EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.14.10

Chinese Google ‘Attack’ Involves Microsoft Windows Flaws

Posted in GNU/Linux, Google, Microsoft, Security, Windows at 8:21 pm by Dr. Roy Schestowitz

China satellite image

Summary: It is not Google’s fault but Microsoft’s fault that China managed to compromise accounts not just of Google but of over 20 other companies, by Microsoft’s own admission

YESTERDAY we mentioned Google’s reaction to attacks from China, which are now confirmed to be targeting different companies. It was not something against Google as Google is one among several victims and some people doubt there will be an exit from the largest Internet market.

How would leaving the Chinese market actually prevent Chinese crackers from connecting to Google servers? It would not.

Hacking Risks Persist Even If Companies Withdraw From China

Google and other enterprises still face a bleak computer security landscape that makes their companies vulnerable to hackers, whether they do business in China or not, analysts say.

Perhaps the most interesting revelation, which was found buried deep inside reports, is the role of Windows in these attacks on Google. Check this one out for example: (the emphasis in red is ours)

More sources are now claiming the Chinese government is behind the recent cyberattacks against Google and 33 other Silicon Valley companies, reports security firm Verisign iDefense. The attacks, revealed yesterday via a posting on Google’s official blog, were hacking attempts on the technology infrastructure of Google and other major corporations in sectors that included finance, technology, media and chemical, said Dave Girouard, president of Google Enterprise.

[...]

While July’s attacks were detected early and were largely uneventful, December’s attacks did find some success. In addition, these same sources claim that the files in both cases share similar characteristics. For example, both attacks used a backdoor Trojan in the form of a Windows DLL, and both share two similar hosts for the command-and-control (C&C) communication. In layman’s terms, if the cyberattack was a ground assault during a war, the C&C would be the general barking out the orders. Also in both incidents, the IP addresses used for C&C are in the same subnet and only six addresses apart from each other. That means both attacks are likely to have been instigated by the same entity and may imply that the recent victims’ technology infrastructure has been compromised since July.

When one in two Windows PCs is said to be a zombie PC, the above should not be surprising. This was a targeted attack which must have relied on China activists’ use of Microsoft Windows.

As the name suggests, the carefully crafted assaults differ from the net-cast-wide malware most often seen. A targeted attack specifically selects its victim and generally sends an e-mail using that person’s name and perhaps business title. The body of the message might reference an attached list of business contacts, or describe it as an invoice, or use any other hook that would allay suspicion and convince the victim to double-click the attachment.

Real activists do not use Windows and should use GNU/Linux. A few moments ago, our reader Jose added information that confirms the above. It’s an AP article titled “Microsoft’s browser flaw exposed Google to hackers” and it says (in the opening): “Microsoft says a security flaw in its Internet Explorer browser played a role in the recent computer attacks against Google and at least 20 other companies.”

In other news, a bank server has just been compromised and Baidu got hit by the same group that exploited Windows botnets to take down Twitter [1, 2, 3, 4, 5, 6]. We mentioned this story here and there’s more from The Register:

The same group that used a DNS attack to hijack Twitter last month has defaced the home page of Chinese search engine Baidu.

Surfers visiting Baidu site on Monday night were confronted by the message “This site has been hacked by Iranian Cyber Army”, together with an image of the Iranian flag. Early speculation suggests the attack involved changing Baidu’s DNS records rather than a direct attack on the site itself, but this remains unconfirmed.

Baidu — unlike Google — was not a victim of customers who use Windows. Google should tell customers that it’s not Google that’s vulnerable; it’s Windows. Customers should therefore rethink their platform preferences. The same already goes for banks, for similar reasons.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

13 Comments

  1. Yuhong Bao said,

    January 14, 2010 at 8:50 pm

    Gravatar

    “Check this one out for example: (the emphasis in red is ours)”
    That is not enough evidence, as it do not say anything about security holes in Windows being used.
    But turned out that flaws in IE was indeed used in the attacks, again by MS’s own admission:
    http://arstechnica.com/microsoft/news/2010/01/microsoft-warns-of-ie-security-flaw-used-in-google-attacks.ars
    And technically IE is indeed part of Windows, though other web browsers work on Windows too that do not have the flaw.
    But Adobe was partly to blame too:
    http://www.computerworld.com/s/article/9144378/Hackers_used_rigged_PDFs_to_hit_Google_and_Adobe_says_researcher

    Roy Schestowitz Reply:

    It seems like a case of “double-click to execute” in Windows, invoking proprietary software that’s vulnerable (opening of a file leading to system compromise).

