01.14.10

Chinese Google ‘Attack’ Involves Microsoft Windows Flaws

Posted in GNU/Linux, Google, Microsoft, Security, Windows at 8:21 pm by Dr. Roy Schestowitz

China satellite image

Summary: It is not Google’s fault but Microsoft’s fault that China managed to compromise accounts not just of Google but of over 20 other companies, by Microsoft’s own admission

YESTERDAY we mentioned Google’s reaction to attacks from China, which are now confirmed to be targeting different companies. It was not something against Google as Google is one among several victims and some people doubt there will be an exit from the largest Internet market.

How would leaving the Chinese market actually prevent Chinese crackers from connecting to Google servers? It would not.

Hacking Risks Persist Even If Companies Withdraw From China

Google and other enterprises still face a bleak computer security landscape that makes their companies vulnerable to hackers, whether they do business in China or not, analysts say.

Perhaps the most interesting revelation, which was found buried deep inside reports, is the role of Windows in these attacks on Google. Check this one out for example: (the emphasis in red is ours)

More sources are now claiming the Chinese government is behind the recent cyberattacks against Google and 33 other Silicon Valley companies, reports security firm Verisign iDefense. The attacks, revealed yesterday via a posting on Google’s official blog, were hacking attempts on the technology infrastructure of Google and other major corporations in sectors that included finance, technology, media and chemical, said Dave Girouard, president of Google Enterprise.

[...]

While July’s attacks were detected early and were largely uneventful, December’s attacks did find some success. In addition, these same sources claim that the files in both cases share similar characteristics. For example, both attacks used a backdoor Trojan in the form of a Windows DLL, and both share two similar hosts for the command-and-control (C&C) communication. In layman’s terms, if the cyberattack was a ground assault during a war, the C&C would be the general barking out the orders. Also in both incidents, the IP addresses used for C&C are in the same subnet and only six addresses apart from each other. That means both attacks are likely to have been instigated by the same entity and may imply that the recent victims’ technology infrastructure has been compromised since July.

When one in two Windows PCs is said to be a zombie PC, the above should not be surprising. This was a targeted attack which must have relied on China activists’ use of Microsoft Windows.

As the name suggests, the carefully crafted assaults differ from the net-cast-wide malware most often seen. A targeted attack specifically selects its victim and generally sends an e-mail using that person’s name and perhaps business title. The body of the message might reference an attached list of business contacts, or describe it as an invoice, or use any other hook that would allay suspicion and convince the victim to double-click the attachment.

Real activists do not use Windows and should use GNU/Linux. A few moments ago, our reader Jose added information that confirms the above. It’s an AP article titled “Microsoft’s browser flaw exposed Google to hackers” and it says (in the opening): “Microsoft says a security flaw in its Internet Explorer browser played a role in the recent computer attacks against Google and at least 20 other companies.”

In other news, a bank server has just been compromised and Baidu got hit by the same group that exploited Windows botnets to take down Twitter [1, 2, 3, 4, 5, 6]. We mentioned this story here and there’s more from The Register:

The same group that used a DNS attack to hijack Twitter last month has defaced the home page of Chinese search engine Baidu.

Surfers visiting Baidu site on Monday night were confronted by the message “This site has been hacked by Iranian Cyber Army”, together with an image of the Iranian flag. Early speculation suggests the attack involved changing Baidu’s DNS records rather than a direct attack on the site itself, but this remains unconfirmed.

Baidu — unlike Google — was not a victim of customers who use Windows. Google should tell customers that it’s not Google that’s vulnerable; it’s Windows. Customers should therefore rethink their platform preferences. The same already goes for banks, for similar reasons.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

This post is also available in Gemini over at:

gemini://gemini.techrights.org/2010/01/14/microsoft-windows-vulns-vs-goog/

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

13 Comments

  1. Yuhong Bao said,

    January 14, 2010 at 8:50 pm

    Gravatar

    “Check this one out for example: (the emphasis in red is ours)”
    That is not enough evidence, as it do not say anything about security holes in Windows being used.
    But turned out that flaws in IE was indeed used in the attacks, again by MS’s own admission:
    http://arstechnica.com/microsoft/news/2010/01/microsoft-warns-of-ie-security-flaw-used-in-google-attacks.ars
    And technically IE is indeed part of Windows, though other web browsers work on Windows too that do not have the flaw.
    But Adobe was partly to blame too:
    http://www.computerworld.com/s/article/9144378/Hackers_used_rigged_PDFs_to_hit_Google_and_Adobe_says_researcher

    Roy Schestowitz Reply:

    It seems like a case of “double-click to execute” in Windows, invoking proprietary software that’s vulnerable (opening of a file leading to system compromise).

