether China’s denial was ever believed in the first place is now a moot point. McReynolds commented:

“It means that the Chinese have discarded their fig leaf of quasi-plausible deniability. As recently as 2013, official PLA publications have issued blanket denials such as, ‘The Chinese military has never supported any hacker attack or hacking activities.’ They can’t make that claim anymore.”

McReynolds has affirmed that China’s digital military strategy has been apportioned into three separate sections. One unit is known as “specialized military network warfare forces,” which focuses on conducting network cyber attacks and defense. Second unit consists of civilian teams which have been given the authority by the Chinese military for running “network warfare operations.” Lastly, third one acts as an umbrella for “external entities” which can be organized and assembled for network warfare operations, but act outside of government departments.

According to the statement of Chinese military each unit targets US companies for the theft of valuable data affiliated to business and trade. As a consequence, it will uplift Chinese firms in the global economy.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...