backtop


Print 36 comment(s) - last by phxfreddy.. on Mar 30 at 7:59 PM

Who could be behind the wave of online attacks that have the internet community seeing red?

A series of online strikes has been carried out in the last few months on several high profile international targets.  Among those targets are the Falun Gong and pro-Tibetan liberation organizations.  Also targeted is the Save Dafur campaign. 

As Sherlocke Holmes might say, "The game is afoot!"

The Internet Storm Center, an news organization focusing on online threats, announced this week, "On Friday we reported on targeted attacks against various pro-Tibet non-governmental organizations (NGO) and communities, as well as Falun Gong and the Uyghurs."

One technique that is being used to attack these organizations is a fake memo with a malicious attachment.  This memo claims to have a human rights report about Tibet attached.  Analysts state that the memo uses several key social engineering tricks to lull the readers into a false sense of security.  Among these are the use of pertinent language in the memo and official looking numbers and titles. 

Even trickier, the attachment is actually two files -- a legitimate flier for a real life book on the state of Tibet and a separate malicious trojan binary. 

Eight types of trojans have been employed by the attackers, including the well known Enfal, Riler and Protux attacks.  While some machines are merely crippled, others are maintained and controlled through remote access using the Gh0st RAT tool.  The majority of control servers were identified to be on Chinese netblocks.  However some originated from the U.S., South Korea and Taiwan.

Tibet has been under Chinese rule since military occupation in 1951.  The Falun Gong claims its a spiritual organization focusing on meditation, boasting as many as 70 million members in China.  The organization has been labelled as a cult by China.  China regularly breaks up its public practices and jails its leaders.

The Save Darfur group has been under heavy attack from hackers.  The FBI is currently investigating these attacks, which they say may have a possible Chinese connection.  The Save Darfur campaign is a rather altruistic-spirited, nonprofit group whose well-intentioned goal is to bring attention to the ongoing genocide in western Darfur region of Sudan. 

Allyn Brooks-LaSure, a spokesman with the group, says the group contacted the FBI after someone last week gained unauthorized access to its email and web servers. While Brooks-LaSure is certain the identity of the attackers, he did note that the IP addresses of the hackers were located in China.  He states, "Someone in Beijing is trying to send us a message."

The hackers appeared to have focused primarily on gathering data on the group.  Save Darfur has been trying to convince China to pressure Sudan, one of its largest trading partners, into stopping the bloodshed.  Experts warn that while the attacks appear to have originated in China, they may merely have been routed through China.

Groups affiliated with the Save Darfur group have also been hit.  Among the attacks they have noticed are emails with malicious attachments, very similar to those used against the Tibetan organizations.  FBI Spokeswoman Debbie Weierman confirmed that the FBI was investigating, stating that they were "looking into the matter."

With the latest rash of attacks, one is left to wonder -- who might want to attack Save Darfur, pro-Tibetan liberation and the Falun Gong?  Is this just an innocent set of unrelated attacks, or perhaps is it, along with other attacks in past months, the sign of a growing online military campaign?


Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: It has to be...
By Marvlarv on 3/27/2008 9:36:41 AM , Rating: 2
quote:
by TITAN1080 on March 26, 2008 at 11:50 AM
Either:

A. Someone in China

B. CIA

C. Disgruntled country that lost olympics bid

D. A Neocon organization wanting to get the next resource war going



E. Skynet


"Intel is investing heavily (think gazillions of dollars and bazillions of engineering man hours) in resources to create an Intel host controllers spec in order to speed time to market of the USB 3.0 technology." -- Intel blogger Nick Knupffer

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki