A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically an unit that goes under the cover name "Unit 61398".
Security company Mandiant said in a report released Tuesday that an Advanced Persistent Threat group it called APT1 was one of the most persistent of China's cyberthreat actors because of its likely government support.
"In seeking to identify the organization behind this activity, our research found that People's Liberation Army (PLA's) Unit 61398 is similar to APT1 in its mission, capabilities, and resources," Mandiant said in its report. "PLA Unit 61398 is also located in precisely the same area from which APT1 activity appears to originate."
Unit 61398 is said to be located in a 130,663 square-foot building on Datong Road in Gaoqiaozhen, in the Pudong New Area of Shanghai.
The nature of the work of "Unit 61398" is considered by China to be a state secret, but Mandiant said it believes it engages in harmful computer network operations.
The group has a sinister track record, according to Mandiant, as since 2006, it has observed APT1 compromise 141 companies spanning 20 major industries. 87 percent of the target companies are headquartered in countries where English is the native language, and are in industries that China has identified as strategic.
APT1 uses tools that the security firm finds have not been used by other groups, including two tools for stealing emails called GETMAIL and MAPIGET. Once the group has established access, it periodically revisits the victim's network over several months or years to steal a variety of intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists from the leadership of the victim organizations, Mandiant said.
The Chinese government was not immediately available for comment. The government has been accused recently of hacking into emails of major newspapers, which it has denied.