Vulnerabilities / Threats

11/28/2010
07:44 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China Directed Google Attack, Leaked Cable Says

A trove of diplomatic communications released by Wikileaks includes the claim that Chinese officials oversaw the cyber attack on Google.

Wikileaks on Sunday released hundreds of thousands of U.S. State Department documents online and to news organizations, presenting a range of potentially embarrassing revelations about back channel diplomacy between the U.S., allies, and other countries.

The documents, not all of which were immediately accessible to the public due to the cyber attack on Wikileaks, reveal discussions on a range of sensitive matters around the world, including worries about nuclear proliferation in Iran and North Korea.

The cables also reveal that China's Politburo "directed the intrusion into Google's computer systems," according to the New York Times, which was provided with copies of the documents.

A Chinese contact reportedly confirmed to U.S. embassy officials in Beijing the involvement of China's government in the cyber attack on Google's network that occurred late last year and was disclosed in January, 2010. The officially sanctioned cyber attack involved government operatives, private security contractors, and Internet criminals recruited by the Chinese government, the New York Times said.

Security companies said as much back in January. A report issued by iDefense, a computer security company owned by Verisign, claimed that 33 other companies were targeted in the cyber attack and that those responsible were working either directly for, or on behalf of, official intelligence entities of the People's Republic of China.

Such claims however have always proven problematic because finding the IP address of a computer through which an attack was conducted doesn't definitively reveal who controlled that computer or directed those responsible. And indeed, Chinese officials have repeatedly denied any involvement in the attack on Google and other companies.

Google declined to comment.

In a press briefing on Nov. 24, Philip J. Crowley, Assistant Secretary of Public Affairs at the State Department, said the cables are classified and denounced Wikileaks' decision to release of the documents.

"We decry what has happened," said Crowley. "These revelations are harmful to the United States and our interests. They are going to create tension in our relationships between our diplomats and our friends around the world. We wish that this would not happen. But we are, obviously, prepared for the possibility that it will."

U.S. Secretary of State Hillary Clinton has reportedly been reaching out to leaders in various countries to prepare them for the release of the diplomatic cables.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.