iTnews

Insider reveals details of Google hacks

By David Neal on Apr 21, 2010 5:59AM
Insider reveals details of Google hacks

Attackers compromised Gaia password system.

The hacking attacks on Google earlier this year were much worse than previously believed, according to a report in The New York Times.

The paper quotes "someone with direct knowledge of the investigation" as saying that the hackers managed to steal Google's Gaia password system, described as one of the company's "crown jewels".

The system controls access to all Google log-in accounts, including webmail and the firm's business applications.

It was previously believed that the hackers took individual log-in details but, if the report is true, the breach was considerably more severe.

Google is notoriously secretive about Gaia and rarely discusses it in public, which may provide a clue as to why the company has been so tight-lipped about the incident.

The insider also told The New York Times about the methods used to gain access to Google's systems.

"The theft began with an instant message sent to a Google employee in China who was using Microsoft's Messenger program," he is quoted as saying.

"By clicking on a link and connecting to a 'poisoned' web site, the employee inadvertently permitted the intruders to gain access to his (or her) personal computer, and then to the computers of a critical group of software developers at Google's headquarters.

"Ultimately, the intruders were able to gain control of a software repository used by the development team."

The hackers then transferred the stolen code to computers operated by web hosting firm Rackspace, from where they were sent to an unknown destination.

Google appeared at first to be open about the attacks, and blogged about them almost immediately, but has not yet responded to a request for comment on the fresh claims.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
accessgaiagaingooglegoogleshackerssecuritysoftware

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By David Neal
Apr 21 2010
5:59AM
0 Comments

Related Articles

  • 5 essential digital transformation ideas
  • Top 5 Benefits of Managed IT Services
  • 'Single account' compromise led to Microsoft's Lapsus$ code leak
  • Any Android security app is better than Google Play Protect
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.