03:35 PM
Connect Directly

FBI Investigating Gmail Attacks Attributed To China

U.S. Secretary of State Hilary Clinton called the phishing campaign "very serious," while Chinese officials say it's unacceptable to blame China.

Top 15 Google Apps For Business
Slideshow: Top 15 Google Apps ForBusiness
(click image for larger view and for full slideshow)
Google's report that the Gmail accounts of government officials, human rights activists, military personnel, and journalists have been targeted by a phishing campaign from China has gotten the attention of U.S. authorities. The Department of Homeland Security, the Federal Bureau of Investigation, and the White House National Security Council are all participating in an investigation of the cyber attack.

U.S. Secretary of State Hilary Clinton confirmed the FBI's involvement in remarks a Thursday press briefing and said that an investigation is underway. "[W]e are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders," she said. "Google informed the State Department of this situation yesterday in advance of its public announcement. These allegations are very serious."

Google said that hundreds of Gmail accounts had been affected, and the White House told the Associated Press that no official U.S. government email accounts were accessed. However, according to an unidentified source cited by The Washington Post, the personal Gmail account of one Cabinet-level official was compromised.

Chinese officials have bristled at Google's report. In a Thursday press conference, Hong Lei, spokesperson for the Chinese Foreign Affairs Ministry, characterized Google's claims as fabrications with an ulterior motive. He stressed that the Chinese government firmly opposes hacking and that China itself is the victim of hackers.

Google declined to elaborate on its motives for publicizing the attack. The company on Wednesday said that "being open about these security issues helps users better protect their information online."

That's an unusual position given that companies have traditionally shied away from discussing security issues for fear of brand damage and embarrassment. It's even more unusual given how sensitive Chinese authorities are to criticism, how precarious Google's position in China is after challenging China's censorship policy last year, and how dependent foreign companies are on the goodwill of Chinese authorities to operate in China.

Frank Kenney, a former Gartner analyst and current VP of global strategy at Ipswitch, said in a phone interview that such openness is becoming more common because people are less tolerant of undisclosed breaches.

If Google does have an ulterior motive, it's likely to be to pressure the U.S. government to take a more active role in defending U.S. companies in markets like China that present obstacles to fair competition. Google has asked for U.S. government support against censorship, but the government's response has been to ask companies to take responsibility.

Last year, following Google's announcement that it intended to stop censoring its search results in China, as required by Chinese law, Secretary of State Hillary Clinton announced that the U.S. would reinvigorate the Global Internet Freedom Task Force, founded in 2006, as a forum for addressing threats to Internet freedom but also urged U.S. Internet companies to oppose censorship.

"The private sector has a shared responsibility to help safeguard free expression," Clinton said. "And when their business dealings threaten to undermine this freedom, they need to consider what's right, not simply what's a quick profit."

Figuring out who's responsible for dealing with censorship may be as thorny an issue as figuring out who's responsible for dealing with security. Google is urging Gmail users to review their account settings to make sure they're secure, but Kenney suggested Google could do more to alert users when their accounts are accessed from an unfamiliar IP address or when their accounts have been configured to forward messages.

He also said companies need to look at their own infrastructure and policies if employees are using personal Gmail accounts to get work done. "Individuals use Gmail in the workplace quite frequently when they need to get around the file size or attachment limits that companies put on email," he said.

In order to assure that corporate communication can be governed, "you have to give people a way to get things done that they do every day," he said. "People will do what they need to do to be productive."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
The Role of KPIs in Incident Response
John Moran, Senior Product Manager, DFLabs,  4/18/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.