China Exploits Internet Users as Weapon in CyberwarAdded: Wednesday, April 22nd, 2015
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2015
The “Great Cannon of China” is now a widespread term online, which has entered the lexicon of many people after the industry experts gave such a name to a new tool for Chinese censorship.
This tool was first noticed in use a couple weeks ago, when the coding site GitHub was flooded by traffic and as a result went offline for several days. This attack used a method known as “distributed denial of service” or DDoS and targeted Chinese anti-censorship outfits.
The researchers who noticed the attack came to a conclusion that it provided evidence of a new censorship tool used by Chinese government. They suggested that the cyber attack infrastructure was co-located with the “Great Firewall of China”, but carried out by a separate offensive system, so they decided to call it the “Great Cannon”. This instrument hijacks traffic to or from specific IP addresses, and is able to arbitrarily replace unencrypted content as a man-in-the-middle.
If used offensively, this new tool could turn ordinary and unsuspecting Internet users into a vector of attack. In that particular case, the Great Cannon of China appeared to intercept traffic sent to Baidu (largest search engine in the country) infrastructure servers. It turned out that in 1.75% cases it took that traffic and returned a malicious script, thus unwittingly enlisting the Internet user in the hacking campaign. Even this 1.75% of users managed to take GitHub down.
The researchers believe that the Chinese authorities operate the Great Cannon, as well as the Great Firewall, because both systems seem to be hosted on the same servers and share source code to intercept communications. This new weapon of cyberwar proved “exceptionally costly” to its targets, but can potentially be able to make even more damage. The researchers explained that technically simple change in its configuration could let it target specific individuals even if they didn’t reside in the country, as well as intercept their communications.
However, it is unclear why the Great Cannon of China was first deployed in such a publicly visible fashion, because this could set a dangerous precedent – this move was contrary to international norms and violated widespread domestic laws that prohibit the unauthorized use of computing and networked systems.Posted by: Date:
Wednesday, April 22nd, 2015
|So what is different from a 14 year old doing it to Steve Gibson many years ago and where lies the proof that it was not the work of an adolescent copying the exploit why must such be the work of the Chinese government,it seems quite arbitrary that anything done from within China is automatically blamed on the powers that be and seen as an act of aggression whereas it is much more likely to be someone clever with an axe to grind or even a foreign power who`s own designs for the Internet and its control are less than friendly.|
|In order to speak of why china would do that first you need to ask. why would they not do it. as i have lived in china for the past 2 years i have seen things that the Chinese people have done and i just have to say to myself "welcome to china" i cant understand it nor do i want to at times. China is great place to live/visit but to a "LAOWI" (foreigner) we will never understand some of the things they do here in china. not saying they did it or didn't do it. but they 100% do have the power to do something like this if they wanted to in my eyes.|
|exactly the point @2 they have the ability to do it and so much more but they would not do so quite so publicly and from one of their own servers,much more likely it is something thought up by dissidents or even foreign powers as we all are aware a 14 year old can steal an earthlink from a public library and DDOS steve [email protected] it would be a simple matter for such to be done in China or from anywhere in the world since most use windows and we all know they are open to Microsoft whether you want them in your box or not.I don`t dispute they may have been naughty in the past and they have certainly been accused of much and generally by the Americans ,but not everything is always as it seems and if we have learned anything in the past 12 or so years it`s that America has raised more red flags than China in relation to other countries mostly to cover their own naughtiness on the Internet or to make people fearful and use that fear to take control by use of laws (Patriot act,etc)and in giving further excuses to make incursions into countries they have no say in controlling,such as WMD`s in Iraq or to take metadata from foriegn nationals and to spy on their own countrymen as well as others in their global partnerships with paid off or controlled politicians like Tony Blair and David Cameron.||
Most Popular Stories