. Military Space News .
Criminals Winning The Cyberwar On The Desktop Battlefield

China downplays 'cyber attack' on French embassy website
China downplayed Thursday an alleged cyber attack on the website of the French Embassy in Beijing, saying there was no clear link between the shutdown and a diplomatic row with France over Tibet. "From the perspective of the Chinese government, China is against the hacking of the websites of the embassies of other nations," foreign ministry spokesman Liu Jianchao told journalists. "We have not seen any questions or concerns raised by France." However a French diplomat told AFP the embassy website had been inaccessible for several days due to a massive cyber attack following President Nicolas Sarkozy's weekend meeting with exiled Tibetan spiritual leader the Dalai Lama. "The server was attacked for several days, saturated by massive requests for a connection, mostly coming at night," the diplomat said on condition of anonymity. Some French media reports have said Sarkozy's meeting with the Dalai Lama, which greatly angered Beijing, was the motive behind the attacks. "We have taken note of relevant reports, but from the reports I have seen this is speculation," Liu said. "When reporting or covering this issue, the media should base their reports on solid proof and not target China." China accuses the Dalai Lama of seeking independence for his homeland -- despite his repeated denials -- and views it as a national affront when foreign leaders meet him. China has ruled Tibet since 1951, after sending in troops to "liberate" the Himalayan region the previous year.
by Shaun Waterman
Washington (UPI) Dec 11, 2008
Software giant Microsoft is advising users of its Internet Explorer browser to turn their security settings to the highest levels to guard against a newly discovered flaw that enables hackers to take over the computer of anyone visiting a compromised Web site.

Such "drive-by downloads" are especially dangerous because malicious software is loaded as soon as the victim computer arrives at the site, without the user having to take any additional action, such as clicking on a pop-up window. Hackers can even load exploits into fake banner advertisements on innocent Web sites, if they can get access to the server that hosts them.

A security advisory from Microsoft said its researchers were "actively investigating the vulnerability," which had not been widely exploited by hackers so far. "On completion of this investigation, Microsoft will take the appropriate action to protect our customers."

"At this time, we are aware only of limited attacks that attempt to use this vulnerability," reads the advisory, adding that "they are not successful against customers who have applied the workarounds listed."

Customers are warned to turn the security-level setting on Internet Explorer to high, or to take other actions to prevent Explorer running Web scripts automatically. Such scripts animate banner ads or other moving pictures and interactive features, and disabling them interferes with viewing and using sites that use them.

"Setting the level to high may cause some Web sites to work incorrectly," notes the Microsoft advisory.

Millions of users of Internet Explorer, including those working for Fortune 500 companies and the U.S. government, are vulnerable to attack by hackers exploiting the vulnerability, which, depending on the way the exploit software is written, can download a variety of malicious payloads on to the affected computer.

Trojan attacks like those enabled by this latest vulnerability are a major way that home and corporate or government computers are recruited into so-called bot-nets, or robot networks of slave computers that, unbeknownst to their users, are being used to send spam or take part in cyberattacks.

Trojans also can be used to steal logins and passwords, and that was what the small number of exploits seen so far are designed to do.

Internet security intelligence research outfit iDefense said the vulnerability was accidentally disclosed by a Chinese security research firm called Knownsec. The firm disclosed the leak in a Chinese-language Web posting earlier this month. The posting said the researcher responsible wrongly believed the vulnerability had already been patched by Microsoft. Patches are updates to software that are automatically distributed by vendors to all their customers, who can then download and install them to protect their computers from the latest known threats.

Newly discovered security flaws like the one acknowledged Wednesday by Microsoft are called Zero-Day vulnerabilities and are especially prized by hackers, because even a fully patched system can be infected by a malicious software package.

iDefense said after this vulnerability leaked, it was sold for about $15,000 and then used to create a Trojan horse malicious software program designed to steal the logins and passwords of Chinese war-gamers playing in online virtual worlds like World of Warcraft.

"The four versions of the exploit we've seen so far are designed to steal Chinese gamer credentials," said Richard Howard, iDefense director of intelligence, "but the exploit is so juicy, we expect to see it spread fast."

He said the workarounds advised by Microsoft were effective against the versions seen so far, but there are ways of exploiting the new vulnerability that would not be prevented by blocking scripts.

"This is going to be a lasting threat until Microsoft gets it patched," he said. "Home users could switch to alternate browsers and be safe," he said. But corporate or government users would "have a harder time with that," at least "in the short term."

Non-Microsoft Web browsers like Firefox, Opera or Safari are considered to be more secure by some experts, if only because so much more malicious software is written to exploit Internet Explorer, which dominates the browser market.

Microsoft spokesman Christopher Budd said in a statement that, if necessary, the company would issue a special "out of cycle" patch for the vulnerability, "depending on customer needs." Generally Microsoft issues updates to all its software on the second Tuesday of every month, but periodically the company issues special patches, usually to deal with a newly discovered flaw like this one.

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Obama urged to create White House office for cyberspace
Washington (AFP) Dec 8, 2008
Cybersecurity is a major national security threat and US president-elect Barack Obama should create an office in the White House to deal with the problem, a high-level panel of experts said on Monday.







  • Russian warship leaves Panama after historic visit
  • Defense Focus: Panama mission Part One
  • Walker's World: The ally India needs
  • Commentary: Global rainmaker

  • US to 'rethink' NKorea strategy: White House
  • No progress in six party talks on NKorea: Hill
  • NKorea talks look at new Chinese proposal
  • India, Pakistan nukes secure: Pentagon

  • Six killed in suspected US missile strike in Pakistan: official
  • NLOS-LS Team Completes Second Guided Test Flight Of PAM
  • US Navy Tests Seven Raytheon Standard Missile-2 Block IIIAs During Trials
  • Iran tests medium-range missile in naval war games

  • Lessons From The Russian Bulava Missile Submarine Program Part Two
  • US, Russia to discuss missile shield in Moscow next week
  • Lessons The Russian Bulava Missile submarine Program Part One
  • Raytheon praises EKV performance in test

  • Climate protesters cause chaos at British airport
  • Thompson Files: Protect U.S. aerospace
  • NASA studies pilot cognition
  • China postpones talks with Airbus: spokesman

  • Navy Targets Unmanned Aircraft
  • Successful Autoland Of The F-16 Fighting Falcon
  • Army To Equip National Guard Unit With FCS Aerial Robots
  • Thales WATCHKEEPER Successfully Passes First System Flight Trial

  • Iranian support for Iraq insurgency appears to wane: US general
  • US to begin transfer of Iraqi prisoners on Feb 1
  • Iraq Places Major Order With US For Military Equipment
  • Will The Iraq Doctrine Fuel The Next War Part Two

  • Virtual Training For Real-World Missions
  • US Top Brass Fed Up With F-22 Problems
  • Paving The Way: The Latest Weapon Against The Taliban
  • Thompson Files: Danger faces Navy's net

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement