Google hackers wanted intel on Chinese spook monitoring

Powered by SC Magazine
 

US intel sought.

Attackers who raided Google in 2010 to learn information about Chinese human rights activists also sought insight on which Chinese intelligence agents were on the radar of US authorities.

The intruders spearheaded the so-called Aurora attacks that breached more than 30 firms using weaponised PDFs. Meanwhile they accessed a Google database which contained data about court orders that authorised surveillance of certain individuals, the Washington Post reported quoting unnamed US officials.

Among the most sensitive data accessed were court orders, issued under the Foreign Intelligence Surveillance Act (FISA), which allowed the Government to access electronic data, like Gmail accounts, related to foreign or terrorist threats.

Recent comments from a Microsoft executive appeared to further corroborate these details. Last month, Dave Aucsmith, senior director for Microsoft's Institute for Advanced Technology, reportedly said the Aurora campaign's mission was to uncover court orders revealing US law enforcement surveillance efforts.

Aucsmith since clarified his remarks to SC.

“What I should have said was, ‘According to what I've read concerning the so-called Aurora attack…industry investigators found that the point of entry was a backdoor access system created by Google in order to comply with government search warrants on user data'.”  

“My comments were not meant to cite any specific Microsoft analysis or findings about motive or attacks, but I recognise that my language was imprecise,” he said.

Google declined comment to SC, and the FBI has not immediately responded.

Meanwhile, a cyber espionage group believed to be based in China has resumed operations. On Sunday, the New York Times reported that the Chinese military hacking unit behind the theft of hundreds of terabytes of information from scores of organisations, many in the United States, had resumed its operations.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Google hackers wanted intel on Chinese spook monitoring
 
 
 
Top Stories
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
A ten-point plan for disrupting security
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1043

Vote