Google, China and Reality
by ilene - January 13th, 2010 3:14 pm
Google, China and Reality
Courtesy of Karl Denninger at The Market Ticker
It looks like Google has finally run into the Chinese form of "screw you forward, screw you backward, or just plain old fashioned screw you."
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different.
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.
Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves.
Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users’ computers.
First, the US Authorities don’t care. This is almost-certainly state-sponsored (by China) or at least tolerated.
I have been tracking these attacks now for more than five years. See, I write (among other things) security software, including spam-filtering code. It is somewhat of a hobby now, but was a major focus when I ran MCSNet – we were the first ISP in the United States to offer customer-configurable spam filters.
A number of years ago I detected
Tags: cadmium-laced costume jewelry, CHINA, exports, Google, human rights violations, poisoning
Posted in Phil's Favorites | 1 Comment »
![]() |
![]() |
![]() |
|