Thursday, August 23, 2012

China Blamed For cyber attacks


Google was recently attacked and scope of the attack information including financial and technology companies, defense contractors, and even human rights activists. The cyber attack led to the fall of the Internet giant and China. Cyber ​​attacks proved to be a ploy to steal secrets from dozens of companies. The attack was launched especially sophisticated. Security researchers for the case cyber attack indicated that the extent and scope of the attacks, which consequently also the target for the computers of Chinese dissidents, reveal that they were apparently initiated by the Chinese State.

Some of the victims in cyber attack include chemical giant Dow Chemical and defense company Northrop Grumman. Both companies have refused to release any statement on the matter. In addition to these two companies, Adobe and Juniper Networks was also included in the destination list.

The evidence shows that hackers have taken advantage of Microsoft's Internet Explorer to hack into systems. Presumably, your web browser has unknown vulnerability. Web browser software can take on individual computers in the enterprise. Once the hackers gained access to the remote personal computer, have tried to download computer code, the data of intellectual property as well as business secrets of others.

McAfee, the Internet security company, said the attack occurred during December 15 and January 4. During these periods, the security operations of the company were very weak. Furthermore, the level of knowledge and sophistication demonstrated by the hack is comparable to that of experts at a level of nation-state.

In another statement, Google has revealed that hackers from China stole the intellectual property and gained access to the Gmail account a number of defenders of human rights. Companies that have been subject to cyber attack that still refused to disclose any information or involvement in the incident said. Most companies fear that their reputation will get corrupted and that it will only encourage similar acts.

Initially, hackers have sent e-mail and instant tempted and attracted staff. Once you click on the link or the site is visited, at that time that hackers have begun their attack. The malware downloaded in the process is able to install a backdoor. This gave the hackers ideas on how to initiate the reaction.

In order to mislead investigators, information extracted hack sent to different servers in Taiwan and Illinois. Investigation also revealed that the servers managed by a San Antonio web-hosting companies have been used to transmit stolen data. China, in the midst of all the allegations has denied all claims .......

No comments:

Post a Comment