Vulnerabilities / Threats
2/8/2010
02:21 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China Closes Hacker Training Site

The arrests, which took place before Google revealed that it had been targeted by a cyber attack from China, reflect growing concern about internal cybercrime.

China's largest training Web site for hackers has reportedly been shut down following a major raid by authorities in China's Hubei Province.

Late last year, some 50 police officers arrested three individuals associated with the Black Hawk Safety Net (3800cc.com), a group that allegedly sold training materials and malicious code for illegal hacking, according to reports in China's state-run media.

About 1.7 million yuan ($249,000) of the group's assets were frozen, according to the English-language China Daily.

Established in 2005, Black Hawk Safety Net counts over 170,000 non-paying members and about 12,000 people with paid memberships.

It's not immediately clear why it had taken until now for Chinese authorities to disclose the arrests.

The news comes after Google last month said that in December it "detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property."

As a consequence of the attack and separate efforts by online attackers to compromise the Gmail accounts of Chinese human rights activists in China, Europe and the U.S., Google said it would stop censoring Google.cn, a promise it has yet to fulfill.

The U.S. State Department subsequently asked the Chinese government for an explanation of the attacks.

Authorities in China responded that hacking is illegal in China, that the country welcomes law-abiding companies, and that China, more than the U.S., is the largest victim of hacking attacks. China's computer security organization, the National Computer Network Emergency Response Coordination Center of China, claims that hackers in the country caused 7.6 billion yuan ($1.1 billion) in damage last year.

Joe Stewart, a cybersecurity researcher for SecureWorks who linked the Google attacks to China, doubts the arrests will have much impact. "I guess it helps China save some face in light of all the disclosures coming out of China," he said in a phone interview. "I don't know that it will do very much about cybercrime."

Scott Henderson, who tracks the Chinese hacking scene on a Web site called The Dark Visitor, observes that the crackdown follows from an investigation of a cyber attack that took down Internet access in the Chinese city of Macheng for three days. One of the hackers responsible had commercial ties to one of the men associated with Black Hawk Safety Net.

"The unwritten rule among Chinese hackers is never hack inside China," he said in an e-mail. "As disposable income becomes more abundant, groups are starting to break that law and Beijing is cracking down on them. Laws against domestic hacking have been strengthened with longer prison sentences for violations."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2188
Published: 2015-02-26
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0594
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun1...

CVE-2015-0632
Published: 2015-02-26
Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770.

CVE-2015-0651
Published: 2015-02-26
Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753.

CVE-2015-0882
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php an...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.