Chinese school linked to Google attacks also linked to '01 attacks on White House site
A former U.S. Army officer linked '01 hacker to Shanghai Jiaotong University
Computerworld - One of two Chinese academic institutions identified in a New York Times report Thursday as the apparent source of the recent attacks against Google, has also been linked to a hacker who may have been involved with the takedown of whitehouse.gov in 2001.
The Times yesterday reported that the recent cyberattacks against Google and more than 30 other organizations appeared to have originated from computers at two schools in China. One of the schools was identified as the Shanghai Jiaotong University; the other, as the Lanxiang Vocational School, an academic institution in China's Shandong Province with apparent ties to the country's military.
A U.S. military contractor attacked in the same manner as Google, has even pointed investigators to a specific computer science class taught by a Ukrainian professor at the vocational school as one source of the attacks, the Times said.
The newspaper, quoting unnamed investigative sources, said the attacks on Google and more than 30 other technology companies appear to have begun in April -- much earlier than previously believed. If evidence of the schools' involvement bears out, it could cast doubt on the assumption that the Chinese government or military was directly involved in the attacks, the Times said.
The Shanghai Jiantong University is one of China's top academic institutions. Earlier this month, it won an international collegiate programming contest sponsored by IBM. The competition, entitled "Battle of the Brains," pitted students from 103 of the world's top universities in a software design challenge. As winners of the competition, students from Shanghai Jiantong University have a guaranteed offer of employment or internship with IBM, according to a statement from the company.
Jiantong University officials, speaking with the Times said they had not heard about the Google attacks being traced back to their computers but indicated a willingness to investigate. A professor at the school didn't rule out the possibility that the attacks came from the school, but said they might simply have been someone "experimenting with their hacking skills."
While the cyberattacks remain under investigation, Shanghai Jiaotong University has been linked with at least one leading Chinese hacker in recent years.
Scott Henderson, a former U.S. Army Intelligence officer who has written a book on Chinese hackers called Dark Visitor, has identified Peng Yinan as a one-time student at the school. Yinan is believed to have been involved in a series of DDoS attacks against whitehouse.gov nine years ago. That is the site for the White House.
According to Henderson's blog, Yinan used the online handles Coolswallow and Ericool and was a fairly active political hactivist during the spat between the U.S and Chinese governments in 2001 following a collision between a U.S. reconnaissance aircraft and a Chinese fighter jet.
Web giants attacked
- White House orders security review in wake of WikiLeaks disclosure
- Leaked U.S. document links China to Google attack
- Update: Researchers track cyber-espionage ring to China
- Google, China now playing cat and mouse?
- McAfee: 'Amateur' malware not used in Google attacks
- Military warns of 'increasingly active' cyber-threat from China
- China: Google 'totally wrong' to stop censoring
- Update: Google stops censoring in China
- Google's China ad partners wait in 'incomparable pain'
- Google may soon leave China, reports say
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts