Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Chinese consultant wrote code used in Google attack: FT
by Staff Writers
Washington (AFP) Feb 22, 2010


US analysts believe a Chinese freelance security consultant with government ties was the author of the code used in cyberattacks on Google and other companies, the Financial Times reported on Monday.

The Wall Street Journal reported meanwhile that a prominent Asian hacking group that is likely Chinese may have been the perpetrators of last year's attacks on the Internet giant and as many as 33 other companies.

The FT, citing an unidentified researcher working for the US government, said a Chinese security consultant in his 30s wrote the part of the program that used a previously unknown security hole in Microsoft's Internet Explorer Web browser to break into computers and insert spyware.

The newspaper said Chinese officials had special access to the work of the author, who posted pieces of the program to a hacking forum.

The man is not a full-time Chinese government worker and did not launch the attacks, the newspaper said, adding that he would "prefer not be used in such offensive efforts."

"If he wants to do the research he's good at, he has to toe the line now and again," the US analyst said. "He would rather not have uniformed guys looking over his shoulder, but there is no way anyone of his skill level can get away from that kind of thing.

"The state has privileged access to these researchers' work."

The FT also repeated claims made last week in The New York Times that the attacks had been traced to computers at Shanghai Jiaotong University and the Lanxiang Vocational School located in the eastern province of Shandong.

Both institutions have denied involvement, as have the Chinese authorities.

The Wall Street Journal said Monday that the group that attacked Google and others may have been involved in previous attacks tracked by intelligence and law-enforcement officials.

"It is the same folks that have been behind a hell of a lot of other attacks," the Journal quoted a person familiar with probes into some of the affected companies as saying.

The Journal said the group investigators are focusing on uses Chinese computer systems to mount its attacks and has a history of primarily attacking corporations -- not the US military or other government agencies.

The Journal said it is not clear whether the hackers have connections to the Chinese government or whether they are a "patriotic" hacking group that acts in the government's interests.

China has repeatedly denied involvement in the attacks, which have strained US ties and prompted Google to threaten to leave the country.

Google vowed in January to stop bowing to Web censors in China in the wake of the cyberattacks aimed at the US firm's source code and at Gmail accounts of Chinese human rights activists around the world.

Google continues to filter searches as per Chinese law while trying to negotiate a compromise with officials there.

US President Barack Obama said last month that he was "troubled" by the cyberattacks on Google and wants answers from China.

earlier related report
FTC warns firms, organizations of widespread data breach
Washington (AFP) Feb 22, 2010 - The US Federal Trade Commission (FTC) said Monday it has notified nearly 100 companies and organizations of data breaches involving personal information about customers or employees.

The FTC declined to identify the companies or organizations involved, but said they were both "private and public entities, including schools and local governments."

The companies and organizations ranged in size from "businesses with as few as eight employees to publicly held corporations employing tens of thousands," the FTC said in a statement.

It said sensitive data about customers and employees had been shared from the computer networks of the companies and organizations and made available on Internet peer-to-peer (P2P) file-sharing networks.

The information was accessible to "any users of those networks, who could use it to commit identity theft or fraud," the FTC said.

"Unfortunately, companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers' sensitive information at risk," FTC chairman Jon Leibowitz said.

"For example, we found health-related information, financial records, and driver's license and social security numbers -- the kind of information that could lead to identity theft," Leibowitz said.

"Companies should take a hard look at their systems to ensure that there are no unauthorized P2P file-sharing programs and that authorized programs are properly configured and secure," he said.

"Just as important, companies that distribute P2P programs, for their part, should ensure that their software design does not contribute to inadvertent file sharing," he added.

P2P file-sharing software is used in a variety of ways including for playing games, making online telephone calls or sharing music, video and documents.

Chris King, director of product marketing at California-based security firm Palo Alto Networks, said the sharing of sensitive company information over such P2P services as BitTorrent or Limewire was indeed often unintentional.

"People are not stealing identities, medical records, financial records and sticking them on these networks," King told AFP.

"In a lot of cases what's happening is someone who works for one of these organizations... will install an application on their laptop or desktop so they can get to music or movies or something like that," he said.

"Next thing you know a whole bunch of medical records are in the wild," he said. "It's not necessarily malicious from the get-go."

King said a study had found that P2P programs have a nearly 90 percent penetration rate in "enterprise organizations -- folks that have firewalls and all kinds of security mechanisms in place."

The FTC, in the notification letters to the companies and organizations, urged them to review their security practices "to ensure that they are reasonable, appropriate, and in compliance with the law."

"It is your responsibility to protect such information from unauthorized access, including taking steps to control the use of P2P software on your own networks and those of your service providers," the letters stated.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Global cyberattacks hit firms, governments: report
San Francisco (AFP) Feb 17, 2010
Coordinated cyberattacks launched from Europe and China breached computers at firms and government agencies worldwide in the past 18 months, The Wall Street Journal reported Wednesday. The Journal quoted computer security firm NetWitness as saying the attacks made mountains of data vulnerable to mining by hackers, although the damage had yet to be fully assessed. Information bared to hac ... read more


CYBER WARS
US lunar pull-out leaves China shooting for moon

Astronomers Say Presence Of Water On Moon Will Lead To More Missions

Moon Exploration is Not Dead

Seed Bank For The Moon

CYBER WARS
Spirit Hunkers Down For Winter

Enhanced 3D Model Of Mars Crater Edge Shows Ups And Downs

Two Windows On Ozone: Extending Our View Of The Martian Atmosphere

Spirit Parks For The Winter

CYBER WARS
Northrop Grumman Foundation Weightless Flights Of Discovery

SwRI Announces Pioneering Program To Fly Next-Gen Suborbital Experiments With Crew

US committed to space: Obama tells astronauts

New Views For Space Tourists

CYBER WARS
UK's First China Space Race Exhibition Launched

No Spacewalk From Tiangong-1

China's Mystery Spacelab

China launches orbiter for navigation system: state media

CYBER WARS
Endeavour Crew Delivered Last Major US Portion Of ISS

Endeavour astronauts prepare to unveil room with cosmic view

Astronauts Move Cupola

Third And Final STS-130 Spacewalk Tonight

CYBER WARS
EchoStar XIV Satellite Delivered To Launch Base

Cool Movie: SDO Destroys A Sundog

Concrete Phase Of Runway Begins At Spaceport America

Brazil, China To Postpone Joint Satellite Launching To 2011

CYBER WARS
Seeing ExoPlanet Atmospheres From The Ground

New Technique For Detecting Earth-Like Planets

New technique helps search for another Earth

NASA's Rosetta "Alice" Spectrometer Reveals Earth's UV Fingerprint

CYBER WARS
Quantum Leap For Phonon Lasers

A Stellar, Metal-Free Way To Make Carbon Nanotubes

Meteosat Third Generation Takes A Step Forward

TDRS Spacecraft Pass System Level Reviews




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement