Chinese school linked to Google attacks also linked to '01 attacks on White House site
A former U.S. Army officer linked '01 hacker to Shanghai Jiaotong University
Computerworld - One of two Chinese academic institutions identified in a New York Times report Thursday as the apparent source of the recent attacks against Google, has also been linked to a hacker who may have been involved with the takedown of whitehouse.gov in 2001.
The Times yesterday reported that the recent cyberattacks against Google and more than 30 other organizations appeared to have originated from computers at two schools in China. One of the schools was identified as the Shanghai Jiaotong University; the other, as the Lanxiang Vocational School, an academic institution in China's Shandong Province with apparent ties to the country's military.
A U.S. military contractor attacked in the same manner as Google, has even pointed investigators to a specific computer science class taught by a Ukrainian professor at the vocational school as one source of the attacks, the Times said.
The newspaper, quoting unnamed investigative sources, said the attacks on Google and more than 30 other technology companies appear to have begun in April -- much earlier than previously believed. If evidence of the schools' involvement bears out, it could cast doubt on the assumption that the Chinese government or military was directly involved in the attacks, the Times said.
The Shanghai Jiantong University is one of China's top academic institutions. Earlier this month, it won an international collegiate programming contest sponsored by IBM. The competition, entitled "Battle of the Brains," pitted students from 103 of the world's top universities in a software design challenge. As winners of the competition, students from Shanghai Jiantong University have a guaranteed offer of employment or internship with IBM, according to a statement from the company.
Jiantong University officials, speaking with the Times said they had not heard about the Google attacks being traced back to their computers but indicated a willingness to investigate. A professor at the school didn't rule out the possibility that the attacks came from the school, but said they might simply have been someone "experimenting with their hacking skills."
While the cyberattacks remain under investigation, Shanghai Jiaotong University has been linked with at least one leading Chinese hacker in recent years.
Scott Henderson, a former U.S. Army Intelligence officer who has written a book on Chinese hackers called Dark Visitor, has identified Peng Yinan as a one-time student at the school. Yinan is believed to have been involved in a series of DDoS attacks against whitehouse.gov nine years ago. That is the site for the White House.
According to Henderson's blog, Yinan used the online handles Coolswallow and Ericool and was a fairly active political hactivist during the spat between the U.S and Chinese governments in 2001 following a collision between a U.S. reconnaissance aircraft and a Chinese fighter jet.
Web giants attacked
- White House orders security review in wake of WikiLeaks disclosure
- Leaked U.S. document links China to Google attack
- Update: Researchers track cyber-espionage ring to China
- Google, China now playing cat and mouse?
- McAfee: 'Amateur' malware not used in Google attacks
- Military warns of 'increasingly active' cyber-threat from China
- China: Google 'totally wrong' to stop censoring
- Update: Google stops censoring in China
- Google's China ad partners wait in 'incomparable pain'
- Google may soon leave China, reports say
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts