Vulnerabilities / Threats

02:21 PM
Connect Directly

China Closes Hacker Training Site

The arrests, which took place before Google revealed that it had been targeted by a cyber attack from China, reflect growing concern about internal cybercrime.

China's largest training Web site for hackers has reportedly been shut down following a major raid by authorities in China's Hubei Province.

Late last year, some 50 police officers arrested three individuals associated with the Black Hawk Safety Net (, a group that allegedly sold training materials and malicious code for illegal hacking, according to reports in China's state-run media.

About 1.7 million yuan ($249,000) of the group's assets were frozen, according to the English-language China Daily.

Established in 2005, Black Hawk Safety Net counts over 170,000 non-paying members and about 12,000 people with paid memberships.

It's not immediately clear why it had taken until now for Chinese authorities to disclose the arrests.

The news comes after Google last month said that in December it "detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property."

As a consequence of the attack and separate efforts by online attackers to compromise the Gmail accounts of Chinese human rights activists in China, Europe and the U.S., Google said it would stop censoring, a promise it has yet to fulfill.

The U.S. State Department subsequently asked the Chinese government for an explanation of the attacks.

Authorities in China responded that hacking is illegal in China, that the country welcomes law-abiding companies, and that China, more than the U.S., is the largest victim of hacking attacks. China's computer security organization, the National Computer Network Emergency Response Coordination Center of China, claims that hackers in the country caused 7.6 billion yuan ($1.1 billion) in damage last year.

Joe Stewart, a cybersecurity researcher for SecureWorks who linked the Google attacks to China, doubts the arrests will have much impact. "I guess it helps China save some face in light of all the disclosures coming out of China," he said in a phone interview. "I don't know that it will do very much about cybercrime."

Scott Henderson, who tracks the Chinese hacking scene on a Web site called The Dark Visitor, observes that the crackdown follows from an investigation of a cyber attack that took down Internet access in the Chinese city of Macheng for three days. One of the hackers responsible had commercial ties to one of the men associated with Black Hawk Safety Net.

"The unwritten rule among Chinese hackers is never hack inside China," he said in an e-mail. "As disposable income becomes more abundant, groups are starting to break that law and Beijing is cracking down on them. Laws against domestic hacking have been strengthened with longer prison sentences for violations."

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.