e-magazine
Quake Shocks Sichuan
Nation demonstrates progress in dealing with severe disaster
Current Issue
· Table of Contents
· Editor's Desk
· Previous Issues
· Subscribe to Mag
Subscribe Now >>
Expert's View
World
Nation
Business
Finance
Market Watch
Legal-Ease
North American Report
Forum
Government Documents
Expat's Eye
Health
Science/Technology
Lifestyle
Books
Movies
Backgrounders
Special
Photo Gallery
Blogs
Reader's Service
Learning with
'Beijing Review'
E-mail us
RSS Feeds
PDF Edition
Web-magazine
Reader's Letters
Make Beijing Review your homepage
Hot Links

cheap eyeglasses
Market Avenue
eBeijing

The Latest Headlines
The Latest Headlines
UPDATED: August 6, 2010
Hackers Use Chinese IPs to Launch Attacks
Internet security threats are on the rise
Share

Although cyber attacks have been frequently reported across the mainland, China is not home to a vast web of malicious hackers, as many attacks here originate from countries overseas, according to analysts.

"It is very complicated to locate an original attack", said a participant at the 9th Xcon conference, an annual gathering of senior cyber security analysts in Beijing.

Internet security threats are on the rise and public awareness of hacking has increased.

In 2009, for example, 75 percent of global companies experienced severe cyber attacks totaling individual losses of at least $2 million, according to Symantec's 2010 report.

Complicating matters for the Chinese government, there have been fervent claims by websites and search engines worldwidefrom Google to Optus to the official website of the Republic of Koreathat they have been victimized by Chinese attackers.

The conference participant, also a consultant for a renowned international software company, added that overseas hackers link to computers in China so their victims believe they were attacked from China.

"For example, there might be a hacker in America, he might attack a computer in China first and then use the Chinese IP to attack a computer in Australia and so on", the consultant said.

This is now common knowledge among those in cyber security circles, he added, although the wider public remains largely unaware of it.

Attackers can drop attack packets from fake IPs to make themselves untraceable, or to find "fryers" as springboards with which to exert long-range control.

A "fryer" is a computer with security leaks that is already under a hacker's control, usually through a back door. In short, using "fryers" to attack is like using guns registered under another person's name before squeezing the trigger.

This kind of attack is usually called Distributed Denial of Service (DDOS), "pretty simple technically, with attack tools already made and put out there", the consultant said.

No advanced techniques are needed to conduct DDOS attacks, "as long as you have enough money to buy lots of fryers and control them", said Sun Bing, a Beijing-based information security researcher who also attended the conference.

According to Chinese National Computer Network Emergency Response Technical Team, over 1 million Chinese IPs were under overseas control in 2009.

In January, Google announced that it would quit the mainland market, citing cyber attacks as one of the main reasons to "review the feasibility" of business operations.

(China Daily August 6, 2010)

 



 
Top Story
-Too Much Money?
-Special Coverage: Economic Shift Underway
-Quake Shocks Sichuan
-Special Coverage: 7.0-Magnitude Earthquake Hits Sichuan
-A New Crop of Farmers
Most Popular
在线翻译
About BEIJINGREVIEW | About beijingreview.com | Rss Feeds | Contact us | Advertising | Subscribe & Service | Make Beijing Review your homepage
Copyright Beijing Review All right reserved