{"id":219335,"date":"2010-01-14T17:57:43","date_gmt":"2010-01-14T22:57:43","guid":{"rendered":"tag:redtape.msnbc.com:\/\/bdef79c4641f85425b2fbd1a3358a902"},"modified":"2010-01-14T17:57:43","modified_gmt":"2010-01-14T22:57:43","slug":"what-the-cyber-attack-from-china-means","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/219335","title":{"rendered":"What the cyber-attack from China means"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Gregory Fayer opened an e-mail on Monday night that looked like it was from a fellow lawyer at Gipson Hoffman &amp; Pancione. Instead, it was a message that placed Fayer and his firm in the middle of what might be the biggest international cyber-conflict to date.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">This week, search engine giant Google disclosed that it had also been a victim of cyber-attacks from China,&#0160;and has taken the bold step of threatening to shut down the Chinese version of its search engine.<span style=\"mso-spacerun: yes\">&#0160; <\/span>On Thursday, computer security firm VeriSign said it had traced the Google attacks back to &quot;to a single foreign entity consisting either of agents of the Chinese state or proxies thereof,&quot; and that 30 companies were targeted.<\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Fayer&#39;s law firm is likely one of those victims, as the technique used against it is similar to the Google attack.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The e-mail Fayer received was laced with a computer virus intended to allow the sender to spy on Fayer&#39;s computer; a blatant act of espionage, he said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But Fayer wasn&#39;t terribly surprised. Last week, his firm filed a blockbuster lawsuit against the Chinese government on behalf of CyberSittter LLC, which makes parental control software.<span style=\"mso-spacerun: yes\">&#0160; <\/span>CyberSitter says the Chinese stole its computer code while creating the infamous Green Dam censorship program, which was designed to be placed on every Chinese citizen&#39;s PC last year. After a backlash, the government decided to make installation optional.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;Our law firm was certainly on high alert because of the lawsuit,&quot; he said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>&quot;This is somewhat to be expected when you file a high-profile lawsuit against the government of China.\u201d<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Fayer said he couldn&#39;t share much information about the e-mail, as FBI officials are investigating the incident. But it was designed to look like&#0160;part of a normal electronic chat with a colleague.<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;I was the first recipient at the firm,&quot; he said. &quot;But there have actually been three waves of these customized e-mails.They&#39;d each been made to look like they had a different sender, and a different pretense for the links or attachments embedded in the e-mails.&quot; The cybercriminal was clearly moving down a list of potential contacts at the firm, looking for someone to take the bait, he said.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;The program was designed to go in and get information from our servers and computers and sent it back to the sender,&quot; he said. <o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Computer researchers call the technique &quot;spear phishing.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span>Rather than flooding a firm with thousands of spam-like phishing e-mails hoping to dupe dozens of victims, the new technique involves very specific, targeted notes designed to fool one victim at a time \u2013 and then use that computer to spy on the target agency or steal data.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">While Fayer could say little about the potential agent behind the attack, he said the firm assumed that &quot;the timing of the e-mail attacks are not a coincidence.&quot; <o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">No lawyers fell for the trick, Fayer said, and he did not believe any information had been stolen. <o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">The alleged attacks from China are troubling on many fronts.<span style=\"mso-spacerun: yes\">&#0160; <\/span>On Thursday, security firm McAfee released a report saying the program used to target U.S. firms involved a so-called &quot;zero day&quot; vulnerability &#8212; one that was to this point unknown to the security community, and thus indefensible by anti-virus software. The flaw involved Microsoft&#39;s Internet Explorer, McAfee said. Microsoft says&#0160;it is working quickly to provide a software patch.&#0160;<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"MARGIN: 0in 0in 10pt; FONT-FAMILY: Verdana; FONT-SIZE: 13px\">But the malicious software attacks <\/span><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">other software flaws too, McAfee said, adding this ominous note: &quot;There very well may be other attack vectors that are not known to us at this time.&quot;<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;These highly customized attacks known as advanced persistent threats were primarily seen by governments and the mere mention of them strikes fear in any cyberwarrior,\u201d wrote McAfee&#39;s George Kurtz in a blog post today. <span style=\"mso-spacerun: yes\">&#0160;<\/span>\u201cThey are in fact the equivalent of the modern drone on the battle field. With pinpoint accuracy they deliver their deadly payload and once discovered &#8211; it is too late\u2026All I can say is wow. The world has changed. Everyone&#39;s threat model now needs to be adapted to the new reality of these advanced persistent threats. In addition to worrying about Eastern European cybercriminals trying to siphon off credit card databases, you have to focus on protecting all of your core intellectual property.&quot;<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Mark Rasch, former head of the Department of Justice computer crime unit, called the attacks \u201ccyberwarfare,\u201d and said it was clearly an escalation of digital conflict between China and the U.S.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">\u201cAt least it\u2019s an escalation of the rhetoric, and that\u2019s an escalation,\u201d he said. \u201cWar is the extension of politics by other means, and the Internet is the extension of politics, and this is a form of cyberwarfare.\u201d <o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">While isolated examples of government-sponsored hacking have popped up through the years, Rasch \u2013 who now runs Bethesda, Md.-based security consulting firm FTI &#8211; says this week\u2019s incidents of alleged Chinese attacks are \u201cnew in the sense that they\u2019ve been so<span style=\"mso-spacerun: yes\">&#0160; <\/span>blatant,\u201d and apparently so widespread, ranging from attempts to read dissidents\u2019 e-mails to spying on a legal adversary.<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">\u201cWe\u2019ve had attacks in the past but by and large they were done in a way that gave the country plausible deniability,\u201d said Rasch. \u201cBut this was different. This was fairly clearly a government-run operation.\u201d<o:p><\/o:p><\/span><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"MARGIN: 0in 0in 10pt; FONT-FAMILY: Verdana; FONT-SIZE: 13px\">China has yet to directly address the allegations. At a regular press briefing in Beijing on Thursday, Foreign Ministry spokeswoman Jiang Yu said only \u201cThe Chinese government administers the Internet according to law and we have explicit stipulations over what content can be spread on the Internet,\u201d according to the Bloomberg news service. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"MARGIN: 0in 0in 10pt; FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; COLOR: black; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: arial, helvetica, clean, sans-serif\"><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\">Become a&#0160;<\/span><\/strong><a href=\"http:\/\/www.facebook.com\/pages\/Bob-Sullivan\/78714223105?_fb_noscript=1\" style=\"COLOR: blue; CURSOR: pointer; TEXT-DECORATION: underline\" ><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\">Red Tape Chronicles Facebook fan<\/span><\/strong><\/a>&#0160;<span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><strong>or follow me at <\/strong><a href=\"http:\/\/twitter.com\/RedTapeChron\"><strong>http:\/\/twitter.com\/RedTapeChron<\/strong><\/a><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/font><\/span><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 9px\"><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gregory Fayer opened an e-mail on Monday night that looked like it was from a fellow lawyer at Gipson Hoffman &amp; Pancione. Instead, it was a message that placed Fayer and his firm in the middle of what might be the biggest international cyber-conflict to date. This week, search engine giant Google disclosed that it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-219335","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/219335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=219335"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/219335\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=219335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=219335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=219335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}