Attacks/Breaches
11/20/2008
06:11 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

China Targets U.S. Computers For Espionage, Report Warns

The 2008 Annual Report to Congress urges tighter computer security measures to prevent data loss or corruption.

The USCC report also warned about the risks posed by IT hardware manufactured abroad.

"The global supply chain for telecommunications items introduces another vulnerability to U.S. computers and networks," the report says. "Components in these computers and networks are manufactured overseas -- many of them in China. At least in theory, this equipment is vulnerable to tampering by Chinese security services, such as implanting malicious code that could be remotely activated on command and place U.S. systems or the data they contain at risk of destruction or manipulation. In a recent incident, hundreds of counterfeit routers made in China were discovered being used throughout the Department of Defense. This suggests that at least in part, Defense Department computer systems and networks may be vulnerable to malicious action that could destroy or manipulate information they contain."

Such concerns have been circulating for years in government security circles. But action may be at hand. On Tuesday, civilian and defense procurement groups published a notice in the Federal Register seeking comment on whether federal acquisition rules should be revised to require that "contractors selling information technology (IT) products (including computer hardware and software) represent that such products are authentic."

In February, the FBI announced that its ongoing anti-counterfeiting campaign had resulted in more than 400 seizures of fake Cisco equipment worth more than $76 million. A five-page FBI PowerPoint presentation dated Jan. 11, 2008, summarizes some of the agency's findings in its investigation of fake Cisco gear. It notes that fake hardware is vulnerable to supply chain subversion and attack, and could allow others to access to systems meant to be secure.

For more security insights, InformationWeek has published its 2008 Strategic Security Survey. Download the report here (registration required).

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6278
Published: 2014-09-30
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and m...

CVE-2014-6805
Published: 2014-09-30
The weibo (aka magic.weibo) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6806
Published: 2014-09-30
The Thanodi - Setswana Translator (aka com.thanodi.thanodi) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6807
Published: 2014-09-30
The OLA School (aka com.conduit.app_00f9890a4f0145f2aae9d714e20b273a.app) application 1.2.7.132 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6808
Published: 2014-09-30
The Active 24 (aka com.zentity.app.active24) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.