Google, Citing Attack, Threatens to Exit China [FIXED :) ]

http://www.nytimes.com/2010/01/14/world/asia/14beijing.html
http://www.bloomberg.com/apps/news?pid=20601087&sid=aTw_G7T4pEtE&pos=9

http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf

A new approach to China 1/12/2010 03:00:00 PM Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different.

First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses–including the Internet, finance, technology, media and chemical sectors–have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.

Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves.

Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users’ computers

These attacks and the surveillance they have uncovered--combined with the attempts over the past year to further limit free speech on the web--have led us to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China.

I read this here

http://news.bbc.co.uk/2/hi/business/8455712.stm

It is very difficult for companies like Google to work in China becoz of human rights issue.

I think everyone must follow suit

Unfortunately China has also “Baidu”, a local search engine that has already 65% market share in China, and complying with any government censorship requirement…

interesting, and unfortunately not what we (I) would have expected…
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011300771.html

@ Logos

Baidu’s relation with Google goes back many years.

Baidu shares were owned by Google right. I think they offloaded 2.5% of the shares in 2006.

It is a wonder why every tech company is ready to obey the communist government of China.

Human rights must be valued more than millions of dollars

Hi malware fighters,

Google and Adobe came under attack by hackers seeking after source code. They finally admitted this:
http://www.wired.com/threatlevel/2010/01/google-hack-attack
The hackers now use unpatched Adobe holes and prepared PDF-documents, GData already warned PDF is a a priori unsafe extension. Google admitted to the attack as the above poster here, Chris Thomas, cites.
Advisory against the hacks here: http://www.adobe.com/support/security/bulletins/apsb10-02.html
The attacks differed from those in June but the same command and control servers have been used to perform them,

polonus

I don’t think that’s doable, but following this it would be nice to find a way to prevent Baidu from indexing anything out of China ;D or do that clicking on any EU/US link in a Baidu search bounces back to…Baidu.

Hmm…

The Chinese government does a lot of smiling ;D

They heavy dump their products into countries and protect their companies

No country have the guts to take them to the WTO

Because the Chinese are bankrolling many countries in the UN and have their support as a result.

I could get to avast webforum through baidu proxy:
http://www.luhui.net/ie/index.php?q=aHR0cDovL2ZvcnVtLmF2YXN0LmNvbS9pbmRleC5waHA/UEhQU0VTU0lEPTJlYjc1NDExOGI1NTgxZWVmYjI4ZDRkMDJjMGJkZDlmJmFtcDthY3Rpb249bG9naW4%3D

polonus

I think we must turn on the SSL in Gmail as our default settings

Google flips default switch for always-on Gmail crypto
http://www.theregister.co.uk/2010/01/13/gmail_default_encryption/

more here and how hackers operate:
http://online.wsj.com/article/SB10001424052748704281204575002573024282764.html?mod=googlenews_wsj

Analysts say hackers around the world, especially from China, frequently attack Taiwan companies' computers by installing software through Trojan horses and backdoors. The attacked computers are referred to as "zombie computers" or victims of a "botnet," which let hackers control them remotely. Taiwan's robust Internet network has also made it appealing to international hackers. "Taiwan's internet infrastructure is well established, and computers are highly popular, which means [hackers] can easily find problematic computers to attack," said Steven Tsai, senior engineer of Taiwan's National Center for High Performance Computing

(if you launch the link to this article from Google news, you’ll get the entire article without having to be a subscriber)

Hi malware fighters,

With the ongoing succesful attacks on Google and Adobe companies may consider blocking all Internet traffic from and to China, this is the vision of security expert Timothy “Thor” Mullen, who wrote an article one and a half years ago on completely blocking certain countries on the Internet. Now China is hot news again, he points to this. “I like to point out tools to you one could get from the site Hammer of God to have some party block all traffic from and to China or whatever country via ISA/TMG.” He himself has been blocking China for years and years because the whole of the Chinese network is full of cyber criminals and hackers." (N.B. his vision - not mine).

Mullen writes in his article about various technologies to block countries according to IP- and port numbers. “Geographically blocking traffic might be a good idea I think. It is according to principles like security-in-depth and least-rights.” Blocking traffic to and from a country may work, but it is not a panacea for every situation. Some companies cannot have such an official policy, according to Mullen. "And that is fine, but whenever you can, know you can make simple report and policies to jelp secure your infrastructure.
Links:
http://www.hammerofgod.com/home.html
http://www.securityfocus.com/infocus/1900/1
Other Chinese attacks: http://www.msnbc.msn.com/id/34855470/ns/technology_and_science-washington_post/
http://www.reuters.com/article/idUSTRE60D0C120100114
On the other hand one must also think about this background of the momentary conflict, the position of Baidu (77% of the Chinese search market) versus Google.cn:
http://brainstormtech.blogs.fortune.cnn.com/2009/12/28/google-v-baidu-which-company-will-win-china/

polonus

OK fine but as mentioned in the article I linked to above, they’re using Taiwanese proxies so ??? ;D

People familiar with the attacks say the hackers tried to mask their identity by routing their efforts through six Internet addresses located in Taiwan, a common tactic used by Chinese hackers.

Five of the six addresses were owned by Era Digital Media Co., a company that provides television programs and movies through the Internet. Era Digital, which has some 800,000 daily viewers, said it wasn’t aware of the attack and declined to comment further. The sixth address is owned by Qi Wei Technology Co., a financial software provider. Qi Wei said it had stopped using the relevant address in June.

Lee Hsiang-chen, director of Taiwan National Police Agency’s High-tech Criminal Center, said the two companies were likely victims themselves. “The two companies were probably attacked,” he said, adding that Chinese hackers prefer to infiltrate Taiwan Web sites because they use the same language

Ballmer: Microsoft Will Stay in China
http://www.pcworld.com/businesscenter/article/186964/ballmer_microsoft_will_stay_in_china.html

also, and a French article mentioned Balmer didn’t acknowledge that yet, but MS was considering the possible flaw in IE:

Operation “Aurora” Hit Google, Others... McAfee Labs has been working around the clock, diving deep into the attack we are now calling Aurora that hit multiple companies and was publicly disclosed by Google on Tuesday.

We are working with multiple organizations that were impacted by this attack as well as the government and law enforcement. As part of our investigation, we analyzed several pieces of malicious code that we have confirmed were used in attempts to penetrate several of the targeted organizations.

New Internet Explorer Zero Day
In our investigation we discovered that one of the malware samples involved in this broad attack exploits a new, not publicly known vulnerability in Microsoft Internet Explorer. We informed Microsoft about this vulnerability and Microsoft published an advisory and a blog post on the matter on Thursday afternoon.


http://siblog.mcafee.com/cto/operation-“aurora”-hit-google-others/
http://www.zdnet.fr/actualites/informatique/0,39040745,39712246,00.htm
(there’s a CNBC interview embedded in this article from Balmer)

see here:
http://www.cnbc.com/id/15840232?video=1385649601&play=1

about IE security involvement in attacks against Google: …and others

http://www.microsoft.com/technet/security/advisory/979352.mspx
http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx

Security Advisory 979352 Released

Based upon our investigations, we have determined that Internet Explorer was one of the vectors used in targeted and sophisticated attacks against Google and possibly other corporate networks. Today, Microsoft issued guidance to help customers mitigate a Remote Code Execution (RCE) vulnerability in Internet Explorer. Additionally, we are cooperating with Google and other companies, as well as authorities and other industry partners.

edit: see here too:

IE zero-day used in Chinese cyber assault on 34 firms
http://www.theregister.co.uk/2010/01/14/cyber_assault_followup/
Microsoft admits Explorer used in Google China hack
http://news.bbc.co.uk/2/hi/technology/8460819.stm
Chinese government-backed search engine blocks access to Google company blog
Baidu, China's dominant search engine, has apparently cut off access to Google's company blog, after a post appeared there detailing the latter company's decision to cease cooperation with the Chinese government over concerns with censorship and cyber crime
http://www.brafton.com/industry-news/chinese-government-backed-search-engine-blocks-access-google-company-blog-$1353329.htm

someone on another forum where I post mentioned this, but gave no source and no link:

Alright, according to some news from China, Google had broke up with China government: No more google.cn, NO more Google China. Every employee of Google China will have a half year salary as severance pay and willing to find them jobs in other branch office of Google.
so this is completely unconfirmed so far...
Security experts dissect Google China attack
http://www.theregister.co.uk/2010/01/14/google_china_attack_analysis/
The code samples obtained by iDefense from the July attack and the present attack are different, but they contact two similar hosts for command-and-control communication. The servers used in both attacks employ the HomeLinux DynamicDNS provider, and both are currently pointing to IP addresses owned by Linode, a US-based company that offers Virtual Private Server hosting.

The IP addresses in question are within the same subnet, and they are six IP addresses apart from each other. Considering this proximity, it is possible that the two attacks are one and the same, and that the organizations targeted in the Silicon Valley attacks have been compromised since July

Hi Logos,

Through these links that you have provided for us we can gradually depict the overall situation and it looks grim and it has various apparent and hidden implications, corporational interests play an important role, I think the privacy issue is being used more or less as an excuse or pretext. Apart from what really is at stake, there are the security issues also. It means the Internet is a place where threats raise their ugly heads everywhere, it does not matter from what angle they come in - zombie bot herder, malcreant cyber crime exploit user, targeted hack developer, cyber army skirmishes, malcode is “on the wire” everywhere all over the Internet, and the unaware aren’t really helping the situation and those in charge turning a blind eye, we are in a predicament. Again we need China in the world and its century old culture and wisdom,

polonus

Again we need China in the world and its century old culture and wisdom

wisdom ??? …myth :wink: … and weren’t you mentioning yourself yesterday web sites suggesting that servers should IP block China?