EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.14.10

Chinese Google ‘Attack’ Involves Microsoft Windows Flaws

Posted in GNU/Linux, Google, Microsoft, Security, Windows at 8:21 pm by Dr. Roy Schestowitz

China satellite image

Summary: It is not Google’s fault but Microsoft’s fault that China managed to compromise accounts not just of Google but of over 20 other companies, by Microsoft’s own admission

YESTERDAY we mentioned Google’s reaction to attacks from China, which are now confirmed to be targeting different companies. It was not something against Google as Google is one among several victims and some people doubt there will be an exit from the largest Internet market.

How would leaving the Chinese market actually prevent Chinese crackers from connecting to Google servers? It would not.

Hacking Risks Persist Even If Companies Withdraw From China

Google and other enterprises still face a bleak computer security landscape that makes their companies vulnerable to hackers, whether they do business in China or not, analysts say.

Perhaps the most interesting revelation, which was found buried deep inside reports, is the role of Windows in these attacks on Google. Check this one out for example: (the emphasis in red is ours)

More sources are now claiming the Chinese government is behind the recent cyberattacks against Google and 33 other Silicon Valley companies, reports security firm Verisign iDefense. The attacks, revealed yesterday via a posting on Google’s official blog, were hacking attempts on the technology infrastructure of Google and other major corporations in sectors that included finance, technology, media and chemical, said Dave Girouard, president of Google Enterprise.

[...]

While July’s attacks were detected early and were largely uneventful, December’s attacks did find some success. In addition, these same sources claim that the files in both cases share similar characteristics. For example, both attacks used a backdoor Trojan in the form of a Windows DLL, and both share two similar hosts for the command-and-control (C&C) communication. In layman’s terms, if the cyberattack was a ground assault during a war, the C&C would be the general barking out the orders. Also in both incidents, the IP addresses used for C&C are in the same subnet and only six addresses apart from each other. That means both attacks are likely to have been instigated by the same entity and may imply that the recent victims’ technology infrastructure has been compromised since July.

When one in two Windows PCs is said to be a zombie PC, the above should not be surprising. This was a targeted attack which must have relied on China activists’ use of Microsoft Windows.

As the name suggests, the carefully crafted assaults differ from the net-cast-wide malware most often seen. A targeted attack specifically selects its victim and generally sends an e-mail using that person’s name and perhaps business title. The body of the message might reference an attached list of business contacts, or describe it as an invoice, or use any other hook that would allay suspicion and convince the victim to double-click the attachment.

Real activists do not use Windows and should use GNU/Linux. A few moments ago, our reader Jose added information that confirms the above. It’s an AP article titled “Microsoft’s browser flaw exposed Google to hackers” and it says (in the opening): “Microsoft says a security flaw in its Internet Explorer browser played a role in the recent computer attacks against Google and at least 20 other companies.”

In other news, a bank server has just been compromised and Baidu got hit by the same group that exploited Windows botnets to take down Twitter [1, 2, 3, 4, 5, 6]. We mentioned this story here and there’s more from The Register:

The same group that used a DNS attack to hijack Twitter last month has defaced the home page of Chinese search engine Baidu.

Surfers visiting Baidu site on Monday night were confronted by the message “This site has been hacked by Iranian Cyber Army”, together with an image of the Iranian flag. Early speculation suggests the attack involved changing Baidu’s DNS records rather than a direct attack on the site itself, but this remains unconfirmed.

Baidu — unlike Google — was not a victim of customers who use Windows. Google should tell customers that it’s not Google that’s vulnerable; it’s Windows. Customers should therefore rethink their platform preferences. The same already goes for banks, for similar reasons.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email
  • Slashdot

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

13 Comments

  1. Yuhong Bao said,

    January 14, 2010 at 8:50 pm

    Gravatar

    “Check this one out for example: (the emphasis in red is ours)”
    That is not enough evidence, as it do not say anything about security holes in Windows being used.
    But turned out that flaws in IE was indeed used in the attacks, again by MS’s own admission:
    http://arstechnica.com/microsoft/news/2010/01/microsoft-warns-of-ie-security-flaw-used-in-google-attacks.ars
    And technically IE is indeed part of Windows, though other web browsers work on Windows too that do not have the flaw.
    But Adobe was partly to blame too:
    http://www.computerworld.com/s/article/9144378/Hackers_used_rigged_PDFs_to_hit_Google_and_Adobe_says_researcher

    Roy Schestowitz Reply:

    It seems like a case of “double-click to execute” in Windows, invoking proprietary software that’s vulnerable (opening of a file leading to system compromise).

    Yuhong Bao Reply:

    Nope, it did turned out to depend on a real security vulnerability, but if that was true, it would not be MS’s fault at all (unless a stupid feature like AutoPlay was used), and that is my point.

    your_friend Reply:

    Not a Microsoft flaw? Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers? I don’t think win32.dll will run in any of those others. Only Microsoft computers have this kind of problem. Nailing down the exact causes of these massive attacks will be like naming ants, there are too many security problems in Windows to begin to make sense of it and the botnet masters use them all.

    Windows needs to be taken off the web before it ruins the web for everyone.

    Yuhong Bao Reply:

    Indeed, I was not claiming that the botnet runs on anything other than Windows, I was trying to say that just because that it runs on Windows doesn’t mean MS is to blame. Now it did turned out MS is indeed partly to blame, I was just saying that the cited evidence was not enough.

    Yuhong Bao Reply:

    “Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers?”
    Yes, these are all in theory possible, which is why assigning blame properly is so important.

    Yuhong Bao Reply:

    Now, whether this flaw warrant a switch away from Windows would be a different matter, but I will say that it would warrant a switch away from IE, not Windows. After all, IE gets security flaws almost all the time, and do people switch away from Windows because of it? No, of course not, since you can run other browsers on Windows.

    Roy Schestowitz Reply:

    I have an update on this:

    Adobe Flaw Wasn’t Part of Attack on Google

    http://www.pcworld.com/article/187043/adobe_flaw_wasnt_part_of_attack_on_google.html?tk=rss_news

  2. NotZed said,

    January 15, 2010 at 6:51 am

    Gravatar

    I’d like to see google show some real nuts and ban microsoft products from their services, if they are the real basis of the problem.

    (TBH, I don’t have much sympathy with anyone using Microsoft Windows and being taken advantage of – in an informed world they have some responsibility for their dumb decisions too.)

    Needs Sunlight Reply:

    Ten and eleven years ago, there were quite a few university IT departments which started to ban Microsoft products. You can see now how technical decisions were overridden with organized crime-like methods.

    Microsofters were complaining that University educated engineers and technical staff, ” someone on team fresh out of college”, knew better than to run Microsoft products. See slide 2:
    http://groklaw.net/staticpages/index.php?page=ComesExhN04#E9346

    Roy Schestowitz Reply:

    This reminds me that we ought to do more Comes-derived posts pretty soon. I’ve been sent some pointers to yet-undiscovered smoking guns.

    Yuhong Bao Reply:

    In this case, it is an IE flaw, and Google is already encouraging a switch away from IE.

    Roy Schestowitz Reply:

    Thanks. I shall do a followup post.

What Else is New


  1. Links 29/9/2020: Fedora 33 Beta, Krita 4.4.0 Beta 2, Stellarium 0.20.3 and Mesa 20.2 Released; 20 Million Downloads From the LVFS

    Links for the day



  2. Another Day of ZDNet Being ZDNet, Calling Windows “Linux” (to Confuse People and Help Microsoft Sell Vista 10)

    Microsoft propaganda site ZDNet is keeping up with the tradition of presenting Windows as "Linux" and promoting Windows even in the "Linux" section of the site



  3. [Meme] It's Crazy Not to Eliminate Lame Words That Might Offend Somebody

    If the word “stupid” offends you, then maybe programming isn’t for you, in the same sense that submitting patches with Git over E-mail shouldn't be hard if/when you can develop decent code with sanity checks



  4. IBM Fought for 'Master Race' and Now It's Banning the Word 'Master'

    A lot of the current push to ban the word "master" came from Red Hat (soon IBM, helped by Intel and Microsoft for the most part); we take a hard look at IBM's history to better understand the incredible double standards and what the real motivations might be



  5. IBM's Founder, Mr. Watson (Yes, That Watson), Had “Very Keen Sense of Public Relations”

    "Watson" is a lot more offensive than those supposedly offensive words IBM is working to purge; think about those hundreds of Red Hat workers who are black and were never told about ethnic purges of blacks facilitated by IBM (their new boss)



  6. Under IBM's Leadership Red Hat Becomes a SPAM Marketing Operation, Sending Mass Mails Without Authorisation and Making It Impossible to Unsubscribe

    Red Hat seems incapable of respecting people's inboxes; it subscribes people to things which they never ever subscribed to and makes it impossible to unsubscribe; what has Red Hat become or succumbed to?



  7. EFF: Sitting on a Massive Pile of Money and Members Are Less Than a Third of the Revenue

    As part of our series which explores non-profits turning against their goals (sometimes in pursuit of money, even if that means sellout) we take a good look at the EFF in this age of unprecedented consolidation of wealth and power



  8. IRC Proceedings: Monday, September 28, 2020

    IRC logs for Monday, September 28, 2020



  9. [Meme] Running Public (or Private) Interest Groups for Profit

    The Linux Foundation is picking up some more ‘surveillance capitalism’ money, in the name of… ‘helping’ Linux?



