Google warns Gmail users of 'state-sponsored' hacks
Alerts when it suspects government-backed account or malware attacks
Computerworld - Google began warning users today of its Gmail online email services when it suspects they may be targets of "state-sponsored" attacks.
It was the second time in the last two weeks that Google has deployed security-related alerts to a small fraction of those who use its services.
But the company was coy about how it knows whether a specific individual has been targeted by attacks paid for or designed by governments.
"You might ask how we know this activity is state-sponsored," said Eric Grosse, Google's vice president of security engineering, in a Tuesday blog. "We can't go into the details without giving away information that would be helpful to these bad actors."
The new warning states: "We believe state-sponsored attackers may be attempting to compromise your account or computer." It will appear at the top of the Gmail page if the user has logged in with his or her Google account. The message is not limited to those who use Google's own Chrome, but will pop up in any browser.
Grosse was equally vague about what might trigger the alert.
"It does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account," he said.
But it seems Google knows, or thinks it knows, a state-sponsored attack when it sees one.
"Our detailed analysis -- as well as victim reports -- strongly suggest the involvement of states or groups that are state-sponsored," Grosse claimed.
Google is in a better position than most to know.
More than two years ago Google was one of several Western companies victimized by Chinese hackers -- a rumpus that led it to relocate its search servers to Hong Kong -- and the company has cleaned up several large-scale phishing and hacking campaigns directed against Gmail users, including one in 2011 that targeted senior U.S. government officials and another later that year that affected hundreds of thousands of Iranian users.
Google has displayed similar warnings before today's.
Two weeks ago, for example, Google began alerting users whose Windows PCs or Macs remain infected with the DNSChanger malware. Those users face the loss of their link to the Internet on July 9, when authorities switch off substitute DNS (domain name system) servers that took the place of criminal-controlled machines shut down last year.
In July 2011, Google also warned customers whose systems were infected with fake antivirus software, or "scareware." In that instance, Google became suspicious when it uncovered "unusual search traffic" while doing maintenance at one of its data centers.
- DOJ's charges against China reframe security, surveillance debate
- Hacker indictments against China's military unlikely to change anything
- U.S. to formally accuse Chinese military of hacking
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts