03:35 PM
Connect Directly

FBI Investigating Gmail Attacks Attributed To China

U.S. Secretary of State Hilary Clinton called the phishing campaign "very serious," while Chinese officials say it's unacceptable to blame China.

Top 15 Google Apps For Business
Slideshow: Top 15 Google Apps ForBusiness
(click image for larger view and for full slideshow)
Google's report that the Gmail accounts of government officials, human rights activists, military personnel, and journalists have been targeted by a phishing campaign from China has gotten the attention of U.S. authorities. The Department of Homeland Security, the Federal Bureau of Investigation, and the White House National Security Council are all participating in an investigation of the cyber attack.

U.S. Secretary of State Hilary Clinton confirmed the FBI's involvement in remarks a Thursday press briefing and said that an investigation is underway. "[W]e are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders," she said. "Google informed the State Department of this situation yesterday in advance of its public announcement. These allegations are very serious."

Google said that hundreds of Gmail accounts had been affected, and the White House told the Associated Press that no official U.S. government email accounts were accessed. However, according to an unidentified source cited by The Washington Post, the personal Gmail account of one Cabinet-level official was compromised.

Chinese officials have bristled at Google's report. In a Thursday press conference, Hong Lei, spokesperson for the Chinese Foreign Affairs Ministry, characterized Google's claims as fabrications with an ulterior motive. He stressed that the Chinese government firmly opposes hacking and that China itself is the victim of hackers.

Google declined to elaborate on its motives for publicizing the attack. The company on Wednesday said that "being open about these security issues helps users better protect their information online."

That's an unusual position given that companies have traditionally shied away from discussing security issues for fear of brand damage and embarrassment. It's even more unusual given how sensitive Chinese authorities are to criticism, how precarious Google's position in China is after challenging China's censorship policy last year, and how dependent foreign companies are on the goodwill of Chinese authorities to operate in China.

Frank Kenney, a former Gartner analyst and current VP of global strategy at Ipswitch, said in a phone interview that such openness is becoming more common because people are less tolerant of undisclosed breaches.

If Google does have an ulterior motive, it's likely to be to pressure the U.S. government to take a more active role in defending U.S. companies in markets like China that present obstacles to fair competition. Google has asked for U.S. government support against censorship, but the government's response has been to ask companies to take responsibility.

Last year, following Google's announcement that it intended to stop censoring its search results in China, as required by Chinese law, Secretary of State Hillary Clinton announced that the U.S. would reinvigorate the Global Internet Freedom Task Force, founded in 2006, as a forum for addressing threats to Internet freedom but also urged U.S. Internet companies to oppose censorship.

"The private sector has a shared responsibility to help safeguard free expression," Clinton said. "And when their business dealings threaten to undermine this freedom, they need to consider what's right, not simply what's a quick profit."

Figuring out who's responsible for dealing with censorship may be as thorny an issue as figuring out who's responsible for dealing with security. Google is urging Gmail users to review their account settings to make sure they're secure, but Kenney suggested Google could do more to alert users when their accounts are accessed from an unfamiliar IP address or when their accounts have been configured to forward messages.

He also said companies need to look at their own infrastructure and policies if employees are using personal Gmail accounts to get work done. "Individuals use Gmail in the workplace quite frequently when they need to get around the file size or attachment limits that companies put on email," he said.

In order to assure that corporate communication can be governed, "you have to give people a way to get things done that they do every day," he said. "People will do what they need to do to be productive."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.