  10. The Concept of Martyrdom in Free Software and the Threat of Demonisation in the Media

    Leaders or figureheads of public interest advocacy are being dismissed as crazy and rude whilst corporations that maim and kill millions of people are spun as "professional" and even "altruistic"; don't fall for it



  11. More Money Does Not Necessarily Mean More Stable Organisations

    The corporate takeover of Free software (privatising the Commons) is a real problem that nobody in the media seems to be talking about, partly because this media is itself corporate and hence part of (participant in) the 'coup'



  12. EPO Management Looks for New and 'Innovative' Ways to Exploit Scientists and Distract From EPO Corruption

    EPO management is desperate for puff pieces, having just produced some greenwashing nonsense (about a dozen press items about this non-event) and now a bunch of self-promotional videos



  13. Before the New York Times Did a Number on Donald Trump It Changed Bill Gates' Tune

    When you speak strictly through a spokesperson it often means you're lying and/or hiding something; the Gates enigma remains unsolved more than a year later



  14. Links 28/9/2020: Linux 5.9 RC7, Review of Linuxfx 10.6, OpenSSH 8.4

    Links for the day



  15. Speaking Through Spokespeople is a Sign of Weakness, Such as Non-Denying and False Denials (or: Bill Gates Never Denied His Connections to MIT Through Jeffrey Epstein)

    Big liars lie shamelessly; the biggest liars lie through proxies and today we examine the evasive tactics of Bill Gates and his associates (who were closely connected to Jeffrey Epstein but refuse to even talk about that, except indirectly)



  16. IRC Proceedings: Sunday, September 27, 2020

    IRC logs for Sunday, September 27, 2020



  17. Accounting for Debconf 19 Travel... in 2020

    A deeper look or analysis of Debian expenditures, which grew more than twicefold for travel last year



  18. Don't Let Microsoft Make 'Open Source' Synonymous With Proprietary Monopoly GitHub

    Now that the OSI works for Microsoft instead of Open Source (no, GitHub isn’t Open Source; it’s inherently against Open Source) we need to understand the modus operandi and learn from old mistakes



  19. Links 27/9/2020: Puppy Linux 9.5, Nitrux 1.3.3

    Links for the day



  20. Public Relations and Tolerance Stunts Are Very, Very Cheap

    It's 2020 and people are asked to focus on superficial aspects of corporations rather than anything of substance (like the effects on society at large, notably exploitation and long-term harm)



  21. Open to Everything

    It always starts with good intentions...



  22. The OSI's President Apparently Does Not Know That His Own Employer (Salesforce) Works for ICE

    The hypocrisy (or double standard) of the OSI’s President is astounding; taking salaries paid in part by ICE budget (Salesforce works for ICE and similarly evil agencies) while protesting in a proprietary software platform of Microsoft (GitHub) about ICE (all this whilst actively participating in it regardless)



  23. [Meme] Communist Tactics

    To Microsoft, Linux is communism until Microsoft controls it (and then runs over it to crush it, the typical modus operandi)



  24. OSI President: Most or Half of the OSI's Money (Even Individual Donors' Money) Goes to a Microsoft-Led Initiative

    The OSI has turned from advocate of "Open Source" (a disingenuous attempt to set aside Free/libre software) to advocate of Microsoft and GitHub in just 3 years (since taking Microsoft's money/bribes)



  25. IRC Proceedings: Saturday, September 26, 2020

    IRC logs for Saturday, September 26, 2020



  26. The 24/7 'Tech' Worker (Babysitter of User-hostile Computing) and 'Expensive' Programmer

    The rights of workers are being reduced to nothing (many in their older years made redundant), even in an occupation that is indirectly responsible for automating and thus deprecating jobs in many other occupations



  27. Why Techrights is Totally Unexcited About the New Owner of Linux Journal

    Linux Journal might soon become an anti-Linux site (veiled hostility) if Slashdot's editorial preferences are anything to go by (Slashdot has just seized control of Linux Journal)



  28. The Cheapening of the Programmer is a Threat to Human Rights of All Computer Users

    From the era of computer experts (down to the low level of computing with transistors), mathematicians, physics gurus and respected technicians we've come to orders-following, user-apathetic engineers who are overworked, grossly underpaid, and way too fearful of raising ethical concerns (voicing disagreement can result in prompt dismissal, followed by perpetual unemployment) and this ensures digital oppression without checks and balances



  29. Links 26/9/2020: Wine 5.18, FreeBSD 12.2-BETA3 and Debian 10.6 Released

    Links for the day



  30. 'Appeal to Novelty' as a Lever for Proprietary Software Monopolies, Bloat (Planned Obsolescence) and More Surveillance

    Novelty is generally fine, but in many cases products are developed iteratively (not cumulatively) not to advance society or to objectively improve services, only to increase control over people (because emergent ‘freemium’-like business models nowadays revolve around addiction and subjugation, e.g. ‘brain-farming’ and manipulation of minds)


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts