Chinese hackers said to have accessed law enforcement targets
Cyber marauders sought more than just information on activists -- they wanted access to FBI, DOJ investigations on spies in the U.S.
CSO - In January 2010, Google shocked the cyber world by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China's People Liberation Army.
"[We] have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists," Google Senior Vice President and Chief Legal Officer David Drummond wrote in blog post at the time.
Now, more that three years after that posting on what came to be known as Operation Aurora, it appears that the cyber marauders were after more than just information on activists. They were also after information on investigations on Chinese spies in the United States being conducted by the FBI and U.S. Department of Justice.
The Aurora hackers gained access on Google's servers to a database that contained information on U.S. surveillance targets, the Washington Post reported on Monday, citing former and current government officials as sources for the story.
Such information would be invaluable to China because it would allow its intelligence operatives to destroy information before counter intelligence agents got their hands on it and allow the spies to evade capture and prosecution.
The database included years of surveillance information, including thousands of court orders issued to law enforcement officials around the nation seeking to monitor suspects' email, as well as classified orders targeting foreign subjects and issued under the Foreign Intelligence Surveillance Act.
The incident set off a tiff between Google, the DOJ and FBI, the Post reported, because the federal agencies wanted to access the company's technical logs and other information about the breach to assess the potential damage done to its counter espionage efforts.
Google representative Jay Nancarrow said in an email that the company is not commenting on the matter at this time.
Google wasn't a lone target in Operation Aurora. More than 20 companies were attacked, including Adobe Systems, Juniper Networks, Rackspace, Yahoo, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical.
Last month, a Microsoft executive said that the Aurora bandits had also breached his company's servers snooping for accounts it had lawful wiretap orders on. Since that time, the executive has recanted those remarks.
"I was referring to statements in the media from the January 2010 timeframe," Dave Aucsmith, senior director for Microsoft's Institute for Advanced Technology, said in a statement.
"My comments were not meant to cite any specific Microsoft analysis or findings about motive or attacks, but I recognize that my language was imprecise," he added.
Matt Thomlinson, Microsoft's general manager for trustworthy computing and security added in an email, "The so-called 'Aurora' attacks did not breach the MS network."
The Chinese government has denied being behind Aurora. It has noted that cyber attacks and espionage are against Chinese law and has done all it can to combat such online activities.
While an attack on the database is feasible, because of the breadth of Aurora, it's unlikely it was a specific target, reasoned Jeffrey Carr, CEO of Taia Global and author of "Inside Cyber Warfare: Mapping the Cyber Underworld."
"Google was only one of 20-plus companies attacked at the same time by the same group," he said in an interview. "So I would be surprised if the database was the objective of the attack. It was likely a crime of opportunity."
It's also an object lesson for organizations dealing with cloud storage that's operated by a third party, added Alan Brill, senior managing director for Kroll Advisory Solutions.
"There's more trust being given to cloud services than some of them deserve," he said in an interview. "It has become so easy [to store data somewhere else] that you might store something somewhere without thinking whether or not you really ought to do that."
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts