Google warns Gmail users of 'state-sponsored' hacks
Alerts when it suspects government-backed account or malware attacks
Computerworld - Google began warning users today of its Gmail online email services when it suspects they may be targets of "state-sponsored" attacks.
It was the second time in the last two weeks that Google has deployed security-related alerts to a small fraction of those who use its services.
But the company was coy about how it knows whether a specific individual has been targeted by attacks paid for or designed by governments.
"You might ask how we know this activity is state-sponsored," said Eric Grosse, Google's vice president of security engineering, in a Tuesday blog. "We can't go into the details without giving away information that would be helpful to these bad actors."
The new warning states: "We believe state-sponsored attackers may be attempting to compromise your account or computer." It will appear at the top of the Gmail page if the user has logged in with his or her Google account. The message is not limited to those who use Google's own Chrome, but will pop up in any browser.
Grosse was equally vague about what might trigger the alert.
"It does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account," he said.
But it seems Google knows, or thinks it knows, a state-sponsored attack when it sees one.
"Our detailed analysis -- as well as victim reports -- strongly suggest the involvement of states or groups that are state-sponsored," Grosse claimed.
Google is in a better position than most to know.
More than two years ago Google was one of several Western companies victimized by Chinese hackers -- a rumpus that led it to relocate its search servers to Hong Kong -- and the company has cleaned up several large-scale phishing and hacking campaigns directed against Gmail users, including one in 2011 that targeted senior U.S. government officials and another later that year that affected hundreds of thousands of Iranian users.
Google has displayed similar warnings before today's.
Two weeks ago, for example, Google began alerting users whose Windows PCs or Macs remain infected with the DNSChanger malware. Those users face the loss of their link to the Internet on July 9, when authorities switch off substitute DNS (domain name system) servers that took the place of criminal-controlled machines shut down last year.
In July 2011, Google also warned customers whose systems were infected with fake antivirus software, or "scareware." In that instance, Google became suspicious when it uncovered "unusual search traffic" while doing maintenance at one of its data centers.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts