Chinese cyberspying in the oil fields

A China-based man named Song Zhiyue has provided cheap U.S. computer servers for hackers who used everyday tools to infiltrate five multinational energy companies for as many as four years, according to a report issued today by McAfee. Song, based in the Shandong Province’s Heze City, in eastern China, is one of an undetermined number ...

Roslan Rahman AFP/Getty Image
Roslan Rahman AFP/Getty Image
Roslan Rahman AFP/Getty Image

A China-based man named Song Zhiyue has provided cheap U.S. computer servers for hackers who used everyday tools to infiltrate five multinational energy companies for as many as four years, according to a report issued today by McAfee. Song, based in the Shandong Province's Heze City, in eastern China, is one of an undetermined number of other hacking specialists working normal business hours in Beijing to infiltrate the computer systems of energy companies in four countries --  the United States, Taiwan, Greece and Kazakhstan. McAfee did not identify the companies but said that Song's operation and that of the hackers has not been shut down.

A China-based man named Song Zhiyue has provided cheap U.S. computer servers for hackers who used everyday tools to infiltrate five multinational energy companies for as many as four years, according to a report issued today by McAfee. Song, based in the Shandong Province’s Heze City, in eastern China, is one of an undetermined number of other hacking specialists working normal business hours in Beijing to infiltrate the computer systems of energy companies in four countries —  the United States, Taiwan, Greece and Kazakhstan. McAfee did not identify the companies but said that Song’s operation and that of the hackers has not been shut down.

The attacks are a sign of the increasing difficulty and high stakes involved in oil and gas exploration, and the extent to which some companies and countries are willing to go to get access to the fields. The purpose of the octopus-like hacking was a system that mined financial and exploration data on oil- and gas-fields that was critical to bidding for the fields, McAfee said. The attacks suggest that officials or companies in China were attempting to understand fields that were or going to be under bid; the financial and other plans of rivals that might bid on the same fields; and the equipment already at the fields or that might be used to explore or produce there.

Such information would obviously be highly valuable in a bidding contest. In addition to the five companies identified, the hackers got into the systems of seven other as-yet unidentified companies.

A few days ago, Mara Hvistendahl wrote a piece here at Foreign Policy describing the free-lance army of Chinese  hackers out there, some of them prepared at universities but otherwise self-trained and ready to infiltrate anyone’s activities. That demonstrates the size of the talent pool for this brand of breaking-and-entering. But a different kind of skill — a sophistication with oilfield contracts and value — would be necessary in this case to make any use of what they found.

McAfee identified Song, his location, that of the hackers and the hours they work (9 a.m. to 5 p.m. Beijing time) through a study of the codes and IP addresses left behind and used by the hacking system. Song provided the servers for as little as $10 for 100 megabytes of space, McAfee said.If anything came of what these enthusiasts turned up, they were from a finance and specifically energy finance background.

As far as I can tell, The Wall Street Journal’s Nathan Hodge and Adam Entous are the only reporters to have Song’s actual identity — the McAfee report does not include it. Hodge and Entous contacted Chevron, the biggest multinational oil player in Kazakhstan. The company said it isn’t aware of hackers having infiltrated any of its computer systems. Both BP and ExxonMobil declined to comment to the paper.

George Kurtz, McAfee’s chief technology officer, said in a blog post that the hackers used totally ordinary and long-known methods, which is why they were able to fly under the radar screen for so long. What are some of the tell-tale signs that the attacks were based in China? "The tools, techniques, and network activities used in these attacks originate primarily in China," Kurtz said. "These tools are widely available on the Chinese Web forums and tend to be used extensively by Chinese hacker groups."

<p> Steve LeVine is a contributing editor at Foreign Policy, a Schwartz Fellow at the New America Foundation, and author of The Oil and the Glory. </p>

More from Foreign Policy

A photo illustration shows Chinese President Xi Jinping and U.S. President Joe Biden posing on pedestals atop the bipolar world order, with Indian Prime Minister Narendra Modi, European Commission President Ursula von der Leyen, and Russian President Vladamir Putin standing below on a gridded floor.
A photo illustration shows Chinese President Xi Jinping and U.S. President Joe Biden posing on pedestals atop the bipolar world order, with Indian Prime Minister Narendra Modi, European Commission President Ursula von der Leyen, and Russian President Vladamir Putin standing below on a gridded floor.

No, the World Is Not Multipolar

The idea of emerging power centers is popular but wrong—and could lead to serious policy mistakes.

A view from the cockpit shows backlit control panels and two pilots inside a KC-130J aerial refueler en route from Williamtown to Darwin as the sun sets on the horizon.
A view from the cockpit shows backlit control panels and two pilots inside a KC-130J aerial refueler en route from Williamtown to Darwin as the sun sets on the horizon.

America Prepares for a Pacific War With China It Doesn’t Want

Embedded with U.S. forces in the Pacific, I saw the dilemmas of deterrence firsthand.

The Chinese flag is raised during the opening ceremony of the Beijing Winter Olympics at Beijing National Stadium on Feb. 4, 2022.
The Chinese flag is raised during the opening ceremony of the Beijing Winter Olympics at Beijing National Stadium on Feb. 4, 2022.

America Can’t Stop China’s Rise

And it should stop trying.

Ukrainian President Volodymyr Zelensky looks on prior a meeting with European Union leaders in Mariinsky Palace, in Kyiv, on June 16, 2022.
Ukrainian President Volodymyr Zelensky looks on prior a meeting with European Union leaders in Mariinsky Palace, in Kyiv, on June 16, 2022.

The Morality of Ukraine’s War Is Very Murky

The ethical calculations are less clear than you might think.