Monday, March 30, 2009

Tibetans in exile want to better protect against data espionage.

The more sensitive the information that is exchanged, the more important is a good protection for the computer. Like the Tibetans in exile after the attack by a hacker network, upgrade its technology. U.S. authorities meanwhile shroud is about possible damage in silence.

 

According to hacker attacks on computers of the Dalai Lama to the Tibetans in exile will lead to better protect against data espionage. We will now try the system safer, said the spokesman of the Tibetan government in exile, Thubten Samphel, the news agency AFP, "but we have limited funds available."


AP
Dalai Lama: The computers of the Tibetan religious leader and his followers will finally be safe


On the weekend had become known that an espionage network for two years by the computer authorities and private citizens has ausgespäht worldwide, including computers of the Dalai Lama in India, Brussels, London and New York. A total of about 1300 computers in 113 countries affected, up to one third of them were high-ranking foreign targets such as ministries, embassies and non-governmental organizations, said the experts.

The investigation of the Munk Center for International Studies at the University of Toronto had worried members of the Tibetan government in exile ordered. The experts then searched for specific malicious software on potentially vulnerable computers, provided it finds that the many computers were infected, so that hackers gain access to confidential information could provide. A spokesman for the Chinese Embassy in London did the report from Canada, however, as part of a propaganda campaign.

ON THE INTERNET

"The dragon sniffing ': Cyber espionage trial of the Computer Laboratory, University of Cambridge

"Tracking Ghostnet": Report on Chinese cyber espionage Information Warfare Monitor

blogs ONLINE is not responsible for the content of external internet sites.

While the experts as GhostNet (ghost net) described the attacker network located in China. That the government in Beijing after the hacker attack is, however, was from the available information can not be deduced. Roger Faligot other hand, a French writer and expert on the Chinese secret service, said to AFP, the technical details showed the participation of the Chinese state.

On the list of infected computers are among others the German Embassy in Australia. The local authorities have as yet no estimate concerning the extent to which Germany or German missions abroad by GhostNet activities could be affected. A spokeswoman for the Constitution of Budesamt (BFV), at the request of the AP only, the case confirms previous suspicions. Specific details would not make it until the investigation from Toronto is not known in detail. The relevant question for the Foreign Office has not yet spoken to the study.

After publication of the Constitutional by the end of 2008 on espionage, Germany is among others due to its role in the EU and NATO is an important target for the intelligence services of some states. "The main carrier of espionage activities", the Russian Federation, said the report - and also the People's Republic of China.


Old-fashioned hacker


For their espionage attacks seem to be the unknown hacker is not a particularly sophisticated methods used to have. "This is technology at the level of a decade ago," said the IT security expert Christoph Fischer dpa. The spies were presumably through a vulnerability in the PDF format documents into the foreign computer intrusion.

They would have Trojans on infected e-mails introduced and given access to the computers provide. The most effective tool is "the art of social engineering," said Fischer. This manipulation of the persons referred to them specifically to certain acts or, for example, for release of information to move. The fact that the attackers stimulus-specific terms in the subject line would be the e-mail attachments have been involuntarily clicked. "The trick is, with the subject line does not generate distrust."

No comments:

Post a Comment