Attacks/Breaches
1/13/2010
05:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Chinese Spy Agency Behind Google Cyber Attack, Report Claims

The cyber attacks that contributed to Google's reevaluation of its operations in China also hit 33 other companies.

In a blog post heard around the world, though muffled in China's state-controlled media, Google said on Tuesday that it and at least 20 other companies in the the Internet, finance, technology, media and chemical sectors had been targeted in a sophisticated cyber attack in December.

Due to this attack, which resulted in the theft of unspecified intellectual property, and a hostile business climate, Google said it would stop censoring Google.cn, a decision which could lead to the closure of the company's Chinese search service. Whether that happens will depend on how the Chinese government reacts.

U.S. Secretary of State Hillary Rodham Clinton on Tuesday expressed concern about Google's claims and asked the Chinese government for an explanation. She said she intended to give a speech next week "on the centrality of Internet freedom in the 21st century."

A report issued on Tuesday by iDefense, a computer security company owned by Verisign, states that 33 other companies were targeted in the attack. It also says that those responsible were working either directly on on behalf of official intelligence entities of the People's Republic of China.

"Two independent, anonymous iDefense sources in the defense contracting and intelligence consulting community confirmed that both the source IPs and drop server of the attack correspond to a single foreign entity consisting either of agents of the Chinese state or proxies thereof," the report says.

Eli Jellenc, head of international cyber intelligence at Verisign iDefense, stopped short of claiming that the attackers were formally employed by a Chinese intelligence agency.

"We can't determine whether the attackers themselves have 'intelligence agency' on their office door or are a paid proxy," he said.

Adobe on Tuesday said that it learned of "a sophisticated, coordinated attack against corporate network systems managed by Adobe and other companies" on January 2 and that it is investigating the incident. It said that it had no evidence that any sensitive information had been compromised.

Both Google and Adobe declined to provide further details about the attacks, stating that the incidents are still under investigation.

Internet Web hosting company Rackspace has confirmed that it was subject to attack, noting that no customer data was compromised or altered.

According to The Washington Post, Dow Chemical and Northrop Grumman may also have been targets of the attacks.

Other targets of the attack have yet to be publicly identified.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.