Difference between revisions of "Malware Probes Find A China Angle"

From nmnwiki
Jump to navigation Jump to search
m
m
Line 1: Line 1:
id="article-body" class="row" section="article-body"><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>China is coming under scrutiny as the possible source of malicious software and Internet attacks directed at foreign governments and other institutions.<br><br><br>A pair of recent research reports have cast some light on shadowy online initiatives with roots in China. Completed separately, both reports--"Tracking GhostNet," from the [ Munk Centre for International Studies in Toronto], and "The snooping dragon," from the University of Cambridge Computer Laboratory--address the Chinese government's efforts to monitor [https://www.kynghidongduong.vn/tours/du-lich-trung-quoc-gia-re/ tour trung quoc] the activities of the Dalai Lama and the governing of Tibet.<br> <br><br><br><br><br>Asked about the reports, analysts in China say that such claims are exaggerated and politically motivated, [ according to CNN].<br><br><br><br>Meanwhile, Vietnamese security firm BKIS says it has come across clues suggesting that the Conficker worm, which is supposed to start communicating with computers on April 1, [/news/conficker-worm-might-originate-in-china/ may have Chinese origins]. BKIS reported Monday that it spotted similarities between Conficker's code and that of the 2001 Nimda virus, though in both cases the findings are not at all definitive.<br><br><br><br>In "[ Tracking GhostNet: Investigating a Cyber Espionage Network]," issued over the weekend, the Canadian researchers say that the GhostNet comprises 1,295 infected computers in 103 countries, almost one third of them being "high-value targets, including ministries of foreign affairs, [ embassies], international organizations, news media, and NGOs." <br><br><br><br>Despite going into great detail about how the GhostNet operates, and acknowledging the Chinese government's interest in the strategic exploitation of cyberspace, the Munk Centre researchers stop short of pointing fingers directly at a perpetrator:<br><br><br><br><br><br>The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, [https://www.kynghidongduong.vn/tours/du-lich-trung-quoc-gia-re/ tour trung quốc] including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.<br><br><br><br>The breaches tended to stem from a so-called social-engineering exploit, [https://www.kynghidongduong.vn/tours/du-lich-trung-quoc-gia-re/ kynghidongduong.vn] in which targets in the Tibetan community were sent an e-mail that appeared to be from the address campaigns@freetibet.org and that carried an attached Word document titled "Translation of Freedom Movement ID Book for Tibetans in Exile"--and that Word document was infected with the malicious code. <br><br><br><br>The compromise of targeted systems could be substantial:<br><br><br><br><br><br>The  system directs infected computers to download a Trojan known as gh0st RAT that allows attackers to gain complete, real-time control. These instances of gh0st RAT are consistently controlled from commercial Internet access accounts located on the island of Hainan, People's Republic of China.<br><br><br>Our investigation reveals that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras.<br><br><br><br><br>About 70 percent of the control servers behind the attack had Internet Protocol addresses assigned to China, but researchers also found such servers in the U.S., Sweden, South Korea, and Taiwan. Of the nearly 1,300 infected computers, Taiwan had the most, followed by the U.S., Vietnam, and India.<br><br><br><br><br><br>Given that China has the world's largest Internet population, the researchers say, "the sheer number of young digital natives online can more than account for the increase in Chinese malware. With more creative people using computers, it's expected that China (and Chinese individuals) will account for a larger proportion of cybercrime."<br><br><br><br>And while the Tibetan computer [https://knoji.com/search/?query=systems systems] were "conclusively compromised," the report says, "it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value."<br><br><br><br>The University of Cambridge report, "[ The snooping dragon: social-malware surveillance of the Tibetan movement]," doesn't refrain from charging that the Chinese government was directing malware attacks: "(I)t was a targeted surveillance attack designed to collect actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed." <br><br><br><br>Both reports also addressed the broader implications of the practices and behaviors observed in the Tibet-related malware efforts, and warn of the need for increased vigilance by both IT professionals and everyday computer users. As in many other breaches, from the [/news/melissa-virus-turns-10/ Melissa virus] 10 years ago to the Conficker worm today, breaches succeeded in part because people using the computer systems failed to take precautions when surfing the Web or opening e-mail messages.<br><br><br><br>The costs could be significant, according to the Cambridge University report:<br><br><br><br><br><br>As social-malware attacks spread, they are bound to target people such as accounts-payable and payroll staff who use computers to make payments. Prevention will be hard. The traditional defence against social malware in government agencies involves expensive and intrusive measures that range from mandatory access controls to tiresome operational security procedures. These will not be sustainable in the economy as a whole. Evolving practical low-cost defences against social-malware attacks will be a real challenge.<br><br><br><br>See also:<br><br><br><br><br>• [/news/conficker-worm-might-originate-in-china/ Conficker worm might originate in China]<br><br><br>• [/news/60-minutes-whats-next-for-the-conficker-worm/ '60 Minutes': What's next for Conficker worm?]<br><br><br>• [/news/u-k-parliament-computers-get-confickered/ U.K. parliament computers get Confickered]<br><br><br>• [ ]<br><br><br>• [/news/melissa-virus-turns-10/ Melissa virus turns 10]<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>[#comments  Comments]<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>[/topics/security/  Notification on Notification off Security]
+
id="article-body" class="row" section="article-body"><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>China is coming under scrutiny as the possible source of malicious software and Internet attacks directed at foreign governments and other institutions.<br><br><br>A pair of recent research reports have cast some light on shadowy online initiatives with roots in China. Completed separately, both reports--"Tracking GhostNet," from the [ Munk Centre for International Studies in Toronto], and "The snooping dragon," from the University of Cambridge Computer Laboratory--address the Chinese government's efforts to monitor the activities of the Dalai Lama and the governing of Tibet.<br> <br><br><br><br><br>Asked about the reports, analysts in China say that such claims are exaggerated and politically motivated, [ according to CNN].<br><br><br><br>Meanwhile, Vietnamese security firm BKIS says it has come across clues suggesting that the Conficker worm, which is supposed to start communicating with computers on April 1, [/news/conficker-worm-might-originate-in-china/ may have Chinese origins]. BKIS reported Monday that it spotted similarities between Conficker's code and that of the 2001 Nimda virus, though in both cases the findings are not at all definitive.<br><br><br><br>In "[ Tracking GhostNet: Investigating a Cyber Espionage Network]," issued over the weekend, the Canadian researchers say that the GhostNet comprises 1,295 infected computers in 103 countries, [https://www.kynghidongduong.vn/tours/du-lich-trung-quoc-gia-re/ kynghidongduong.vn] almost one third of them being "high-value targets, including ministries of foreign affairs, [ embassies], international organizations, news media, and NGOs." <br><br><br><br>Despite going into great detail about how the GhostNet operates, [https://www.kynghidongduong.vn/tours/du-lich-trung-quoc-gia-re/ tour trung quốc] and acknowledging the Chinese government's interest in the strategic exploitation of cyberspace, the Munk Centre researchers stop short of pointing fingers directly at a perpetrator:<br><br><br><br><br><br>The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.<br><br><br><br>The breaches tended to stem from a so-called social-engineering exploit, in which targets in the Tibetan community were sent an e-mail that appeared to be from the address campaigns@freetibet.org and that carried an attached Word document titled "Translation of Freedom Movement ID Book for Tibetans in Exile"--and that Word document was infected with the malicious code. <br><br><br><br>The compromise of targeted systems could be substantial:<br><br><br><br><br><br>The  system directs infected computers to download a Trojan known as gh0st RAT that allows attackers to gain complete, real-time control. These instances of gh0st RAT are consistently controlled from commercial Internet access accounts located on the island of Hainan, People's Republic of China.<br><br><br>Our investigation reveals that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras.<br><br><br><br><br>About 70 percent of the control servers behind the attack had Internet Protocol addresses assigned to China, but researchers also found such servers in the U.S., Sweden, South Korea, and Taiwan. Of the nearly 1,300 infected computers, Taiwan had the most, followed by the U.S., Vietnam, and India.<br><br><br><br><br><br>Given that China has the world's largest Internet population, the [http://data.gov.uk/data/search?q=researchers researchers] say, "the sheer number of young digital natives online can more than account for the increase in Chinese malware. With more creative people using computers, it's expected that China (and Chinese individuals) will account for a larger proportion of cybercrime."<br><br><br><br>And while the Tibetan computer systems were "conclusively compromised," the report says, "it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value."<br><br><br><br>The University of Cambridge report, "[ The snooping dragon: social-malware surveillance of the Tibetan movement]," doesn't refrain from charging that the Chinese government was directing malware attacks: "(I)t was a targeted surveillance attack designed to collect actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed." <br><br><br><br>Both reports also addressed the broader implications of the practices and behaviors observed in the Tibet-related malware efforts, and warn of the need for increased vigilance by both IT professionals and everyday computer users. As in many other breaches, from the [/news/melissa-virus-turns-10/ Melissa virus] 10 years ago to the Conficker worm today, breaches succeeded in part because people using the computer systems failed to take precautions when surfing the Web or opening e-mail messages.<br><br><br><br>The costs could be significant, according to the Cambridge University report:<br><br><br><br><br><br>As social-malware attacks spread, they are bound to target people such as accounts-payable and payroll staff who use computers to make payments. Prevention will be hard. The traditional defence against social malware in government agencies involves expensive and intrusive measures that range from mandatory access controls to tiresome operational security procedures. These will not be sustainable in the economy as a whole. Evolving practical low-cost defences against social-malware attacks will be a real challenge.<br><br><br><br>See also:<br><br><br><br><br>• [/news/conficker-worm-might-originate-in-china/ Conficker worm might originate in China]<br><br><br>• [/news/60-minutes-whats-next-for-the-conficker-worm/ '60 Minutes': What's next for Conficker worm?]<br><br><br>• [/news/u-k-parliament-computers-get-confickered/ U.K. parliament computers get Confickered]<br><br><br>• [ ]<br><br><br>• [/news/melissa-virus-turns-10/ Melissa virus turns 10]<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>[#comments  Comments]<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>[/topics/security/  Notification on Notification off Security]