    Yuhong Bao Reply:

    Nope, it did turned out to depend on a real security vulnerability, but if that was true, it would not be MS’s fault at all (unless a stupid feature like AutoPlay was used), and that is my point.

    your_friend Reply:

    Not a Microsoft flaw? Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers? I don’t think win32.dll will run in any of those others. Only Microsoft computers have this kind of problem. Nailing down the exact causes of these massive attacks will be like naming ants, there are too many security problems in Windows to begin to make sense of it and the botnet masters use them all.

    Windows needs to be taken off the web before it ruins the web for everyone.

    Yuhong Bao Reply:

    Indeed, I was not claiming that the botnet runs on anything other than Windows, I was trying to say that just because that it runs on Windows doesn’t mean MS is to blame. Now it did turned out MS is indeed partly to blame, I was just saying that the cited evidence was not enough.

    Yuhong Bao Reply:

    “Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers?”
    Yes, these are all in theory possible, which is why assigning blame properly is so important.

    Yuhong Bao Reply:

    Now, whether this flaw warrant a switch away from Windows would be a different matter, but I will say that it would warrant a switch away from IE, not Windows. After all, IE gets security flaws almost all the time, and do people switch away from Windows because of it? No, of course not, since you can run other browsers on Windows.

    Roy Schestowitz Reply:

    I have an update on this:

    Adobe Flaw Wasn’t Part of Attack on Google

    http://www.pcworld.com/article/187043/adobe_flaw_wasnt_part_of_attack_on_google.html?tk=rss_news

  2. NotZed said,

    January 15, 2010 at 6:51 am

    Gravatar

    I’d like to see google show some real nuts and ban microsoft products from their services, if they are the real basis of the problem.

    (TBH, I don’t have much sympathy with anyone using Microsoft Windows and being taken advantage of – in an informed world they have some responsibility for their dumb decisions too.)

    Needs Sunlight Reply:

    Ten and eleven years ago, there were quite a few university IT departments which started to ban Microsoft products. You can see now how technical decisions were overridden with organized crime-like methods.

    Microsofters were complaining that University educated engineers and technical staff, ” someone on team fresh out of college”, knew better than to run Microsoft products. See slide 2:
    http://groklaw.net/staticpages/index.php?page=ComesExhN04#E9346

    Roy Schestowitz Reply:

    This reminds me that we ought to do more Comes-derived posts pretty soon. I’ve been sent some pointers to yet-undiscovered smoking guns.

    Yuhong Bao Reply:

    In this case, it is an IE flaw, and Google is already encouraging a switch away from IE.

    Roy Schestowitz Reply:

    Thanks. I shall do a followup post.

What Else is New


  1. Some Patent Attorneys Dislike Techrights Not Because It's Wrong But Because Software Patents Are Wrong (and Sometimes Illegal)

    Odd rants which misuse common law and ignore alleged Fair Use (and misinterpretation of copyright law, for censorship purposes) would have people believe that we're wrong; but it's more likely that the person in question is jealous, insecure, or offended by our stance on patent scope, which is very much rooted in the law itself (and the views widely held by software developers globally)



  2. Guarding and Rescuing the FSF Titanic: Distro-libre and feature-schema

    "Every time a distro does not suit a user's purposes, and it is less work to adapt the distro on one's own than to affect the distro in any other way, a distro is born."



  3. Links 21/8/2019: Dell's XPS 13, Mesa 19.2 RC1, Librem Update

    Links for the day



  4. Links 21/8/2019: Open Source POWER, Alpine 3.10.2, Netrunner 19.08

    Links for the day



  5. Edward as a Nodder to Team UPC Kool-Aid

    Bristows LLP is at it again and it's getting pathetic, not just dishonest as usual



  6. Guest Post: António Campinos' European Patent Office Redefines Modern Slavery in the Heart of Europe in 2019

    The European Patent Office’s (EPO) President António Campinos — like his predecessor Battistelli — emulates Chinese labour practices



  7. Guarding and Rescuing the FSF Titanic: There is More Than One Iceberg Ahead

    "This strategy is not far from when Microsoft talked about "de-commoditizing protocols" in the late 90s, as part of their plans to control, dominate, and end Open Source and Free software."



  8. EPO Cannot Handle Patent Justice With a Backlog of About 10,000 Cases at the Boards of Appeal

    The EPO's long war on judges and on the law has proven to be costly; it's difficult to pretend that the EPO functions like a first-world legal framework



  9. The European Patent Office Increases Surveillance: Can't Get Food Without Being Spied on

    The infamous "War on Cash" has been 'won' at Europe's second-largest institution, where people's diet can now be monitored and indefinitely retained on the system



  10. To GNU/Linux, the Operating System, GAFAM (Google, Apple, Facebook, Amazon, Microsoft) is Not the Threat. Microsoft is.

