<p>Security company McAfee, which uncovered the intrusions, said it believed there was one "state actor" behind the attacks but declined to name it, though one security expert who has been briefed on the hacking said the evidence points to <a href="http://www.reuters.com/places/china">China</a>.</p>.<p>The long list of victims in the five-year campaign include the governments of the United States, Taiwan, India, <a href="http://www.reuters.com/places/south-korea">South Korea</a>, Vietnam and Canada; the Association of Southeast Asian Nations (ASEAN); the International Olympic Committee (IOC); the World Anti-Doping Agency; and an array of companies, from defense contractors to high-tech enterprises.</p>.<p>In the case of the United Nations, the hackers broke into the computer system of the UN Secretariat in Geneva in 2008, hid there unnoticed for nearly two years, and quietly combed through reams of secret data, according to McAfee.</p>.<p>"Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators," McAfee's vice president of threat research, Dmitri Alperovitch, wrote in a 14-page report released on Wednesday.</p>.<p>"What is happening to all this data ... is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat."</p>.<p>McAfee learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a "command and control" server that they had discovered in 2009 as part of an investigation into security breaches at defense companies.</p>.<p>It dubbed the attacks "Operation Shady RAT" and said the earliest breaches date back to mid-2006, though there might have been other intrusions as yet undetected. (RAT stands for "remote access tool," a type of software that hackers and security experts use to access computer networks from afar).</p>.<p>Some of the attacks lasted just a month, but the longest -- on the Olympic Committee of an unidentified Asian nation -- went on and off for 28 months, according to McAfee.</p>.<p>"Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors," Alperovitch told Reuters.</p>.<p>"This is the biggest transfer of wealth in terms of intellectual property in history," he said. "The scale at which this is occurring is really, really frightening."</p>.<p>CHINA CONNECTION?</p>.<p>He said that McAfee had notified all the 72 victims of the attacks, which are under investigation by law enforcement agencies around the world. He declined to give more details, such as the names of the companies hacked.</p>.<p>Jim Lewis, a cyber expert with the Center for Strategic and International Studies, was briefed on the discovery by McAfee. He said it was very likely that China was behind the campaign because some of the targets had information that would be of particular interest to Beijing.</p>.<p>The systems of the IOC and several national Olympic Committees were breached in the run-up to the 2008 Beijing Games, for example.</p>.<p>And China views Taiwan as a renegade province, and political issues between them remain contentious even as economic ties have strengthened in recent years.</p>.<p>"Everything points to China. It could be the Russians, but there is more that points to China than <a href="http://www.reuters.com/places/russia">Russia</a>," Lewis said.</p>.<p>He added that the U.S. and Britain have capabilities to pull off this kind of campaign, but said, "We wouldn't spy on ourselves and the Brits wouldn't spy on us."</p>.<p>McAfee, which was acquired by Intel Corp this year, would not comment on whether China was responsible. Security researchers who work for large corporations are often reluctant to link governments to cyber attacks out of fear it could hurt their business in those countries.</p>.<p>HACKERS CONFERENCE</p>.<p>The UN said it was aware of the report, and that it has started an investigation to ascertain if there was an intrusion.</p>.<p>"The idea is to look into the entire Geneva network," said Farhan Haq, Deputy Spokesperson for the UN Secretary-General, adding that it was difficult to quantify the potential damage without knowing exactly what had been attacked.</p>.<p>He declined to be drawn on who might be behind the attacks. When asked what would happen if it turned out to be China, he said: "We'll have to cross that bridge once we find out what happened to our network."</p>.<p>McAfee released the report to coincide with the start of the Black Hat conference in Las Vegas on Wednesday, an annual gathering of security professionals and hackers who use their skills to promote security and fight cyber crime.</p>.<p>In the scorching desert heat, they will meet to talk about a series of recent headline-grabbing hacks, such as on Lockheed Martin Corp, the International Monetary Fund, Citigroup Inc, Sony Corp and EMC Corp's RSA Security.</p>.<p>Experts will disclose security vulnerabilities in commonly used software, computers, services and electronics to help companies and governments combat criminal hackers.</p>.<p>The activist groups Anonymous and Lulz Security have recently grabbed the spotlight for temporarily shutting down some high-profile websites and defacing others.</p>.<p>But attacks like Operation Shady RAT are far more costly and often undisclosed, as victims fear reputational damage or attention from other hackers. McAfee sees Operation Shady RAT as the tip of the iceberg.</p>.<p>"I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact," Alperovitch wrote in the report.</p>.<p>"In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know."</p>
<p>Security company McAfee, which uncovered the intrusions, said it believed there was one "state actor" behind the attacks but declined to name it, though one security expert who has been briefed on the hacking said the evidence points to <a href="http://www.reuters.com/places/china">China</a>.</p>.<p>The long list of victims in the five-year campaign include the governments of the United States, Taiwan, India, <a href="http://www.reuters.com/places/south-korea">South Korea</a>, Vietnam and Canada; the Association of Southeast Asian Nations (ASEAN); the International Olympic Committee (IOC); the World Anti-Doping Agency; and an array of companies, from defense contractors to high-tech enterprises.</p>.<p>In the case of the United Nations, the hackers broke into the computer system of the UN Secretariat in Geneva in 2008, hid there unnoticed for nearly two years, and quietly combed through reams of secret data, according to McAfee.</p>.<p>"Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators," McAfee's vice president of threat research, Dmitri Alperovitch, wrote in a 14-page report released on Wednesday.</p>.<p>"What is happening to all this data ... is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat."</p>.<p>McAfee learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a "command and control" server that they had discovered in 2009 as part of an investigation into security breaches at defense companies.</p>.<p>It dubbed the attacks "Operation Shady RAT" and said the earliest breaches date back to mid-2006, though there might have been other intrusions as yet undetected. (RAT stands for "remote access tool," a type of software that hackers and security experts use to access computer networks from afar).</p>.<p>Some of the attacks lasted just a month, but the longest -- on the Olympic Committee of an unidentified Asian nation -- went on and off for 28 months, according to McAfee.</p>.<p>"Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors," Alperovitch told Reuters.</p>.<p>"This is the biggest transfer of wealth in terms of intellectual property in history," he said. "The scale at which this is occurring is really, really frightening."</p>.<p>CHINA CONNECTION?</p>.<p>He said that McAfee had notified all the 72 victims of the attacks, which are under investigation by law enforcement agencies around the world. He declined to give more details, such as the names of the companies hacked.</p>.<p>Jim Lewis, a cyber expert with the Center for Strategic and International Studies, was briefed on the discovery by McAfee. He said it was very likely that China was behind the campaign because some of the targets had information that would be of particular interest to Beijing.</p>.<p>The systems of the IOC and several national Olympic Committees were breached in the run-up to the 2008 Beijing Games, for example.</p>.<p>And China views Taiwan as a renegade province, and political issues between them remain contentious even as economic ties have strengthened in recent years.</p>.<p>"Everything points to China. It could be the Russians, but there is more that points to China than <a href="http://www.reuters.com/places/russia">Russia</a>," Lewis said.</p>.<p>He added that the U.S. and Britain have capabilities to pull off this kind of campaign, but said, "We wouldn't spy on ourselves and the Brits wouldn't spy on us."</p>.<p>McAfee, which was acquired by Intel Corp this year, would not comment on whether China was responsible. Security researchers who work for large corporations are often reluctant to link governments to cyber attacks out of fear it could hurt their business in those countries.</p>.<p>HACKERS CONFERENCE</p>.<p>The UN said it was aware of the report, and that it has started an investigation to ascertain if there was an intrusion.</p>.<p>"The idea is to look into the entire Geneva network," said Farhan Haq, Deputy Spokesperson for the UN Secretary-General, adding that it was difficult to quantify the potential damage without knowing exactly what had been attacked.</p>.<p>He declined to be drawn on who might be behind the attacks. When asked what would happen if it turned out to be China, he said: "We'll have to cross that bridge once we find out what happened to our network."</p>.<p>McAfee released the report to coincide with the start of the Black Hat conference in Las Vegas on Wednesday, an annual gathering of security professionals and hackers who use their skills to promote security and fight cyber crime.</p>.<p>In the scorching desert heat, they will meet to talk about a series of recent headline-grabbing hacks, such as on Lockheed Martin Corp, the International Monetary Fund, Citigroup Inc, Sony Corp and EMC Corp's RSA Security.</p>.<p>Experts will disclose security vulnerabilities in commonly used software, computers, services and electronics to help companies and governments combat criminal hackers.</p>.<p>The activist groups Anonymous and Lulz Security have recently grabbed the spotlight for temporarily shutting down some high-profile websites and defacing others.</p>.<p>But attacks like Operation Shady RAT are far more costly and often undisclosed, as victims fear reputational damage or attention from other hackers. McAfee sees Operation Shady RAT as the tip of the iceberg.</p>.<p>"I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact," Alperovitch wrote in the report.</p>.<p>"In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know."</p>