    Yuhong Bao Reply:

    Nope, it did turned out to depend on a real security vulnerability, but if that was true, it would not be MS’s fault at all (unless a stupid feature like AutoPlay was used), and that is my point.

    your_friend Reply:

    Not a Microsoft flaw? Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers? I don’t think win32.dll will run in any of those others. Only Microsoft computers have this kind of problem. Nailing down the exact causes of these massive attacks will be like naming ants, there are too many security problems in Windows to begin to make sense of it and the botnet masters use them all.

    Windows needs to be taken off the web before it ruins the web for everyone.

    Yuhong Bao Reply:

    Indeed, I was not claiming that the botnet runs on anything other than Windows, I was trying to say that just because that it runs on Windows doesn’t mean MS is to blame. Now it did turned out MS is indeed partly to blame, I was just saying that the cited evidence was not enough.

    Yuhong Bao Reply:

    “Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers?”
    Yes, these are all in theory possible, which is why assigning blame properly is so important.

    Yuhong Bao Reply:

    Now, whether this flaw warrant a switch away from Windows would be a different matter, but I will say that it would warrant a switch away from IE, not Windows. After all, IE gets security flaws almost all the time, and do people switch away from Windows because of it? No, of course not, since you can run other browsers on Windows.

    Roy Schestowitz Reply:

    I have an update on this:

    Adobe Flaw Wasn’t Part of Attack on Google

    http://www.pcworld.com/article/187043/adobe_flaw_wasnt_part_of_attack_on_google.html?tk=rss_news

  2. NotZed said,

    January 15, 2010 at 6:51 am

    Gravatar

    I’d like to see google show some real nuts and ban microsoft products from their services, if they are the real basis of the problem.

    (TBH, I don’t have much sympathy with anyone using Microsoft Windows and being taken advantage of – in an informed world they have some responsibility for their dumb decisions too.)

    Needs Sunlight Reply:

    Ten and eleven years ago, there were quite a few university IT departments which started to ban Microsoft products. You can see now how technical decisions were overridden with organized crime-like methods.

    Microsofters were complaining that University educated engineers and technical staff, ” someone on team fresh out of college”, knew better than to run Microsoft products. See slide 2:
    http://groklaw.net/staticpages/index.php?page=ComesExhN04#E9346

    Roy Schestowitz Reply:

    This reminds me that we ought to do more Comes-derived posts pretty soon. I’ve been sent some pointers to yet-undiscovered smoking guns.

    Yuhong Bao Reply:

    In this case, it is an IE flaw, and Google is already encouraging a switch away from IE.

    Roy Schestowitz Reply:

    Thanks. I shall do a followup post.

What Else is New


  1. Video: “Unjust Computing Clamps Down” by Richard Stallman

    12 days ago the FSF uploaded the video above, in which current threats to software freedom are explained by the FSF's founder



  2. FSF Web Site Now Lists the Seven Voting Members, Including Alexandre Oliva, Former Acting FSF President

    The FSF is now in good and reliable hands, which we're told are all supportive of the decision to bring back the FSF's founder to the Board; Oliva remains involved as a voting member



  3. The EPO's War on Justice and Assault on the Law -- Part 11: The Rapporteur Who Once Was Vice-President

    EPO‘s former Vice-President of DG3 will be the person to decide on the EPO’s (mis)conduct



  4. [Meme] Captured EPO

    Put the EPO back in the hands of people who do all the work and actually understand the real goals of a patent office



  5. An Urgent Need to Fix the EPO, Which is Becoming Rogue at Every Level (Even the 'Legal' Level)

    Helpless examiners are being put in a grave dilemma: violate the EPC or lose the job; it's meanwhile clear that internal appeals, including referrals to the Boards of Appeal, are also hopeless because these courts or tribunals obey tyrants, not the EPC, and moreover they cover up past abuses of the tyrants



  6. IRC Proceedings: Monday, May 17, 2021

    IRC logs for Monday, May 17, 2021



  7. 6,700 Signatures in Support of Richard Stallman's Return to the FSF's Board

    6,700 signatures will be secured any day now (maybe later today); we thought the graph is worth replotting again, even if only to remind people how badly the defamatory hate letter has backfired



  8. [Meme] The Real Gates Scandal is About Connections to Sex Trafficking (Epstein), Not Infidelity

    Some media is still trying to shift attention (some of the very same media that misdirected focus to Richard Stallman when a Gates-Epstein scandal unfolded at MIT), but people aren't gullible enough



  9. Links 17/5/2021: New GeckoLinux and Kdenlive 21.04.1

    Links for the day



  10. Richard Stallman Refers to Intel's Management Engine (ME) -- or a Back Door -- as 'Master', and the Processor Intel Lets Us Use as 'Slave'

    “The president and founder of the Free Software Foundation will speak about pressing issues in free software today, and will present the winners of the 2018 Free Software Awards,” says the summary (this was 3 years ago, i.e. before the purge of language, with a prominent role played by Intel)



  11. Links 17/5/2021: NetBSD 9.2 and Early Look at Bodhi Linux 6.0.0

    Links for the day



  12. Calle Josefsson as Living Proof That Attacking the Causes You Once Proclaimed to Stand for is Very Profitable

    Some thoughts on the situation of the Boards of Appeal in Haar; they're led by someone who receives a huge salary (a four- or five-fold increase) in exchange for an epic sellout and abandonment of principles; as a de facto legal slinger or imposter/poser he has already done incredible damage on several levels



  13. The EPO's War on Justice and Assault on the Law -- Part 10: A Faustian Pact?

    Benoît Battistelli‘s rubber-stamping judge from Sweden saw his salary growing four- or five-fold and he has meanwhile lowered his public profile, fearing that people will see what he sold his soul for



  14. EPO Staff Representatives Not Amused to See an Office That Steals From Staff and Even From Pensioners

    The heist continues; the EPO isn't just a milking cow of Germany but also of EPO officials who keep the 'lid' or the 'cover' on this whole financial instrument, which would enrage member states if they truly understood what's going on



  15. [Meme] Virtual Prisons for Virtual Hearings (Haarings)

    Today’s EPO has a truly twisted notion of the “rule of law”



  16. President of the Boards of Appeal, the Star of the Haar Show

    It’s best in the metal version; burn in Hell, Lesley Gore



  17. Right To Repair: When You Don't Own What You Buy (and Cannot Even Repair It Legally)

    The second part of preliminary background regarding the Right To Repair; our associate who extracted the videos from YouTube says that both are relevant to “Freedom 0″ (as per the FSF’s definition of Free software)



  18. Right To Repair: What It's About and How That Relates to Software

    A short (less than one minute) video that offers some background or sheds light on the intersection between Software Freedom and the Right To Repair



  19. Brand as Distraction From the Core Issues Surrounding the Right To Repair

    Excerpt of a video from Odysee, in which an important point is explained regarding a very actual and relevant case, more so given a recent ruling that indirectly impacts software freedom, mostly in (but not limited to) the United States



  20. Virtual 'Courts' Aren't Courts and Aren't Suitable Substitutes, Either

    The cheapening of the concept of justice, even as the pandemic that serves to justify that cheapening is gradually being brought under control, is the real issue that should be debated in Haar (or from private homes, probably somewhere around Haar); whether it's compulsory or not ought to be a side question



  21. IRC Proceedings: Sunday, May 16, 2021

    IRC logs for Sunday, May 16, 2021



  22. Links 17/5/2021: Linux 5.13 RC2 and a Lot About Patents

    Links for the day



  23. (All-Time) Archive of Techrights Videos Contains About 1,000 Videos, All Listed in One Place Now

    We're improving access to old material in the site and right now the focus is ways to improve discovery of old video/multimedia files



  24. Haar Song

    The Office in Munich is overseen by “a municipality near Munich,” according to Wikipedia (not inside Munich, so that in itself is a violation of the EPC)



  25. The EPO's War on Justice and Assault on the Law -- Part 9: Squeezing Out the Lifeblood of Democracy?

    The lack of public discourse at the EPO (where tyrants like Benoît Battistelli and António Campinos make up the rules and then have them rubber-stamped by kangaroo courts) helps explain an atrocious policy and moral abyss, which recently led to acceptance of European software patents and mass surveillance disguised as “access to justice”



  26. Luke Smith on Why Free Software Matters and 'Open Source' is Meaningless

    A video just released by a popular YouTube channel



  27. Links 16/5/2021: ExTiX 21.5, Drumstick Multiplatform MIDI File Player Refresh

    Links for the day



  28. EPO.org is a Really Awful Source of Information

    The site that bears a .org suffix is actually more like a private corporation lying about itself in order to save face and attract more money -- or in other words funds that will be squandered and stolen by corrupt administrators



  29. IBM Has Changed a Lot Since 2018, and Not for the Better

    IBM isn't that much of an ally of GNU/Linux as a community-led or community-centric operating system; IBM is in it all just for IBM and we need to treat IBM accordingly



  30. [Meme] Criticising IBM is Racist and Intolerant

    Systemd is becoming untouchable and its critics are framed as "toxic" or "trolls", no matter the facts and irrespective of the technical substance of their complaints


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts