Risk
6/2/2011
03:35 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

FBI Investigating Gmail Attacks Attributed To China

U.S. Secretary of State Hilary Clinton called the phishing campaign "very serious," while Chinese officials say it's unacceptable to blame China.

Top 15 Google Apps For Business
Slideshow: Top 15 Google Apps ForBusiness
(click image for larger view and for full slideshow)
Google's report that the Gmail accounts of government officials, human rights activists, military personnel, and journalists have been targeted by a phishing campaign from China has gotten the attention of U.S. authorities. The Department of Homeland Security, the Federal Bureau of Investigation, and the White House National Security Council are all participating in an investigation of the cyber attack.

U.S. Secretary of State Hilary Clinton confirmed the FBI's involvement in remarks a Thursday press briefing and said that an investigation is underway. "[W]e are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders," she said. "Google informed the State Department of this situation yesterday in advance of its public announcement. These allegations are very serious."

Google said that hundreds of Gmail accounts had been affected, and the White House told the Associated Press that no official U.S. government email accounts were accessed. However, according to an unidentified source cited by The Washington Post, the personal Gmail account of one Cabinet-level official was compromised.

Chinese officials have bristled at Google's report. In a Thursday press conference, Hong Lei, spokesperson for the Chinese Foreign Affairs Ministry, characterized Google's claims as fabrications with an ulterior motive. He stressed that the Chinese government firmly opposes hacking and that China itself is the victim of hackers.

Google declined to elaborate on its motives for publicizing the attack. The company on Wednesday said that "being open about these security issues helps users better protect their information online."

That's an unusual position given that companies have traditionally shied away from discussing security issues for fear of brand damage and embarrassment. It's even more unusual given how sensitive Chinese authorities are to criticism, how precarious Google's position in China is after challenging China's censorship policy last year, and how dependent foreign companies are on the goodwill of Chinese authorities to operate in China.

Frank Kenney, a former Gartner analyst and current VP of global strategy at Ipswitch, said in a phone interview that such openness is becoming more common because people are less tolerant of undisclosed breaches.

If Google does have an ulterior motive, it's likely to be to pressure the U.S. government to take a more active role in defending U.S. companies in markets like China that present obstacles to fair competition. Google has asked for U.S. government support against censorship, but the government's response has been to ask companies to take responsibility.

Last year, following Google's announcement that it intended to stop censoring its search results in China, as required by Chinese law, Secretary of State Hillary Clinton announced that the U.S. would reinvigorate the Global Internet Freedom Task Force, founded in 2006, as a forum for addressing threats to Internet freedom but also urged U.S. Internet companies to oppose censorship.

"The private sector has a shared responsibility to help safeguard free expression," Clinton said. "And when their business dealings threaten to undermine this freedom, they need to consider what's right, not simply what's a quick profit."

Figuring out who's responsible for dealing with censorship may be as thorny an issue as figuring out who's responsible for dealing with security. Google is urging Gmail users to review their account settings to make sure they're secure, but Kenney suggested Google could do more to alert users when their accounts are accessed from an unfamiliar IP address or when their accounts have been configured to forward messages.

He also said companies need to look at their own infrastructure and policies if employees are using personal Gmail accounts to get work done. "Individuals use Gmail in the workplace quite frequently when they need to get around the file size or attachment limits that companies put on email," he said.

In order to assure that corporate communication can be governed, "you have to give people a way to get things done that they do every day," he said. "People will do what they need to do to be productive."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.