Risk
6/2/2011
03:35 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

FBI Investigating Gmail Attacks Attributed To China

U.S. Secretary of State Hilary Clinton called the phishing campaign "very serious," while Chinese officials say it's unacceptable to blame China.

Top 15 Google Apps For Business
Slideshow: Top 15 Google Apps ForBusiness
(click image for larger view and for full slideshow)
Google's report that the Gmail accounts of government officials, human rights activists, military personnel, and journalists have been targeted by a phishing campaign from China has gotten the attention of U.S. authorities. The Department of Homeland Security, the Federal Bureau of Investigation, and the White House National Security Council are all participating in an investigation of the cyber attack.

U.S. Secretary of State Hilary Clinton confirmed the FBI's involvement in remarks a Thursday press briefing and said that an investigation is underway. "[W]e are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders," she said. "Google informed the State Department of this situation yesterday in advance of its public announcement. These allegations are very serious."

Google said that hundreds of Gmail accounts had been affected, and the White House told the Associated Press that no official U.S. government email accounts were accessed. However, according to an unidentified source cited by The Washington Post, the personal Gmail account of one Cabinet-level official was compromised.

Chinese officials have bristled at Google's report. In a Thursday press conference, Hong Lei, spokesperson for the Chinese Foreign Affairs Ministry, characterized Google's claims as fabrications with an ulterior motive. He stressed that the Chinese government firmly opposes hacking and that China itself is the victim of hackers.

Google declined to elaborate on its motives for publicizing the attack. The company on Wednesday said that "being open about these security issues helps users better protect their information online."

That's an unusual position given that companies have traditionally shied away from discussing security issues for fear of brand damage and embarrassment. It's even more unusual given how sensitive Chinese authorities are to criticism, how precarious Google's position in China is after challenging China's censorship policy last year, and how dependent foreign companies are on the goodwill of Chinese authorities to operate in China.

Frank Kenney, a former Gartner analyst and current VP of global strategy at Ipswitch, said in a phone interview that such openness is becoming more common because people are less tolerant of undisclosed breaches.

If Google does have an ulterior motive, it's likely to be to pressure the U.S. government to take a more active role in defending U.S. companies in markets like China that present obstacles to fair competition. Google has asked for U.S. government support against censorship, but the government's response has been to ask companies to take responsibility.

Last year, following Google's announcement that it intended to stop censoring its search results in China, as required by Chinese law, Secretary of State Hillary Clinton announced that the U.S. would reinvigorate the Global Internet Freedom Task Force, founded in 2006, as a forum for addressing threats to Internet freedom but also urged U.S. Internet companies to oppose censorship.

"The private sector has a shared responsibility to help safeguard free expression," Clinton said. "And when their business dealings threaten to undermine this freedom, they need to consider what's right, not simply what's a quick profit."

Figuring out who's responsible for dealing with censorship may be as thorny an issue as figuring out who's responsible for dealing with security. Google is urging Gmail users to review their account settings to make sure they're secure, but Kenney suggested Google could do more to alert users when their accounts are accessed from an unfamiliar IP address or when their accounts have been configured to forward messages.

He also said companies need to look at their own infrastructure and policies if employees are using personal Gmail accounts to get work done. "Individuals use Gmail in the workplace quite frequently when they need to get around the file size or attachment limits that companies put on email," he said.

In order to assure that corporate communication can be governed, "you have to give people a way to get things done that they do every day," he said. "People will do what they need to do to be productive."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?