01.14.10

Chinese Google ‘Attack’ Involves Microsoft Windows Flaws

Posted in GNU/Linux, Google, Microsoft, Security, Windows at 8:21 pm by Dr. Roy Schestowitz

China satellite image

Summary: It is not Google’s fault but Microsoft’s fault that China managed to compromise accounts not just of Google but of over 20 other companies, by Microsoft’s own admission

YESTERDAY we mentioned Google’s reaction to attacks from China, which are now confirmed to be targeting different companies. It was not something against Google as Google is one among several victims and some people doubt there will be an exit from the largest Internet market.

How would leaving the Chinese market actually prevent Chinese crackers from connecting to Google servers? It would not.

Hacking Risks Persist Even If Companies Withdraw From China

Google and other enterprises still face a bleak computer security landscape that makes their companies vulnerable to hackers, whether they do business in China or not, analysts say.

Perhaps the most interesting revelation, which was found buried deep inside reports, is the role of Windows in these attacks on Google. Check this one out for example: (the emphasis in red is ours)

More sources are now claiming the Chinese government is behind the recent cyberattacks against Google and 33 other Silicon Valley companies, reports security firm Verisign iDefense. The attacks, revealed yesterday via a posting on Google’s official blog, were hacking attempts on the technology infrastructure of Google and other major corporations in sectors that included finance, technology, media and chemical, said Dave Girouard, president of Google Enterprise.

[...]

While July’s attacks were detected early and were largely uneventful, December’s attacks did find some success. In addition, these same sources claim that the files in both cases share similar characteristics. For example, both attacks used a backdoor Trojan in the form of a Windows DLL, and both share two similar hosts for the command-and-control (C&C) communication. In layman’s terms, if the cyberattack was a ground assault during a war, the C&C would be the general barking out the orders. Also in both incidents, the IP addresses used for C&C are in the same subnet and only six addresses apart from each other. That means both attacks are likely to have been instigated by the same entity and may imply that the recent victims’ technology infrastructure has been compromised since July.

When one in two Windows PCs is said to be a zombie PC, the above should not be surprising. This was a targeted attack which must have relied on China activists’ use of Microsoft Windows.

As the name suggests, the carefully crafted assaults differ from the net-cast-wide malware most often seen. A targeted attack specifically selects its victim and generally sends an e-mail using that person’s name and perhaps business title. The body of the message might reference an attached list of business contacts, or describe it as an invoice, or use any other hook that would allay suspicion and convince the victim to double-click the attachment.

Real activists do not use Windows and should use GNU/Linux. A few moments ago, our reader Jose added information that confirms the above. It’s an AP article titled “Microsoft’s browser flaw exposed Google to hackers” and it says (in the opening): “Microsoft says a security flaw in its Internet Explorer browser played a role in the recent computer attacks against Google and at least 20 other companies.”

In other news, a bank server has just been compromised and Baidu got hit by the same group that exploited Windows botnets to take down Twitter [1, 2, 3, 4, 5, 6]. We mentioned this story here and there’s more from The Register:

The same group that used a DNS attack to hijack Twitter last month has defaced the home page of Chinese search engine Baidu.

Surfers visiting Baidu site on Monday night were confronted by the message “This site has been hacked by Iranian Cyber Army”, together with an image of the Iranian flag. Early speculation suggests the attack involved changing Baidu’s DNS records rather than a direct attack on the site itself, but this remains unconfirmed.

Baidu — unlike Google — was not a victim of customers who use Windows. Google should tell customers that it’s not Google that’s vulnerable; it’s Windows. Customers should therefore rethink their platform preferences. The same already goes for banks, for similar reasons.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

This post is also available in Gemini over at:

gemini://gemini.techrights.org/2010/01/14/microsoft-windows-vulns-vs-goog/

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

13 Comments

  1. Yuhong Bao said,

    January 14, 2010 at 8:50 pm

    Gravatar

    “Check this one out for example: (the emphasis in red is ours)”
    That is not enough evidence, as it do not say anything about security holes in Windows being used.
    But turned out that flaws in IE was indeed used in the attacks, again by MS’s own admission:
    http://arstechnica.com/microsoft/news/2010/01/microsoft-warns-of-ie-security-flaw-used-in-google-attacks.ars
    And technically IE is indeed part of Windows, though other web browsers work on Windows too that do not have the flaw.
    But Adobe was partly to blame too:
    http://www.computerworld.com/s/article/9144378/Hackers_used_rigged_PDFs_to_hit_Google_and_Adobe_says_researcher

    Roy Schestowitz Reply:

    It seems like a case of “double-click to execute” in Windows, invoking proprietary software that’s vulnerable (opening of a file leading to system compromise).

    Yuhong Bao Reply:

    Nope, it did turned out to depend on a real security vulnerability, but if that was true, it would not be MS’s fault at all (unless a stupid feature like AutoPlay was used), and that is my point.

    your_friend Reply:

    Not a Microsoft flaw? Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers? I don’t think win32.dll will run in any of those others. Only Microsoft computers have this kind of problem. Nailing down the exact causes of these massive attacks will be like naming ants, there are too many security problems in Windows to begin to make sense of it and the botnet masters use them all.

    Windows needs to be taken off the web before it ruins the web for everyone.

    Yuhong Bao Reply:

    Indeed, I was not claiming that the botnet runs on anything other than Windows, I was trying to say that just because that it runs on Windows doesn’t mean MS is to blame. Now it did turned out MS is indeed partly to blame, I was just saying that the cited evidence was not enough.

    Yuhong Bao Reply:

    “Was it a Mac Botnet? A GNU/Linux botnet? An OpenSolaris or BSD botnet? How about a botnet within Google’s own servers?”
    Yes, these are all in theory possible, which is why assigning blame properly is so important.

    Yuhong Bao Reply:

    Now, whether this flaw warrant a switch away from Windows would be a different matter, but I will say that it would warrant a switch away from IE, not Windows. After all, IE gets security flaws almost all the time, and do people switch away from Windows because of it? No, of course not, since you can run other browsers on Windows.

    Roy Schestowitz Reply:

    I have an update on this:

    Adobe Flaw Wasn’t Part of Attack on Google

    http://www.pcworld.com/article/187043/adobe_flaw_wasnt_part_of_attack_on_google.html?tk=rss_news

  2. NotZed said,

    January 15, 2010 at 6:51 am

    Gravatar

    I’d like to see google show some real nuts and ban microsoft products from their services, if they are the real basis of the problem.

    (TBH, I don’t have much sympathy with anyone using Microsoft Windows and being taken advantage of – in an informed world they have some responsibility for their dumb decisions too.)

    Needs Sunlight Reply:

    Ten and eleven years ago, there were quite a few university IT departments which started to ban Microsoft products. You can see now how technical decisions were overridden with organized crime-like methods.

    Microsofters were complaining that University educated engineers and technical staff, ” someone on team fresh out of college”, knew better than to run Microsoft products. See slide 2:
    http://groklaw.net/staticpages/index.php?page=ComesExhN04#E9346

    Roy Schestowitz Reply:

    This reminds me that we ought to do more Comes-derived posts pretty soon. I’ve been sent some pointers to yet-undiscovered smoking guns.

    Yuhong Bao Reply:

    In this case, it is an IE flaw, and Google is already encouraging a switch away from IE.

    Roy Schestowitz Reply:

    Thanks. I shall do a followup post.

What Else is New


  1. Links 8/5/2021: GIMP 2.99.6, Wine 6.8 Released

    Links for the day



  2. IRC Proceedings: Friday, May 07, 2021

    IRC logs for Friday, May 07, 2021



  3. [Meme] Outsourcing Audacity Development to Microsoft Proprietary Software and Then Copying Microsoft Tactics (and 'Telemetry')

    They've had the audacity to call it "telemetry" and pretend that surveillance companies (spying giants) cannot figure out who you are based on IP addresses



  4. Links 7/5/2021: IPFire 2.25 Core Update 156 and Diffoscope 174 Released

    Links for the day



  5. The New Microsoft? No, the New IBM.

    Microsoft GitHub and IBM: a strategic alliance between a monopolistic duo



  6. The Audacity Takeover by Muse Group is No Cause for Celebration

    Audacity is now part of an entity called Muse Group and if it doesn’t take or suck freedom out of Audacity, it will certainly deny users rather basic concepts (or anticipation) of privacy



  7. King of Linux

    If the entire operating system is being called "Linux", then we fall for a publicity or misattribution stunt



  8. The Biggest Troll is the Linux Foundation, Still Looking to Provoke and Defame Free Software Communities in Order to Help a Monopolistic Takeover and to Shoehorn Tyrants Into Leadership Positions

    Contrary to what the so-called ‘Linux’ Foundation is trying to say, the most toxic element is itself; it’s maligning the real community while protecting abusive and racist corporations that profit from war and tribalism-motivated hatred



  9. IRC Proceedings: Thursday, May 06, 2021

    IRC logs for Thursday, May 06, 2021



  10. “The Lolita Express” and Prince Bill

    “The Lolita Express” scandals return to haunt pool old Bill, as it turns out his wife was upset and it's quite likely the reason for their divorce



  11. Links 7/5/2021: GNU/Linux Preinstalled, Plamo 7.3, LibreOffice 7.1.3

    Links for the day



  12. The Latest Reports About Bill Gates Serve to Confirm or at Least Reaffirm Many People's Suspicions

    So, just as many people suspected, Melinda Gates did not appreciate her husband sneaking behind her back to meet someone who had trafficked thousands of underage girls for sexual exploitation and there are high-profile calls right now for greater transparency, seeing the impact on the world’s biggest tax evasion vehicle



  13. Disregard Web Sites That Call Themselves 'News' and Instead Promote Proprietary Software for Companies Like Microsoft

    Publishers like IDG have long been paid-for marketing in ‘article’ clothing, sometimes with the veneer of ‘reporting’ (as if they have some inside knowledge or insight, e.g. speaking with or for the company they secretly coordinate with or market for); but sadly we’ve been seeing some so-called ‘Linux’ sites doing the same thing, in effect acting like de facto Microsoft marketers



  14. [Meme] Who Needs Examination Anyway When There's 'Hey Hi' (AI)?

    The patent production line could do away with 'pesky' and 'opinionated' examiners who actually wish to scrutinise alleged 'inventions'



  15. Europe's Second-Largest Institution Corrupting the Media and Buying Expensive Puff Pieces

    As annual reports reveal, the EPO wastes an extraordinary amount of money on reputation laundering campaigns and it pollutes the signal by paying publishers; we examine this issue using the new 'reports' shown in the video above



  16. Links 6/5/2021: Fedora’s Compiler Policy and Celemony Software GmbH Adopting Free Software

    Links for the day



  17. Free Software Proponents Don't Fall for Bullshit (Same is True for EPO Examiners)

    There are parallels between what happens in the Free Software Movement and the EPO, where well-meaning people — and usually hard-working scientists — are besieged by people who never really contributed anything to society



  18. IRC Proceedings: Wednesday, May 05, 2021

    IRC logs for Wednesday, May 05, 2021



  19. Lessons From Another Failed Coup Against the Free Software Movement

    The coup has very clearly failed and we should prepare for future attempts (they go in cycles); the monopolies really dislike software they cannot control fully (e.g. copyleft/GPL-licensed software)



  20. Links 5/5/2021: Mesa 21.1 Released and New Releases of Python

    Links for the day



  21. Links 5/5/2021: StarLabs, GNU Zile 2.6.2, Fedora i3 Spin

    Links for the day



  22. Phony 'Scandals' From Phony 'News' Site ZDNet

    Steven J. Vaughan-Nichols continues the coup against the FSF (trying to separate it from its founder, Richard Stallman), funded by IBM and Microsoft to engage in libel at a marketing company-owned ‘news’ site called ZDNet



  23. Links 5/5/2021: Windows Security Breaches and GNU Pokology Launched

    Links for the day



  24. IRC Proceedings: Tuesday, May 04, 2021

    IRC logs for Tuesday, May 04, 2021



  25. Links 4/5/2021: Taiwins 0.3, KDE Plasma 5.21.5 Released

    Links for the day



  26. EPO Already Wasting Money on Media Manipulation Campaigns for European Inventor Award

    An online-only European Inventor Award 'event' is being used as a pretext/excuse to flood European publishers with money they can rightly perceive as 'hush money'; everyone out there with no spine would likely buckle at the sight of EPO euros and just produce mindless puff pieces that serve to distract from EPO corruption



  27. The Timing of This Melinda Gates Tweet Was Always Curious...

    Remarking on her trip to Africa, where the Gates family lobbies for monopolies on seeds (for profit or course, notably through Monsanto/Bayer, which the Gates family heavily invests in), she posted pure fluff and old photos. And it’s hard to believe she had nothing better to do at the time (better than such nostalgia). As we noted last year: “The above tweet of a beach was posted [by Melinda Gates] on the date of the arrest/search of their employee, who was at their residence at the time.” He was arrested around the very same time this tweet was posted. As we wrote last year (based on detailed documents obtained from the police department): “This tweet was posted 2 hours and 40 minutes after the door was breached and incriminating evidence collected.” He was arrested later that morning at the mansion of Bill and Melinda Gates (the police records contain detailed timelines to confirm the chronology). Melinda’s first name was also in the CP 'stash'.



  28. Media Frenzy Around Gates Divorce Helps Distract From Bill's Crimes

    The distraction from many Gates scandals is cushioned by yet another personal fluff; we would rather see investigative journalism pursuing real answers about real scandals



  29. IRC Proceedings: Monday, May 03, 2021

    IRC logs for Monday, May 03, 2021



  30. EPO Disregards Animal Welfare

    An often overlooked issue surrounding the second-largest institution in Europe is its impact on millions if not billions of animals; there's ongoing research into that


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts