The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015 Xi-Obama agreement stopping military forces from hacking commercial enterprises for economic gain did appear to dramatically reduce Chinese theft efforts against western targets. China’s technological development process, however, was still dependent on massive expropriation of foreign R&D.


cyberaffairs

Click the image above to go to the paper

This necessitated new ways to get information while still technically adhering to the agreement. Since the agreement only covered military activities, Chinese corporate state champions could be tasked with taking up the slack. But even Chinese multinationals, such as Huawei or ZTE, were already being viewed with suspicion. Instead data suggests the government opted to leverage a seemingly innocuous player – one that is normally viewed as a passive service provider – to target the foundational infrastructure of the internet to bypass the agreement, avoid detection, and provide the necessary access to information.

Enter China Telecom3 – a large state champion telecommunications company – as an option. While the 2015 agreement prohibited direct attacks on computer networks, it did nothing to prevent the hijacking of the vital internet backbone of western countries.

Conveniently, China Telecom has ten strategically placed, Chinese controlled internet ‘points of presence’4 (PoPs) across the internet backbone of North America. Vast rewards can be reaped from the hijacking, diverting, and then copying of information-rich traffic going into or crossing the United States and Canada – often unnoticed and then delivered with only small delays.

This essay will show how this hijacking works, and how China Telecom seems to employ its distributed points of presence (PoPs) in western democracies’ telecommunications systems to selectively redirect internet traffic through China. It will show the observed routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications.

These Chinese PoPs are found all over the world including Europe and Asia. The prevalence of – and demonstrated ease with which – one can simply redirect and copy data by controlling key transit nodes buried in a nation’s infrastructure requires an urgent policy response. To that end, we recommend an ‘Access Reciprocity’ strategy for vulnerable democracies – one that is

We at Adept Technologies recommend that all Cyber Professionals read this paper.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Its just a matter of time

We are watching you. From us to you. Its just a matter of time.

ADEPT SECURE ® Reduced Cyberattacks by 96%. By implementing ADEPT SECURE ® on high target Power Company and Government systems they have reported to us a staggering 96% reduction in cyberattacks.

As we get more results, and more attack data, the overwhelming tasks of dealing with numerous cyberattacks have become more manageable with ADEPT SECURE ®.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

ADEPT SECURE ® Reduced Cyberattacks by 96%

Cyber Security – ADEPT SECURE ® sets a standard in providing high levels of protecting data and integrity of computing assets belonging to and connecting to an organization’s network. Its purpose is to defend those assets against all threat actors throughout the entire life cycles of numerous cyberattacks.

96 Percent

Adept’s Secure Security Solution – Data Breaches and attacks are an increasing threat to every computerized system which also faces the prospect of severe impact on their branding and reputation due to increased negative sentiment driven by media news of successful cyberattacks.

A majority of cyber security experts agree that mitigating reputational risk is crucial to any business and that managing IT Security plays a major role in these efforts, along with the obvious loss of Intellectual property, money, insurance, and other value.

ADEPT SECURE ® Reduced Cyberattacks by 96%. By implementing ADEPT SECURE ® on high target Power Company and Government systems they have reported to us a staggering 96% reduction in cyberattacks.

We believe that once the attacking systems realized they are being tracked, blocked, recorded, watched, they move on to easier targets. It is like parking your car and locking it in a very bad neighborhood at night.

You have billions of bad guys attempting to open the door, see its locked and move on to the next parked car. Then you get the millions that have dealer set keys that try every attempt to open the lock on the door, none of their keys work because the door lock disappears. Then you get the thousands that attempt to break the car windows, they move on because the whole car disappears.

All the attackers are on security cameras and photos of them all have been recorded are shared with other car owners and law enforcement.

The bad guys that have Harry Potter’s Cloak of Invisibility on, that is make believe, you think your IP address is spoofed, nothing is truly invisibility on the internet.

“As we get more results, and more attack data, the overwhelming tasks of dealing with numerous cyberattacks have become more manageable with ADEPT SECURE ®, and you sleep a lot better” says Nicholas Cordua, Chief Technology Officer of Adept Technologies Inc.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Run for your life! There are stupid hackers everywhere!

Over the last three months the amount of hacking has been insane. However, the amounts of hacking data we have received on the bad guys has been amazing. Our cyber security teams have been having a lot of fun and we have learned a lot.

Here is some of what we learned.

Spoofing IP addresses, we have seen a lot of this lately, and unfortunately most ISP (Internet Service Providers) are supposed to NOT allow this type of traffic to pass through their systems.

Bad Hackers

Unfortunately these ISP corporations are allowing this traffic through their systems, since we have caught a lot of it.

Denial of Service Attacks, are way up. We see hackers get pissed off on not getting what they want so they have temper tantrums and fire off Denial of Service attacks. Which is totally stupid.

Spoof your IP addresses when doing this, you don’t want a swat team showing up at the data center you have a VM (virtualized server) account with a VPN (Virtual Private Network) from your private LAN running stolen CIA hacking tools, attacking us.

It will be wonderful seeing the USA Data center people getting pissed off and coming after you since we filed civil and criminal complaints against them for your illegal actions.

Let’s throw in the law firms. We then file huge amounts of civil legal action against these firms, huge amounts of damages, any law firm eats this up, especially ours. The insurance companies get involved, their law firms get involved and we basically put you or your supporters out of business.

No insurance company will ever insure you again based on the huge amounts of settlements or when we go to trial, because we love to go all the way. It is just over for you or the company allowing you to hack.

Since the Coronavirus has been very bad, especially here in the USA, I don’t ever see a Jury feel sorry for a Hacker that took down any SaaS system, or stole data that caused problems when everyone is using these systems to work from home.

If you are outside the USA, that is ok too. We just block your whole country. That’s when you purchase a service here in the USA and attack us that way, which is great because we then have a party here in the USA that allowed you to do this. Lawsuit! We then go after them.

We watch everything, because that is what we do. We are super nerds. One nice thing about all these attacks is the data. We look forward towards more data.

There are patterns in the attacks too, some just go on forever especially brute force attacks against FTP and VPN systems. Even if you shut off the ports and log the attempts. The logs just capture so much honey. Some of these attacks come from University systems (University of Utah 128.110.154.3 and Wisconsin 128.105.145.159) Is everyone out there a hacker these days?? I guess they are, but stupid in more ways than one.

Be safe out there. Sad seeing all of this. We as humans are supposed to be better than this, we must all be held to a higher standard. If not well when you get caught and you will if you are a hacker, it will not be good for you. Can’t we all just get along? If your a hacker Stop it!

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Payment Tenders With Adept Enterprise®

Adept Enterprise ® has supported multiple tenders for payment transactions for over 16 years, for both government departments and the private sectors.

A payment tender is the method by which a payment was received. Cash, standard check, electronic check, wire transfer, PayPal, and credit cards are all examples of payment tenders. We now support Payment Tender methods of Google Pay and Apple Pay.

Using payment tenders allows you to classify payments, what fees were paid by what tender making reconciliation and reporting easier. The payment report, for example, displays a summary of payments broken down by tender and what fee was paid by what tender.

Adept Enterprise®  Payment Tenders
Selecting Fees and making multiple tender payments are easy and secure.

Providing your customers with multiple tenders for payment transactions makes it easy for your customers to get their permits, licenses, uses and any other transaction with any payment form they are comfortable with. Sticking to just accepting cash or check makes the payment experience for the customer and your staff much more difficult.

Adept Enterprise® also supports Trust Accounting which is a payment method of Contractors depositing funds into the Adept Enterprise® system and withdraws the funds to pay for planning, permits and licenses for their projects with the agencies.

Adept Enterprise® integrates with many financial software systems for real time and/or nightly exports/imports to these systems, which automates the tracking for fees and payments with the financial institutions.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.