Chinese "Cyber-Attack" US Department of Commerce 161
Kranfer writes "The register has an article about how the Chinese have recently launched an attack against the US Department of Commerce. From the article: '...attacks originating from computer crackers largely located in China's Guangdong province are aimed at extracting sensitive information from targets such as the Commerce Department's technology export office. Security consultants and US government officials reckon the assaults have at least the tacit support of the Chinese government...' This is not the first time Chinese hackers have attempted to gain access to US Government systems."
Not Chinese (Score:5, Insightful)
No decent hacker would leave traces from his own machine when he could easily use a zombie network to carry out the attacks and collect information.
They keep claiming China, China, China.. I'm starting to think it's convenient for them to stick to that version for their own internal affairs.
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2, Troll)
China is a lot scarier than anything else on this planet right now, especially to the US. China should frighten the world though, there's no women for something like twenty-five percent of their male population and given the attitude of the Chinese culture towards women, they're not likely to find a bunch of willing mail-order brides. I mean people are still leaving their girl babies out to die of exposure in that country, you know what I mean?
But to the US it's scary for a different reason: the trade i
Re: (Score:2)
IF you're a troll, then I'm sadned a little that there seem to be so many turning to trolling as a pass time. If you're honestly suggesting that demonizing an entire na
Re: (Score:2)
The thing is that we've been demonizing people who are not at fault instead of focusing on people who actually are a threat. I mean, the whole WMD thing was just a stupid
Re: (Score:2)
Sure you can say that they are a financial threat. Culturally though, America is in a glass house right now. Throw stones and you may find you get a draft. Obviously critisizing a culture is a dangerous thing. At the very least you risk getting unfairly modded down. But what's far w
Re: (Score:2)
This of course is still considerably less than the ramifica
Re:Not Chinese (Score:5, Informative)
Other things involve the fact that when you see attacks from China, you usually get one of two kinds of hosts: you get a wildly unpatched Windows box that's being used as a bot, or you get a decently-secured (usually linux or *BSD) system that is doing some rather specific things to a specific target. And last of all, let's not forget that most of the seminal works on information warfare were written by Chinese military officers, and that it's no secret whatsoever that China actually does have a significant infowar capability. We have no rules of engagement that classify hacking as an act of war, so they can get away with it; what are we going to do, bomb them over it? They have the world's largest standing army, are a (increasingly) crucial economic partner, and we're already overburdened militarily with a two-front war where we've bogged down fighting insurgents. They do it because they know they can get away with it, and they're correct in that thinking.
shhhh... (Score:1)
Re: (Score:2)
Moreover, I'll be suprised and mildly appalled if the NSA and CIA
Re: (Score:2)
Re:Not Chinese (Score:4, Interesting)
Consider you have to hack into Us givernment servers with confidential data. Even if you're not an incredible hax0r, it's obvious that if they find out about you, you're totally screwed. So the first thing you do, the MOMENT you grab the data, is cut the PC off the network.
Then encrypt and record the data on a mobile media (CD, DVD, Flash, whatever), and securely format the PC or even just destroy the original HDD.
Even before this, you'd turn off all possible logging activity, lock up the security, stop unneeded services, so that you can be relatively secure during the attack.
How is it that so much evidence in logs and what not was found on the "source" machines. This is WAY too much evidence. The contrast between the Windows hacked machines and the linux machines may be just a decoy to get the investigators stop tracing right there.
If the boxes were so secure, how did they get in there?
Why were the Windows boxes having "logs" of where the data was sent and so on. What kind of trojan would log their own activity on the compromised machine?
And the million dollar question is: how the f*ck they tied the Chinese *GOVERNMENT* with a Chinese *HACKER*... In fact, the first thought to occur to a government trying to hack into US's servers would be to hire hackers from another country to do it.
All the "evidence" presented is incredibly shallow and inconvincing if you try and put yourself in place of the people who did the attack.
Add to this the constant FUD that US spread that Lenovo puts spying chips in ThinkPads and similar conspiracy theories. It's apparent US find China a convenient target to blame, just the way they did with Iraq after 9/11.
Re: (Score:2)
You know, the idea that Lenovo would put spying software/firmware in the system is an entirely logical one. It wouldn't even be the first time such a thing happened, although it would probably be the first time it happened on such a large scale.
Ever think that maybe people are paranoid because they know just how plausible it is?
Re: (Score:2)
The ThinkPC's were produced in China even before Lenovo owned the department. So are most other laptop brands, macs and even mp3 players, including iPod.
If you feel it's plausible, t
Re: (Score:2)
I'm not that worried. If the Chinese want my porn, they can just send me some blank media and some money for shipping, and a few bucks for my time, and they can have it.
Re: (Score:2)
Re: (Score:2)
You can turn of all logging on YOUR computer, perhaps, but every other server on the internet your packets hop across isn't likely to oblige you.