    Don't let Microsoft get away with its bogus narration; GNU/Linux is primarily under attack from Microsoft, whereas Software Freedom in general is under attack from many directions



  11. The Free Software Foundation (FSF) Has the Full Support of Techrights

    Our support for the FSF is strong enough that we want to occasionally suggest improvements; there are growing frictions designed to isolate the FSF and cause self-restraint/censorship



  12. Why We Support Phoronix (Whereas Some Others Do Not)

    Some people try to characterise Michael Larabel as the 'bad boy' of Linux even though Michael is probably the hardest working Linux journalist out there



  13. Guarding and Rescuing the FSF Titanic: The Simplest Ways that AI will Change Computing

    "AI is already used to help kill people. We should be cautious, and know that the best rules we come up with (like no doing magic outside the school grounds) won't be followed all the time."



  14. Links 20/8/2019: DragonFlyBSD Developing DSynth

    Links for the day



  15. Guarding and Rescuing the FSF Titanic: Narcissism in The Community

    "Narcissists are drawn to intelligent people. They take great pleasure in attacking, controlling and defeating intelligent people because it makes them feel smarter and more important."



  16. Breaking the Law Has Become the Norm at the European Patent Office

    The European Patent Office’s ongoing practice of destroying critics/whistleblowers and crushing unions, judges, examiners etc. — as well as threats and bribery of the media — ultimately mean a perpetual state of lawlessness that, if it prevails, will let patent trolls raid the European economy and stall innovation



  17. Links 20/8/2019: KMyMoney 5.0.6, Kdenlive 19.08

    Links for the day



  18. Guarding and Rescuing the FSF Titanic: Free Software in Education

    "If everyone learns to code, then everyone gains some understanding of how to code in other languages."



  19. Links 19/8/2019: Another Linux 5.3 RC, OpenSUSE's Richard Brown Steps Down, Slackware Creates Patreon Page, Qt 6 Initiated

    Links for the day



  20. Speaking Truth to Monopolies (or How to Write Guest Posts in Techrights)

    We need to have more articles tackling the passage of all power — especially when it comes to software — to few large monopolies that disregard human rights or actively participate in their abolishment in the digital realm



  21. Guarding and Rescuing the FSF Titanic: Free as in Speech

    "While a new breed of so-called anarchists campaign against expression that even the state allows, people are also foolishly overplaying the relevance of the state to free speech issues -- as if it's not a freedom issue when a project is increasingly thought-policed, because the thought-policing isn't on a state level."



  22. Toxic Culture at Microsoft

    Racism, intolerance, sexism and bullying are rampant at Microsoft; but Microsoft would rather deflect/divert/sidetrack to Google and so-called 'GAFA'



  23. Guarding and Rescuing the FSF Titanic: Introduction

    "The FSF isn't just threatened, it will hit a large iceberg in the future that changes it permanently."



  24. Linux Journal and Linux.com Should Have Been Kept Going

    There's apparently no good explanation for the effective shutdown of Linux Journal and Linux.com; London Trust Media Holdings (LTMH), owner of Linux Journal, saw numbers improving and the Linux Foundation, steward of Linux.com, is loaded with money



  25. 2019 Microsoft Glossary

    How Microsoft internally interprets words that it is saying to the public and to the press



  26. 2019 Surveillance Glossary

    Distortion of technical and nontechnical terms in this day and age of '1984'



  27. Openwashing Report: It's Getting Worse, Fast. Everything is Apparently 'Open' Now Even Though It's Actually Proprietary.

    The latest examples (this past week's) of openwashing in the media, ranging from 5G to surveillance



  28. GitHub is a Dagger Inside Free/Open Source Software (FOSS); This is Why Microsoft Bought It

    A year later it seems pretty evident that Microsoft doesn’t like FOSS but is merely trying to control it, e.g. by buying millions of FOSS projects/repositories at the platform level (the above is what the Linux Foundation‘s Jim Zemlin said to Microsoft at their event while antitrust regulators were still assessing the proposed takeover)



  29. Microsoft Grows Within and Eats You From the Inside

    Microsoft entryism and other subversive tactics continue to threaten and sometimes successfully undermine the competition; Microsoft is nowadays doing that to core projects in the Free/Open Source software world



  30. Links 18/8/2019: New KNOPPIX and Emmabuntus Released

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts