Key Findings from China’s 2018 Q2 Internet Security Threat Report
The 2018 second‑quarter report by the Ministry of Industry and Information Technology details the monitoring of approximately 18.4 million internet security threats, highlighting compromised user email accounts, attacks on industrial IoT platforms and devices, the rise of illegal cryptocurrency mining, and outlines the major mitigation actions taken, including vulnerability remediation, network protection for major events, and coordinated emergency drills.
1. Network Security Threat Situation
In the second quarter, about 18.41 million internet security threats were monitored, with roughly 16.83 million detected by basic telecom operators, 300 thousand by security agencies, and 1.55 million by key internet enterprises, domain registrars, and security firms. The threat landscape showed several notable trends:
Compromised user email accounts : Nearly 100 thousand user email accounts appeared to be controlled by hackers, used for spam and potentially exposing passwords, posing serious personal information risks.
Industrial IoT platforms and smart devices as targets : 22 domestic industrial IoT platforms were attacked 656 times from abroad; 115 new industrial control system vulnerabilities were discovered across brands such as Rockwell, Siemens, and Schneider Electric; over 527 thousand IPs of compromised IoT devices were identified, with 13 botnets controlling more than 10 thousand IPs each.
Illegal cryptocurrency mining : Cloud mining activities surged, with cloud hosts being abused to mine Monero and other coins; botnet expansion increasingly aimed at hijacking mining rigs; a new mining malware targeting XMR spread rapidly, generating nearly one million CNY in illicit profits.
2. Main Work Conducted
Security for the Qingdao SCO Summit : Coordinated telecom regulators, operators, security agencies, and internet enterprises to provide link expansion, reinforcement, and traffic cleaning; remediated ten high‑risk industrial IoT vulnerabilities; neutralized over 10 thousand botnet nodes and shut down 620 malicious domains, blocking more than 350 thousand malicious programs.
Struts 2 vulnerability remediation : Guided provincial telecom bureaus and enterprises to scan and remediate over 300 thousand websites, addressing more than 2 thousand Struts 2 vulnerabilities.
Handling public internet threats : Across the industry, about 11.44 million threats were mitigated, including 1.12 million by telecom regulators and 10.15 million by basic telecom operators. Thirteen malicious mobile apps were taken down, and several offending applications were forced to rectify.
Enforcement of the Cybersecurity Law : Administrative penalties were imposed on entities misusing Wi‑Fi passwords and other user data; multiple enterprises were ordered to rectify privacy violations.
Cybersecurity competitions and training : Hosted regional offensive‑defensive contests, industrial IoT security elite invitational, and numerous skill competitions to scout talent; conducted emergency drills and knowledge‑training sessions for industry personnel.
3. Next Steps
Future priorities include strengthening security guarantees for major events, intensifying remediation of malware, botnets, and malicious mobile programs, and accelerating the formulation of industrial IoT security standards and pilot projects to promote best‑practice solutions.
Efficient Ops
This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.