Revision as of 12:35, 31 December 2020

id="article-body" class="row" section="article-body">




















China is coming under scrutiny as the possible source of malicious software and Internet attacks directed at foreign governments and other institutions.


A pair of recent research reports have cast some light on shadowy online initiatives with roots in China. Completed separately, both reports--"Tracking GhostNet," from the [ Munk Centre for International Studies in Toronto], and "The snooping dragon," from the University of Cambridge Computer Laboratory--address the Chinese government's efforts to monitor the activities of the Dalai Lama and the governing of Tibet.





Asked about the reports, analysts in China say that such claims are exaggerated and politically motivated, [ according to CNN].



Meanwhile, Vietnamese security firm BKIS says it has come across clues suggesting that the Conficker worm, which is supposed to start communicating with computers on April 1, [/news/conficker-worm-might-originate-in-china/ may have Chinese origins]. BKIS reported Monday that it spotted similarities between Conficker's code and that of the 2001 Nimda virus, though in both cases the findings are not at all definitive.



In "[ Tracking GhostNet: Investigating a Cyber Espionage Network]," issued over the weekend, the Canadian researchers say that the GhostNet comprises 1,295 infected computers in 103 countries, kynghidongduong.vn almost one third of them being "high-value targets, including ministries of foreign affairs, [ embassies], international organizations, news media, and NGOs."



Despite going into great detail about how the GhostNet operates, tour trung quốc and acknowledging the Chinese government's interest in the strategic exploitation of cyberspace, the Munk Centre researchers stop short of pointing fingers directly at a perpetrator:





The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.



The breaches tended to stem from a so-called social-engineering exploit, in which targets in the Tibetan community were sent an e-mail that appeared to be from the address campaigns@freetibet.org and that carried an attached Word document titled "Translation of Freedom Movement ID Book for Tibetans in Exile"--and that Word document was infected with the malicious code.



The compromise of targeted systems could be substantial:





The system directs infected computers to download a Trojan known as gh0st RAT that allows attackers to gain complete, real-time control. These instances of gh0st RAT are consistently controlled from commercial Internet access accounts located on the island of Hainan, People's Republic of China.


Our investigation reveals that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras.




About 70 percent of the control servers behind the attack had Internet Protocol addresses assigned to China, but researchers also found such servers in the U.S., Sweden, South Korea, and Taiwan. Of the nearly 1,300 infected computers, Taiwan had the most, followed by the U.S., Vietnam, and India.





Given that China has the world's largest Internet population, the researchers say, "the sheer number of young digital natives online can more than account for the increase in Chinese malware. With more creative people using computers, it's expected that China (and Chinese individuals) will account for a larger proportion of cybercrime."



And while the Tibetan computer systems were "conclusively compromised," the report says, "it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value."



The University of Cambridge report, "[ The snooping dragon: social-malware surveillance of the Tibetan movement]," doesn't refrain from charging that the Chinese government was directing malware attacks: "(I)t was a targeted surveillance attack designed to collect actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed."



Both reports also addressed the broader implications of the practices and behaviors observed in the Tibet-related malware efforts, and warn of the need for increased vigilance by both IT professionals and everyday computer users. As in many other breaches, from the [/news/melissa-virus-turns-10/ Melissa virus] 10 years ago to the Conficker worm today, breaches succeeded in part because people using the computer systems failed to take precautions when surfing the Web or opening e-mail messages.



The costs could be significant, according to the Cambridge University report:





As social-malware attacks spread, they are bound to target people such as accounts-payable and payroll staff who use computers to make payments. Prevention will be hard. The traditional defence against social malware in government agencies involves expensive and intrusive measures that range from mandatory access controls to tiresome operational security procedures. These will not be sustainable in the economy as a whole. Evolving practical low-cost defences against social-malware attacks will be a real challenge.



See also:




• [/news/conficker-worm-might-originate-in-china/ Conficker worm might originate in China]


• [/news/60-minutes-whats-next-for-the-conficker-worm/ '60 Minutes': What's next for Conficker worm?]


• [/news/u-k-parliament-computers-get-confickered/ U.K. parliament computers get Confickered]


• [ ]


• [/news/melissa-virus-turns-10/ Melissa virus turns 10]























[#comments Comments]















[/topics/security/ Notification on Notification off Security]