{"id":185289,"date":"2010-01-15T18:53:33","date_gmt":"2010-01-15T23:53:33","guid":{"rendered":"http:\/\/www.stoth.com\/2010\/01\/15\/chinese-authorities-fingered-in-google-attack\/"},"modified":"2010-01-15T18:53:33","modified_gmt":"2010-01-15T23:53:33","slug":"chinese-authorities-fingered-in-google-attack","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/185289","title":{"rendered":"Chinese authorities fingered in Google attack"},"content":{"rendered":"<p><\/p>\n<p><a rel=\"attachment wp-att-154062\" href=\"http:\/\/venturebeat.com\/2010\/01\/15\/chinese-google-forensics\/120px-wen_jiabao_2008\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-154062\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_120px-Wen_Jiabao_2008.jpg\" alt=\"120px-Wen_Jiabao_2008\" width=\"120\" height=\"147\" \/><\/a>Someone finally said it.<\/p>\n<p>A security consulting firm that Google brought in to investigate an attack last month &#8212; the one that compromised the Gmail accounts of two Chinese political activists &#8212; <a href=\"http:\/\/www.computerworld.com\/s\/article\/9145279\/Chinese_authorities_behind_Google_attack_researcher_claims\">told Computerworld today<\/a> that they &#8220;believe the attack code was designed and launched with support from Chinese authorities.&#8221;<\/p>\n<p>This explains the involvement of the U.S. State Department, which met with Chinese diplomats this week. The department is\u00a0<a href=\"http:\/\/venturebeat.com\/2010\/01\/15\/google-china-2\/\">drafting a formal denouncement<\/a> which will put the heat directly on Premier Wen Jiabao.<\/p>\n<p>Mandiant, a security incident response and forensics firm based in Washington, D.C., worked with Google to reverse-engineer the attack. Carlos Carrillo, a principal consultant with the firm, spoke to Computerworld&#8217;s Gregg Keizer on Friday:<\/p>\n<blockquote>\n<p>Carrillo was the project manager for the Google investigation. During an interview Friday, he frequently chose his words carefully, saying that there was much he couldn&#8217;t discuss because the work was ongoing.<\/p>\n<p>&#8220;The malware was unique,&#8221; Carrillo said. &#8220;It had unique characteristics &#8230; it was &#8230; let&#8217;s just say it was unique.&#8221;<\/p>\n<p>When asked if the code quality pointed toward Chinese state support, Carrillo answered, &#8220;I would say so.&#8221;<\/p>\n<\/blockquote>\n<p>It now appears that for some weeks, Google may have had ample evidence that the Chinese government was behind the break-ins, and that the State Department confronted Chinese authorities with that evidence.<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/xtsCy6RMewEmJ_MaGW_vpWSKYk8\/0\/da\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_di\" border=\"0\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/xtsCy6RMewEmJ_MaGW_vpWSKYk8\/1\/da\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_di\" border=\"0\"><\/img><\/a><\/p>\n<div>\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Venturebeat?a=e9SmB26-sFc:RSqI2Cevlqw:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_Venturebeat?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Venturebeat?a=e9SmB26-sFc:RSqI2Cevlqw:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_Venturebeat?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Venturebeat?a=e9SmB26-sFc:RSqI2Cevlqw:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/c073a_Venturebeat?i=e9SmB26-sFc:RSqI2Cevlqw:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Venturebeat?a=e9SmB26-sFc:RSqI2Cevlqw:I9og5sOYxJI\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/d2074_Venturebeat?d=I9og5sOYxJI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Venturebeat?a=e9SmB26-sFc:RSqI2Cevlqw:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/d2074_Venturebeat?i=e9SmB26-sFc:RSqI2Cevlqw:D7DqB2pKExk\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/d2074_e9SmB26-sFc\" height=\"1\" width=\"1\" \/> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/Venturebeat\/~3\/e9SmB26-sFc\/\" >Read Original Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Someone finally said it. A security consulting firm that Google brought in to investigate an attack last month &#8212; the one that compromised the Gmail accounts of two Chinese political activists &#8212; told Computerworld today that they &#8220;believe the attack code was designed and launched with support from Chinese authorities.&#8221; This explains the involvement of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-185289","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/185289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=185289"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/185289\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=185289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=185289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=185289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}