Also, it doesn't seem they can just "cut the PC off the network" the "moment" they grab the data - it doesn't seem like they're looking for anything specific, just mining data and looking for holes. This is something ongoing. Besides, you can't assume the machines are perfectly "secure' just because it's what you would do - maybe they were dumb, or maybe they d
Chinese or Chinese Government (Score:2)
FTA:
The closest thing to sayin
Re: (Score:2)
Read and weep. [engadget.com]
Re: (Score:2)
Re: (Score:3, Interesting)
How could one do this?
Isn't the first thing that a hacker does when they get their hands on a decent box is apply all security patches so that *another* hacker cannot get into it? What's the point of co-opting a wi
Re: (Score:3, Insightful)
Re: (Score:2)
1. a group of Chinese hackers, directly employed be the Chinese government (military, intelligence, whatever) is targetting US Dept. of Commerce for specific information.
2. Another group of hackers, possibly Chinese themselves, but unaffiliated with the Chinese government, is targetting US Dept. of Commerce for specific information, and is making it look like the Chinese are doing
Back-hacking, as you describe, is theoretically possible, but in practice, this stretches
Re: (Score:2)
Re: (Score:2)
Or, why wouldn't you re-compile the apache already on the compromised system to also act as an ssl host on well-known email ports? The sources are available, you know.
You only have to have *one* instance of such camouflagi
Re: (Score:2)
Trust me...I've done a lot of incident response, and I've never seen apache recompiled with a trojan built into it. Can you point me to the source of such code, so that I can have a look at it?
And no, you don't need only one instance of such camouflaging. You need a lot of them. Al
it's not like that (Score:2)
500 is not workable. Anybody who has ever used a connection through several computers will laugh at this. Even 50 is too painful to contemplate. Heck, a mere 5 hops is usually VERY miserable. (No, not like traceroute. You ssh from one box to the next, then to the next... and find that the damn connection sucks so bad that you say "screw it" and give up.)
People don't cover their tracks as well as they think they do. People get
Re: (Score:2)
You think that somebody able to conduct "a series of targeted attacks against the Department of Energy" is unable to set up a rootkit to show a fake local shell and hide a remote one? Or that they never considered the possibility that somebody might try to find them?
no, but... (Score:2)
More importantly, these people have LITTLE REASON TO CARE. The government openly admits to such activities. The government supports these people. At worst it might look mildly bad on a salary review if word got back to your boss that the enemy noticed. Getting the info is more important than such concerns. Getting lots of good info probably
Re: (Score:2)
Is an attempt at discovery usually made? Are the people making the allegations against the Chinese government claiming to have made such attempts?
Which makes them a perfect target for spoofing, wouldn't you say?
Have they admitted to this one?
Don't get me wrong, I'm not saying that the Chinese weren't responsibl
Re: (Score:2)
Re: (Score:2)
"I Fart in Your General Direction..."
Since I live in that province, and work in the telecom sector, I think I'll ask the boys in R & D tomorrow if anyone knows of anyone knock, knock, knocking on USDCs' digital door...
Re: (Score:2)
What gets me is this one:
http://www.ioltechnology.co.za/article_page.php?iA rticleId=3474082 [ioltechnology.co.za]
Ok so another anonymous officual makes a claim. Now is this him mak
China is not wholly without idiots (Score:2)
We don't catch those people, generally, though they will have a bad day every now and then.
Primarily, we catch the lamers. (the lamers probably still get paid standard army wages, so they won't mind much)
One should wonder: for every lamer we catch, how many non-lamers go uncaught?
lets not talk about the OS that was hacked .. (Score:2)
It's not as if they had access to the hackers computers. They would use evidence of portscans being run against their own computers.
"A few minutes ago, we received a complaint from the U.S. Department of Commerce [google.co.uk] about them being portscanned"
"Attacks on UK government systems using a then unpatched
Re: (Score:2)
Re: (Score:2)
UK.gov repels zero day WMF attack
"The attacks - initiated before [theregister.co.uk] Microsoft's patch against the vulnerability was released on January 5"
Re: (Score:2)
Re: (Score:2, Insightful)
This is why the United States will fall apart. We have two groups, one that se
Re: (Score:1)
Re: (Score:2)
WindowsUpdate (Score:3, Funny)
Re: (Score:2)
2) Most of US Govt computers run MS Windows
3) Bill Gates is in charge of MS
Therefore, Bill Gates is a Chinese Spy!!1!!!!11
Re: (Score:2)
A few select business leaders are allowed to run massive monopolies, labor disputes are settled with an AK-47, and there's no noisy press to berate your crappy products or your business leadership.
Sounds like Bill Gates might actually like the Chinese afterall.
