Chinese hackers poised for anti-CNN attack over the weekend
Fireworks should start early Friday evening on the East Coast
Computerworld Australia - Chinese hackers appear to be readying for an attack on the West scheduled for April 19. The basis of the attack appears to be the recent, and very public, pro-Tibet coverage in Western media organizations.
A Chinese site called Anti-CNN is setting out to counteract what it claims are the lies and distortion present in Western news coverage of stories concerning China and Chinese national interests. It is calling for street protests in Germany, France, the Netherlands, and the United Kingdom on April 19 (Beijing local time; early evening Friday on the East Coast, or close-of-business on the West).
So far it is nothing more than Anonymous has done in its efforts to protest against Scientology, but nationalistic Chinese hackers have issued a call for a distributed denial of service attack against CNN to coincide with the street protests.
While there is no apparent link between Anti-CNN and the hackers calling for the denial-of-service attack, the team at The Dark Visitor, who have been tracking Chinese hacking activity for some time, believe that it may be members of the Red Hacker Alliance that are pushing for the online attack to accompany the physical demonstrations.
According to Scott Henderson, administrator for The Dark Visitor, members of The Red Alliance have traditionally required very little in terms of direct motivation to launch politically motivated attacks against external sites. The Dark Visitor researchers have associated politically motivated attacks from this group against sites in the United States, Japan, Taiwan, and Indonesia.
With increasing public argument in the West about how to approach attendance at the Olympic Games being held in Beijing in August, and with continued coverage of social and political unrest in sensitive Chinese territories, more and more Western sites are going to gain the attention of China-based hacking groups like the Red Hacker Alliance.
As the Estonia attacks from 2007 demonstrated, it doesn't take many people to carry out a crippling attack against Internet infrastructure or sites.
There will be a number of interested observers watching on April 19, to see whether The Red Alliance have the capability to back up the claims they are making -- and what sort of effect they are actually going to have against a high-traffic media site.
April 19 update: You know the expression "No one goes to that clue anymore, it's too crowded?" Well, funny thing about the CNN attack...
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts