Vulnerabilities / Threats
1/5/2010
05:25 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Web Filtering Company Sues China, PC Makers Over Green Dam

CYBERsitter, LLC, maker of the Internet filtering software of the same name, is seeking $2.2 billion in damages from China, two Chinese software makers and seven PC makers.

Among the factors that led to Chinese government to back away from its plan to require that all PCs sold in the country after July 1, 2009 include Web filtering software known as Green Dam were allegations that the Chinese companies that made the software had copied code from Solid Oak Software's CYBERsitter filtering program.

On Monday, Santa Barbara, Calif.-based CYBERsitter, LLC, which changed its name from Solid Oak Software in November, filed a lawsuit against the People's Republic of China, the two Chinese software makers involved in the creation of Green Dam, and seven computer manufacturers that distributed Green Dam: Sony, Lenovo, Toshiba, Acer, ASUSTeK, BenQ and Haier.

The civil lawsuit seeks $2.2 billion in damages for copyright infringement, theft of trade secrets, unfair competition and civil conspiracy. The company alleges that the defendants distributed over 56 million copies of the Green Dam software.

"This lawsuit aims to strike a blow against the all-too-common practices of foreign software manufacturers and distributors who believe that they can violate the intellectual property rights of small American companies with impunity without being brought to justice in U.S. courts," said attorney Greg Fayer in a statement. "American innovation is the lifeblood of the software industry, and it is vital that the fruits of those labors be protected at home and abroad."

The lawsuit also alleges that CYBERsitter has been hit by several thousand individual cyber attacks as a consequence of its intellectual property rights claims, including one on May 31, 2009, that originated from the Ministry of Health in China.

A spokesperson for the Chinese government was not immediately available. In other hacking incidents that have appeared to have originated in China, Chinese officials have dismissed claims about the government's involvement as fabrications.

In general, it's very difficult to link cyber attacks to specific individuals or organizations without access to their computers due to the ease with which skilled attackers can hijack computing resources and manipulate data trails.

Nonetheless, espionage backed by the Chinese government has been a longstanding concern among U.S. officials and advisory groups. In November 2009, the U.S.-China Economic and Security Review Commission (USCC) said in its 2009 annual report that "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems."

The USCC's 2008 and 2007 reports contained similar warnings.

In June 2009, three computer scientists with the University of Michigan on Thursday published an analysis of the "Green Dam Youth Escort" software. They found that it included security vulnerabilities and that a number of the blacklists "[had] been taken from the American-made filtering program CyberSitter."

After protests from Chinese academics and computer users, rights groups, computer trade groups, and government officials from various countries, the Chinese government backed away from its filtering rule.

In an August 2009 news conference, Minister of Industrial and Information Technology Li Yizhong said that the government's mandate was "not thoughtful enough," according to China Daily, and said the software would be optional.

CYBERsitter has already had success with a previous Green Dam lawsuit. In October, the company sued CBS Interactive's ZDNet China for distributing Green Dam. CBS Interactive settled in December, under confidential terms.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.