How to protect ourselves from Chinese cyberwarriors

Users are the first line of defense, and might have stopped the attack. Technology could have done more, if companies had it.

Better user education might have played a role in stopping the apparent Chinese cyberattack on American businesses. Once targeted employees clicked on a link in an e-mail or instant message, however, most current security technology was defenseless.

"Companies are not prepared for nation-states attacking them in cyberspace," said Dimitri Alperovitch, Vice President of Threat Research at McAfee, Inc.

The U.S. today said it will file a formal protest with the Chinese government over the alledged attacks.

At the time I spoke to him late yesterday, Alperovitch said he had not "had any sleep in 48-hours" while working as part of his company's team responding to the incident.

"It was an incredibly sophisticated attack," Alperovitch said, cautioning that it had still not been positively confirmed as having originated from China, as Google has alleged and is widely believed.

Government and certain contractors have previously been subject to such attacks--and have protected themselves against them--most businesses lack such sophisticated protecton.

While refusing to name or even offer a number--Google says 20--of companies involved, Alpervoitch said all were large businesses whose names would be immediately familiar to most readers.

Most of the companies did not know they'd been attacked until they received a call from someone involved in the response to it.

While much of the news coverage has focused on attempts to hack the Gmail accounts of Chinese human rights activists, most of the attacks were industrial espionage, aimed at gathering valuable intellectual property from the targeted companies.

"A tremendous amount of work was done (by the attackers) in advance," Alperovitch said, citing the targeting of specific individuals, the discovery of a previously unknown method of compromising Internet Explorer, the development of program code for the exploit, and the effort made to prevent discovery of the attack and cover its tracks.

The attack began when targeted employees received an e-mail or instant message that, when clicked, delivered malware to the user's machine. Had the users not clicked the links, the attack would have been stopped.

The basic advice: If you are not 100 percent sure, don't click, seems to apply.

However, if the adversary is able to learn enough about specifically targeted individuals, it is possible to create a phishing link that would be very difficult for the targeted user to identify or software to block.

"Not a single security vendor had anything on it," Alperovitch said.

Previously-used technologies are defenseless. Those that rely on various types of signatures or databases only work for attacks that are widely distributed. Sophisticated attacks, such as this incident, may never be seen "in the wild" and find their way into traditional anti-malware applications.

(Now that the Chinese attack has been discovered, its signature has been added to commercial anti-malware applications and Microsoft is preparing a protective patch for Internet Explorer. Of course, the damage is already done and the original attacker is unlikely to use the same specific method again).

In order to prevent future attacks, businesses need to adopt security technology that looks for the telltale signs that sophisticated malware presents.

McAfee and other vendors have developed such technology for government and high-security customers. In this case, it would have looked at the file being downloaded and noticed, among other things, what its authors had done to obfuscate its true purpose.

Prevented from running, code would have been rendered harmless and administrators warned of the attempted attack.

This technology has only recently become available to commerical customers, Alperovitch said.

It is probably true that attackers--if they are well-motivated and well-funded, as state-sponsored attacks would likely be--will always have a bit of the upper hand over defenders.

If there is a bright side to this current incident, it is that we've been alerted to a real and present danger and that protective steps are available.

Our willingness and ability to invest in them remains to be seen.

David Coursey has been writing about technology products and companies for more than 25 years. He tweets as @techinciter and may be contacted via his Web site.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags GooglesecurityChinabusiness

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

David Coursey

PC World (US online)

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?