Re: (Score:2)
Assembly-line industries employing low-skilled workers would like China better. Industries like auto manufacturing, textiles, consumer electronics, farming, etc.
Obviously (Score:2, Funny)
what!! (Score:1)
US Department of Commerce? (Score:2)
Re:US Department of Commerce? (Score:5, Informative)
If a foreign power could gain access to internal Commerce discussions it would give them some leverage in negotiations; and in the realm of international business a little inside info can go a long way.
Re: (Score:2)
Right. China remembers what U.S. politicians so often forget: The economy is a tool, in war and in peace. Societies have economies, economies are not societies.
This is getting ridiculous (Score:1, Troll)
Block China From the Firewall (Score:4, Interesting)
They'd just hit from South Korea then (Score:2)
Re: (Score:1)
Re:Block China From the Firewall (Score:5, Interesting)
When the Chinese accidentally rammed one of our surveillance planes was a great example. Bush immediately publicly blamed the Chinese overly-hostile pilots (who were, of course, at fault), and demanded back our plane and it's crew. The correct course would have been to call the Chinese first, and negotiate terms for getting our plane and crew back secretly. IMO, the Chinese can be far more reasonable if we agree to put on a face showing friendship, cooperation, and respect for each other. We could have agreed to publicly call it a freak accident, with no one to blame. That probably would have gotten our guys and maybe even the plane back far quicker.
So, I think changing the web site to shame the Chinese government would be a bad idea. Instead, we should work with the Chinese behind close doors to solve the problem. Of course, that wont end Chinese spying on the US, nor will it end our spying on them. In general, I feel that it is good for world stability when we know the truth about each other. Fear of the unknown can cause major problems (like WMD in Iraq).
Re: (Score:2)
I hate to break it to you, but the iraq invasion was not caused by lack of knowledge. It was actually the fact that Bush new that Iraq didn't have any meaningful WMD that allowed the invasion.
Countries with real WMD like North Korea dont get invaded. If you disregard the US rethoric, invading Iraq has sent the message that you need WMD in order to keep the americans at bay. That is why Iran and NK pursue them as fast as they can.
Re: (Score:2)
Then they should have responded immediately as you say we should have. Or is it a double standard? If you go to another country you should respect their customs when/where reasonable. However, when you wrong another you should not be expecting them to submit to your customs, rather you should accept theirs. In the case you mentioned, the Chinese should h
Re: (Score:2)
I'm sure this is intended to provide an excuse... (Score:4, Insightful)
Oh yeah, targeted indeed. (Score:2, Funny)
Oh yeah, I too must be specifically targeted then, because I've seen these sequences in my log:
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
--Rob
Cyber-attack (Score:1)
Export Control, and the Information Age. (Score:5, Insightful)
Why export controlled information? Think about how much money it takes to protect classified information - guards, safes, alarm systems etc., it's a lot of cash, and it's damn secure. Export controlled information doesn't enjoy those same protections, just export compliance waivers to sell or ship said products overseas. As an example: Say we have a dual use technology, both military and civilian use - like jet engines. We won't sell it to certain countries we compete with both economically, and militarily, but they will do their very damndest to steal it, either by forging state department waivers, lying, stealing, black-mailing, hacking - whatever it takes. Why do they want it? To equip their jets to compete with ours on the battlefield, or to sell, or maybe even find it's weaknesses to compromise if we ever went to war with them.
I'm willing to bet here that the network used to launch the attack was a University school network, which to most people seems pretty innocent - except that in China, all schools are state run and owned. Is it an academic institution, or an extension of the Chinese government? Likely both. In this instance, the Chinese government gets plausible deniability - they had no control over, or knowledge of any cyber attack. I'll don my tin-foil hat, and disagree with that assertion only because I'm jaded and cynical enough to know better.
Re: (Score:2)
http://www.americanintifada.com/2005/5/05-06.htm [americanintifada.com]
I've seen similar stories elsewhere. Have we in fact indirectly sold F-16 technology to the Chinese through Israel? Thanks.
Re: (Score:1)
Wont this be related to the NK atomic bomb news? (Score:1)
What has the Commerce department released recently?
whats the news about in China at the moment?
This is just one big Chinese style slashdotting?
Why is this info internet-accessable anyways? (Score:3, Informative)
> Information housed on the department's systems includes sensitive commercial and
> economic data on US exporters as well as data involving law enforcement records.
How many times does this have to be drilled into people? If you put something on an internet-accessable server, it *WILL* be accessed from the internet, and not only by "authorized personnel". For additional giggles, put the following key into a Google search...
inurl:.gov confidential "do not distribute"
The f***ing idiots who put sensitive government data on publicly accessable servers should be shot by a firing squad for treason.
Re: (Score:1)
Re: (Score:2)
I am quite frankly suprised the result is only "286 English pages". I'd expected high, much higher. especially given that at least a few on the front page are clearly not related to the parent poster's intent.
Sensitivity of information? (Score:2)
If they had clear information and data policies, their data would all be on private networks, without access to the outside. Not doing so is just an invitation for crackers who love challenges.
Re: (Score:1)
Now, unless you want the govt to spend more money on a larger priv network to exchang
First Strike? (Score:2)
And all we are going to do is sit on our hands and let them?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Not bombing 'sacred' buildings. thats playing nice
Not going all out and leveling the place in the beginning. thats playing nice.
To hell with being 'liberators' and the politically correct game, that only gets us in the mess we are in now.
We would never have won wwii with the pansy ass directive we have now. ( i am *not* saying the troops are pansy.. not at all, they just cant go out and do the rest of the job they were trained to do )
Re: (Score:2)
Even Bush Sr. knew we could never occupy Iraq, that's why he didn't attempt to in the first Gulf War. He even warned Dubya not to do a full scale land invasion - it wasn't necessary or particularly smart. He took out Saddam's military, hence e
Invasion ? Nah (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Why connect it? (Score:1)
Why is sensitive governmental data even connected to the public internet? Surely the government can afford it's own private network that doesn't even have connections to the general public internet. They couldn't hack into something that's not there... Sure, the government started the internet, that doesn't mean they have to continue using the same one we do, does it?
Block China (Score:2)
Re: (Score:2)
Hows this for your next headlines? "Mexico and Canada jointly attack the US commerce department."
Surprising and a step in the right direction (Score:2)
All the chinese need to do is put up a pron site. (Score:2)
That would probably be a better vector.
Plus they might make a profit while doing it.
"The Chinese" (Score:2)
People seem to forget.... (Score:3, Informative)
People seem to forget. The US does this kind of thing all the time. Not only to other countries but to their own Citizens. Remember we have all those three letter agencies that do this sort of thing all the time. So what is good for the goose is it not good for the gander? Or is it like torture these days? We gasp and cry when we see someone get their head lopped off on TV, and say "What savages!" Still it is ok for us to torture people for weeks on end because we are the good guys so this is good torture. Who is the savage really? The person that quickly puts and end to the pain of the enemy by whacking off their head or the person that makes their enemy suffer for weeks without end?
You see I come from a group of people that was once "Branded" savages by the US goverment. One example that even lives up to today. We were savages for taking scalps of our enemies. The part that is ALWAYS left out is we only took scalps in revenge for taking the scalps of our women and children for $5.00 a scalp. Payable by the US Goverment. Funny how that part of history is left out and still scalping is always related back to Native Americans even today. "Scalp'm Braves"
So are the Chinese really the bad guys or are they protecting their own assests? We're trying to pick their pockets all the time so why is it so bad when they try to pick ours?
The simple truth for people and goverments is you can't run around beating up other people all the time. Sooner or later someone bigger and badder than you will finally get tired of your shit and your continued assaults against them and in defense will either gang up with the other guys you are beating up on or if big enough on their own will turn around and beat the shit out of you.
The solution is simple. Leave them alone and they will leave us alone. It is all "Cause and Effect" Don't be the "cause" and you won't feel the effect. You can't blame someone for taking a defensive position to your offenceive moves.
The same rule of "cause and effect" applies to networks. You choose to run Windows that can access sensetive areas then YOU are setting yourself up to get hacked. I find it strange that the NSA would build something as secure as SELinux and the rest of the goverment not use it. Maybe not strange just stupid. The point is they have the tools to lock everything down and if they don't well too bad should have bought a better lock for the front door.
Re: (Score:1)
http://www.proxyserverprivacy.com/ipaddress_range
Re: (Score:1)
Re:To everyone who says it can't be China (Score:5, Insightful)
If you're a democracy and liberty loving citizen, then yes, the Chinese regieme represents oppression and injustice and stands against you and your way of life.
However, if you're a corporate shareholder, or one of their shills in public office, then the Chinese regieme represents untold potential to shaft billions and make billions in the process. Ergo, you'll want to keep them sweet.
Re: (Score:2)
Re: (Score:2)
Chinese government and businesses have a variety of behaviors that range from those useful to us to those damaging to us.
"If you're a democracy and liberty loving citizen, then yes, the Chinese regieme represents oppression and injustice and stands against you and your way of life."
It has also brought prosperity and economic progress unmatched in Chinese history, and all of that progress has been since 1948!.
Who are we to say that an im
Re: (Score:2)
Depends on who you are.
I've always respected both the USSR and China. I've found it odd that we really were allies to both countries during WWII. Growing up during the 80s, I had nothing personal against the USSR version of communism. To me, they were just the "other side" that the US military/spies were always competing with in media. (It was either the USSR or Nazis.) Today, I respect China far more as "the other side" than USSR for a number of little reasons. We didn't defeat the US
Re: (Score:2)