Â
Toronto / Cambridge - It all started when employees of the Dalai Lama asked whether she was bugged or their e-mails would be intercepted. Cause for concern had the emailed invitation to a meeting with the Tibetan religious leader to one where diplomats. The Tibetans want a call back up, but the political opponent was faster: When the staff of the Dalai Lama durchkamen, Chinese unknown caller had already been there before possible diplomatic consequences of a meeting warned. The suspect was so close: As someone read the e-mail traffic with.
REUTERS
Dragon: The mythical beast in China is a lucky symbol. "The dragon sniffing," is the title of a study on cyber-espionage, on the other hand, had bad luck: He was caught
Technically, it's no problem. One must assume that the global flow of electronic communications of a number of nations the legal authority or simply illegal eavesdropping is that e-mail filters, according to specific keywords are searched. Unencrypted e-mails are comparable with postcards: Who gets into the hand, it can also read.
E-communication is insecure
This is in international communications traffic mostly illegal, but is still widely done. Embarrassingly had become known at the beginning of the millennium as the EcholoN project of Americans, Britons and others who are also its European allies ausspionierten extensively and thus obtained their knowledge in proven cases, businesses were given to those advantages over EU company. Electronic Industrial espionage is everyday, e-mail monitoring as a tool of terror prevention legitimized in the West disseminated.
Unusually, however, is the extent of espionage attacks on the Canadian and British researchers at the Information Warfare Monitor encountered as they began the attacks on suspected espionage Tibetan organizations to investigate. Because they were not only successful, but - as are two reports published on the Sunday shows - even on the computers of government authorities, ministries, embassies and NGOs from 103 countries. Because the "Ghostnet" as the researchers spy-hacker baptized, heard not only lines, but infiltrated computer with all sorts of harmful and sniffer programs that the current repertoire made.
Burglary by Hack
Thus the IT experts of the largest ever publicly made espionage action with sniffer programs, phishing attacks and e-mail attachments introduced backdoor programs came on the track. Thousands, partly as a measure secret documents had been stolen, including from the offices of the Dalai Lama. Introduced were sniffing programs preferably by e-mail, masked as a helper applications or factual communication.
Ten months, the researchers needed by the SecDev Group, the University of Toronto and Cambridge University for their inventory. At the end were cracked in 1295, partly foreign-controlled computers, among others in the foreign ministries of Iran, the Philippines, from Bangladesh, Indonesia, Latvia and others. Infiltrated computers were also in embassies, including India, South Korea, Pakistan, Thailand and Taiwan, but also from Romania, Portugal, Cyprus, Malta - and Germany.
ON THE INTERNET
"The dragon sniffing ': Cyber espionage trial of the Computer Laboratory, University of Cambridge
"Tracking Ghostnet": Report on Chinese cyber espionage Information Warfare Monitor
blogs ONLINE is not responsible for the content of external internet sites.
Whoever since sniffs, did it wherever he could. An analysis of IT professionals do not identify the author of the attacks - they just make it clear where they came from: The hacks, spam waves, targeted phishing attacks and viruses sent waves were therefore "almost exclusively from computers in China" from. An entanglement of the Chinese government could not prove, however, reported the New York Times on Sunday.
The studies of researchers from the Munk Center for International Studies at the University of Toronto and from the computer laboratory at the University of Cambridge have now been made public and can be downloaded (see link at the top left box).
No comments:
Post a Comment