China has Unveiled the Teams of of Hackers for Cyberwar

China has confessed to the existence of special cyber warfare units as intimidation between a nation and United States over cyber espionage continues to rise.

China has been the aim of suspicion relating to high-profile cyberattacks and state-sponsored campaigns for a long time. The nation has continually denied that the groups of military hackers exist who were believed to direct these attacks. However, this time, China has officially imparted the existence of military cyber warfare units — in fact, the state sponsors a series of them who specialize in different areas.

China revealed its hacking team for cyberwar fare

The disclosures of China’s digital war tactics are presented in the latest edition of publication The Science of Military Strategy, which is generated by China’s People’s Liberation Army (PLA) once in a blue moon. Joe McReynolds, a researcher of China’s network warfare and capabilities for the US Center for Intelligence Research and Analysis, told The Daily Beast 

“this is the first time we’ve seen an explicit acknowledgement of the existence of China’s secretive cyber warfare forces from the Chinese side.”

While addressing to the publication, McReynolds said the unmasking is the first time cyber warfare capabilities have been admitted to on both the military and civilian-government sides.

Deniability, naturally, has now been lost — and whether China’s denial was ever believed in the first place is now a moot point. McReynolds commented:

“It means that the Chinese have discarded their fig leaf of quasi-plausible deniability. As recently as 2013, official PLA publications have issued blanket denials such as, ‘The Chinese military has never supported any hacker attack or hacking activities.’ They can’t make that claim anymore.”

McReynolds has affirmed that China’s digital military strategy has been apportioned into three separate sections. One unit is known as “specialized military network warfare forces,” which focuses on conducting network cyber attacks and defense. Second unit consists of civilian teams which have been given the authority by the Chinese military for running “network warfare operations.” Lastly, third one acts as an umbrella for “external entities” which can be organized and assembled for network warfare operations, but act outside of government departments.

According to the statement of Chinese military each unit targets US companies for the theft of valuable data affiliated to business and trade. As a consequence, it will uplift Chinese firms in the global economy.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...