McAfee Disclaims Claims of Chinese Involvement in 'Shady RAT' 56
hackingbear writes "In an interview with Chinese official Xinhua news agency, McAfee said no direct evidence suggests a particular nation such as China is behind Operation Shady RAT, a five-year cyber campaign discovered by McAfee. Alperovitch told Xinhua that they 'don't have direct evidence that conclusively points to a particular nation state' behind the scheme. So the same online security industry that has propagated Chinese cyber threats in front of Western media denies they made such suggestion of China, another of their major markets." Also on the Shady RAT front, reader kermidge writes with a post from Hon Lau at Symantec containing details lacking in McAfee's Wednesday report; included are examples of the vectors and commands used, along with cogent commentary.
Of Course Not (Score:1)
"don't have direct evidence that conclusively points to a particular nation state" behind the scheme
If all IP's point back to one country that country either is the victim of being a patsy "They must have routed all their traffic trough our unsuspecting country. We were set up! Those bastards!!" or they they did it. Do we think any country is going to admit it even if they are caught red handed? Of course not.
plausible deniability (Score:2)
Re: (Score:2)
As an aside, anytime I set a box in the DMZ and review access logs, the majority of IPs attempting access are from CN. Which tells me there are LOTS of pwned boxes in CN...or...they're up to something.
I vote for the latter. Just sayin'...
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:3)
well, if you were doing shit like that on a payroll and had five years for it.. you could just setup some patsy proxies back and forth and preferably with countries which don't get along with each other.. kinda hard for them then to co-operate simultaneously to expose the whole chain, even if they wanted, and the police officials in each of those countries don't know if they want to co-operate or not as they don't know if it's approved or not operation.
Comment removed (Score:4, Insightful)
Re: (Score:2)
The problem with your theory is this: You don't blame the US government when old Spam King pounds the living shit out of FB do you?
The key difference here is that you know that it was the spam king because there was a public prosecution for the spamming. Show clear evidence of even an investigation by the Chinese authorities in cooperation with the companies making the reports and you would have a very clear point. China is not a country like Sudan where there is no effective government. They are fully capable of launching detailed police investigations into hacking if they wish to.
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
"don't have direct evidence that conclusively points to a particular nation state" behind the scheme
If all IP's point back to one country that country either is the victim of being a patsy "They must have routed all their traffic trough our unsuspecting country. We were set up! Those bastards!!" or they they did it. Do we think any country is going to admit it even if they are caught red handed? Of course not.
Ooooh we might piss off our creditor.
Fear (Score:2, Insightful)
Re: (Score:2, Interesting)
Some of the companies and agencies are well aware of the damage that can be done by disclosure of this. Never mind that the F35 plans have been stolen and that other intellectual property has been taken. The theft reported here and others are condoned, possibly sponsored and maybe directly involved by China. That's not a scare tactic, it's a fact. China doesn't have to have direct involvement in this matter. They can provide technology, access and foster the culture that allows this to continue. There
Re: (Score:2)
Fair trade should be fostered but not at the expense of your own country both in terms of it's economic viability but its social structure as well.
I think that's the wrong attitude. If fair trade is fostered then that's fine. If the other country does better out of it then that's just spreading the wealth about fairly. The problem is that currently the trade is not fair. There must be equivalent or better situations in terms of environmental conditions, working conditions, and freedom. Those are reasonable things to insist on for fair trade. In the meantime, you can't insist on a set of IP laws which let the US use all of China's inventions fo
Re: (Score:2)
There must be equivalent or better situations in terms of environmental conditions, working conditions, and freedom.
I could not agree more. I am against tariffs as a protectionist measure; however, I think that a $$$ tariff on worker's rights, environmental conditions and other such things would do a lot to stabalise the current race-to-the-bottom that has gutted the US manufacturing industry.
So... you want to pay your workers 10c per day? Fine, we will slap a tariff on that assume they got $8 per hour.
The only problem with such a measure, is that it would become highly political, and thus butchered so that it doe
Why is this supposed to be a government attack? (Score:5, Interesting)
Reading the details I really wonder why this is supposed to be a government-backed up attack. Neither the trojan nor the attack vector described by the guy from Symantec look very sophisticated to me. From a government-sponsored attack I'd at least expect some previously unknown exploits, rootkit, traffic tunneling, anti-virus product circumvention and generally more efforts to hide that there is a trojan or an outgoing connection.
There must be something missing. So, what's so special about this particular persistent attack?
It certainly could be (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Hardly any of the trojans used by Chinese APT actors are sophisticated at all. All these sophisticated features you listed are fine if you're only looking to launch a single-purpose attack, like a Stuxnet. The Chinese APT actors want to maintain a long-term presence even after they are discovered on the network.
As the sophistication of the malware rises, so does the cost/time involved, so it limits how many trojans you can deploy at once. Once your super-sophisticated trojan with rootkit, traffic tunneling,
Re: (Score:2)
Reading the details I really wonder why this is supposed to be a government-backed up attack. Neither the trojan nor the attack vector described by the guy from Symantec look very sophisticated to me. From a government-sponsored attack I'd at least expect some previously unknown exploits, rootkit, traffic tunneling, anti-virus product circumvention and generally more efforts to hide that there is a trojan or an outgoing connection.
There must be something missing. So, what's so special about this particular persistent attack?
Obviously, you've been missing the point of government deals. case in point: security of several us governmental organizations websites, emails etc(proven last time by todays release from anon), quality of governmental contractors in general. you really think China has it any better?
Not contradictory (Score:3)
Not having read the original report nor the full interview transcript (neither of which seem like reliable sources), I don't see anything contradictory. Combine the quotes and it's still perfectly reasonable:
This is why... (Score:5, Insightful)
You should never get your security analyses from the same people who sell security products.
It's like asking a car dealer how expensive a car you need.
Re: (Score:3)
In my original post [slashdot.org], I raise the question that this is not a cyberwar but a marketing campaign aim to grab money from taxpayers around the world. Yet such important points are edited out by /.
Re: (Score:3)
...from the same people who sell security products.
McAfee sells security products?
It's the "Chinese official Xinhua news agency" (Score:1)
Re: (Score:1)
Shady RAT Checker (Score:1)
Am I Under a Shady RAT attack? http://www.shadyratchecker.com/ [shadyratchecker.com]
Re: (Score:2)
More info on "Shady Rat" (Score:2)
Remember, FWIW, "china has a massive botnet"... (Score:2)
(05:13:21 PM) bradass87: oh, btw... china has a massive botnet .mil info... as well as penetrate google (like what became public earlier this year) .gov and .mil
(05:13:31 PM) bradass87: 45+ million, grows 100,000 every two weeks
(05:14:44 PM) bradass87: it pings eucom and pacom servers every two weeks at the same time... spread out slightly to prevent the bandwidth from being detected (it was identified at 20 million in late 2008)
(05:15:53 PM) bradass87: 45+ million ip addresses... i figure they must have a pre-installed system on consumer electronics
(05:20:00 PM) bradass87: are you familiar with the Byzantine problem sets?
(05:22:15 PM) info@adrianlamo.com: nope
(05:23:10 PM) bradass87: Byzantine is the code word for all the chinese infiltration problem sets... the ones that get
(05:23:16 PM) bradass87: yahoo, etc
(05:23:23 PM) bradass87: mostly
(05:23:46 PM) bradass87: there are several sub-problem sets...
(05:24:15 PM) bradass87: Byzantine Candor, for instance
(05:24:51 PM) bradass87: its what 95% of information warfare people work on in DoD
(05:25:15 PM) bradass87: china can knock out any network in the world with a DDos
(05:36:07 PM) bradass87: their gateways throughout the world are clearly identified, and are being tracked carefully
"No direct evidence" HA (Score:2)
There was no direct evidence that Google was functioning as a pawn in US foreign policy regarding China, but that didn't stop Xinhua from alluding to the allegations (that came from their political superiors).
http://news.xinhuanet.com/english2010/sci/2010-01/24/c_13148771.htm [xinhuanet.com]
Maybe Xinhua isn't the best source for a neutral perspective.
So... (Score:1)
No news here.
Kiss it some more to keep it Walmart cheep. (Score:1)
how to lower your stock price in a day (Score:2)
Wow, i am sure the share holders are happy to hear that McAfee's credibility went out the window when they contradicted themselves from a previous report. Now, I can never fully trust what they say, as I see, they are either wrong...and dont know what they are doing, or are quick to contradict themselves, when the payday is big enough.