How to protect ourselves from Chinese cyberwarriors

Users are the first line of defense, and might have stopped the attack. Technology could have done more, if companies had it.

Better user education might have played a role in stopping the apparent Chinese cyberattack on American businesses. Once targeted employees clicked on a link in an e-mail or instant message, however, most current security technology was defenseless.

"Companies are not prepared for nation-states attacking them in cyberspace," said Dimitri Alperovitch, Vice President of Threat Research at McAfee, Inc.

The U.S. today said it will file a formal protest with the Chinese government over the alledged attacks.

At the time I spoke to him late yesterday, Alperovitch said he had not "had any sleep in 48-hours" while working as part of his company's team responding to the incident.

"It was an incredibly sophisticated attack," Alperovitch said, cautioning that it had still not been positively confirmed as having originated from China, as Google has alleged and is widely believed.

Government and certain contractors have previously been subject to such attacks--and have protected themselves against them--most businesses lack such sophisticated protecton.

While refusing to name or even offer a number--Google says 20--of companies involved, Alpervoitch said all were large businesses whose names would be immediately familiar to most readers.

Most of the companies did not know they'd been attacked until they received a call from someone involved in the response to it.

While much of the news coverage has focused on attempts to hack the Gmail accounts of Chinese human rights activists, most of the attacks were industrial espionage, aimed at gathering valuable intellectual property from the targeted companies.

"A tremendous amount of work was done (by the attackers) in advance," Alperovitch said, citing the targeting of specific individuals, the discovery of a previously unknown method of compromising Internet Explorer, the development of program code for the exploit, and the effort made to prevent discovery of the attack and cover its tracks.

The attack began when targeted employees received an e-mail or instant message that, when clicked, delivered malware to the user's machine. Had the users not clicked the links, the attack would have been stopped.

The basic advice: If you are not 100 percent sure, don't click, seems to apply.

However, if the adversary is able to learn enough about specifically targeted individuals, it is possible to create a phishing link that would be very difficult for the targeted user to identify or software to block.

"Not a single security vendor had anything on it," Alperovitch said.

Previously-used technologies are defenseless. Those that rely on various types of signatures or databases only work for attacks that are widely distributed. Sophisticated attacks, such as this incident, may never be seen "in the wild" and find their way into traditional anti-malware applications.

(Now that the Chinese attack has been discovered, its signature has been added to commercial anti-malware applications and Microsoft is preparing a protective patch for Internet Explorer. Of course, the damage is already done and the original attacker is unlikely to use the same specific method again).

In order to prevent future attacks, businesses need to adopt security technology that looks for the telltale signs that sophisticated malware presents.

McAfee and other vendors have developed such technology for government and high-security customers. In this case, it would have looked at the file being downloaded and noticed, among other things, what its authors had done to obfuscate its true purpose.

Prevented from running, code would have been rendered harmless and administrators warned of the attempted attack.

This technology has only recently become available to commerical customers, Alperovitch said.

It is probably true that attackers--if they are well-motivated and well-funded, as state-sponsored attacks would likely be--will always have a bit of the upper hand over defenders.

If there is a bright side to this current incident, it is that we've been alerted to a real and present danger and that protective steps are available.

Our willingness and ability to invest in them remains to be seen.

David Coursey has been writing about technology products and companies for more than 25 years. He tweets as @techinciter and may be contacted via his Web site.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags businessGoogleChina

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

David Coursey

PC World (US online)
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?