Google, China and Anti-Features

Yet again, people are seeking technological solutions to problems that are social in nature.
So far, Internet activist Perry Barlow’s affirmation that ‘the Internet treats censorship as damage and routes around it’ remains true. But with the increasingly evident willingness of corporate and government agents to create and use what MIT researcher Benjamin Hill terms ‘anti-features’, we may soon find that there’s nowhere else to route to.

[Originally published in the Vanuatu Daily Post.]

On the 12th of January, David Drummond, Google’s Chief Legal Officer, made a startling announcement: Google – and dozens of other companies operating in China – had been the target of concerted online attacks originating from China. Google also claimed that the attackers, targeting human rights activists inside China and around the world, used the activists’ own PCs to take over numerous GMail accounts.

These attacks used ‘0-day’ exploits, hitherto-unknown vulnerabilities in common software applications. In a Wired Magazine interview, security analyst Ryan Olson stated that the code itself was unremarkable, but that ‘the sophistication here is all about the fact they were able to target the right people using a previously unknown vulnerability.

Businesses and governments face online acts of vandalism and attempts at corporate espionage all the time. Even this attack, which exploited flaws in Microsoft’s Internet Explorer and Adobe’s Acrobat reader software, was ‘not ground-breaking’, according to security expert Mikko Hypponen.

We see this fairly regularly,’ he told the BBC, but ‘most companies just never go public.

Running against tide of companies flooding into China, Google has retaliated against these intrusions by stating that they will no longer censor google.cn, their Chinese search site. If that can’t be done within Chinese law, wrote Drummond, it ‘may well mean having to shut down google.cn, and potentially our offices in China.

Read more “Google, China and Anti-Features”

Gooooolag

UPDATE: How wrong could I be about the severity of this threat? Very wrong, apparently. I haven’t confirmed it yet, but it’s hard to imagine how this week’s mass server hack could have happened without tools like the one described below. I’ll write more about this in this week’s column….


Heh, cute:

Cult of the Dead Cow Announces Goolag Vulnerability Search Engine.goooooolagOnce you get past the Chinese porn silliness, there’s a real story here:

Google’s effectiveness as a search engine also makes it an effective… well, search engine. Common website weaknesses are exposed by search engines such as Google, and anyone can access them by using specially crafted queries that take advantage of Google’s advanced searching capabilities. As the cDc press release indicates, there are approximately 1500 such searches published and readily accessible on the Internet. And now the cDc has built a(n a)cutely satirical web front end and are offering a downloadable desktop search application for Windows, giving script kiddies the world over something else to do with their time.

What effect has this had on website security? It’s difficult to tell. The principle of using Google as a scanning tool has been common knowledge since at least 2006, but according to Zone-H, who record large numbers of website defacements every year, the only significant increase in website attacks since then was the result of an online gang war between various Russian criminal factions, back in 2006. Ignoring that anomalous rise in activity, the rate of attack actually fell slightly in 2007 compared to recent years, relative to the number of active websites.

Zone-H’s latest report proves only that the percentage of insecurely configured websites scales on a roughly linear basis with the number of available websites, and that the choice of technology has almost no bearing on the likelihood of a successful attack. Indeed, most exploits are simple attacks on inherent weaknesses: guessing admin passwords or copying them when they’re sent in cleartext, misconfigured shares and unsafe, unpatched applications. Attacks requiring any amount of individual effort are not very common at all. Man-in-the-middle attacks rated only fifth place in the list of common exploits, representing only 12% of that total. But researchers have elsewhere noted that cross-site-scripting attacks are on the rise, and are being used mostly by spammers to increase the size of their bot nets.

The lesson here is fairly obvious: Making simple mistakes is the easiest way to expose yourself to attack. And search tools like Goolag make finding those mistakes remarkably easy. You won’t be targeted so much as stumbled across. Given the recent rise in the number of websites being used to inject malicious software into people’s computers, spammers and other online criminals appear to have a strong incentive to use even the less popular websites to ply their trade.

Your choice of technology won’t save you, either. Most popular web servers are fairly secure these days and though not all server operating systems are created equal, the big ones have improved markedly. But the same cannot be said of the applications and frameworks that run on them. The old adage that ease of use is universal still applies. When you make things easy for yourself and your users, you are liable to make things easy for other, less welcome guests as well.

The lesson for the average website owner: Do the simple things well. Don’t waste your time trying to imagine how some intrepid cyber-ninja is going to magically fly across your digital alligator moat. Just make sure your systems are well-chosen and properly patched, pay attention to access control and treat authentication seriously. Statistically, at least, this will drop your chances of being Pwned to nearly nil, or close enough as makes no never mind.