Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/5/2010
05:25 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Web Filtering Company Sues China, PC Makers Over Green Dam

CYBERsitter, LLC, maker of the Internet filtering software of the same name, is seeking $2.2 billion in damages from China, two Chinese software makers and seven PC makers.

Among the factors that led to Chinese government to back away from its plan to require that all PCs sold in the country after July 1, 2009 include Web filtering software known as Green Dam were allegations that the Chinese companies that made the software had copied code from Solid Oak Software's CYBERsitter filtering program.

On Monday, Santa Barbara, Calif.-based CYBERsitter, LLC, which changed its name from Solid Oak Software in November, filed a lawsuit against the People's Republic of China, the two Chinese software makers involved in the creation of Green Dam, and seven computer manufacturers that distributed Green Dam: Sony, Lenovo, Toshiba, Acer, ASUSTeK, BenQ and Haier.

The civil lawsuit seeks $2.2 billion in damages for copyright infringement, theft of trade secrets, unfair competition and civil conspiracy. The company alleges that the defendants distributed over 56 million copies of the Green Dam software.

"This lawsuit aims to strike a blow against the all-too-common practices of foreign software manufacturers and distributors who believe that they can violate the intellectual property rights of small American companies with impunity without being brought to justice in U.S. courts," said attorney Greg Fayer in a statement. "American innovation is the lifeblood of the software industry, and it is vital that the fruits of those labors be protected at home and abroad."

The lawsuit also alleges that CYBERsitter has been hit by several thousand individual cyber attacks as a consequence of its intellectual property rights claims, including one on May 31, 2009, that originated from the Ministry of Health in China.

A spokesperson for the Chinese government was not immediately available. In other hacking incidents that have appeared to have originated in China, Chinese officials have dismissed claims about the government's involvement as fabrications.

In general, it's very difficult to link cyber attacks to specific individuals or organizations without access to their computers due to the ease with which skilled attackers can hijack computing resources and manipulate data trails.

Nonetheless, espionage backed by the Chinese government has been a longstanding concern among U.S. officials and advisory groups. In November 2009, the U.S.-China Economic and Security Review Commission (USCC) said in its 2009 annual report that "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems."

The USCC's 2008 and 2007 reports contained similar warnings.

In June 2009, three computer scientists with the University of Michigan on Thursday published an analysis of the "Green Dam Youth Escort" software. They found that it included security vulnerabilities and that a number of the blacklists "[had] been taken from the American-made filtering program CyberSitter."

After protests from Chinese academics and computer users, rights groups, computer trade groups, and government officials from various countries, the Chinese government backed away from its filtering rule.

In an August 2009 news conference, Minister of Industrial and Information Technology Li Yizhong said that the government's mandate was "not thoughtful enough," according to China Daily, and said the software would be optional.

CYBERsitter has already had success with a previous Green Dam lawsuit. In October, the company sued CBS Interactive's ZDNet China for distributing Green Dam. CBS Interactive settled in December, under confidential terms.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5421
PUBLISHED: 2020-09-19
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...