Chinese authorities compromise millions in cyberattacks

On March 17th 2015, our websites and partner websites came under a DDoS attack. We had never been subjected to an attack of this magnitude before. This attack was unusual in nature as we discovered that the Chinese authorities were steering millions of unsuspecting internet users worldwide to launch the attack. We believe this is a major cyber-security and economic threat for the people of China.

How did that get there?

After calling on the Internet community for help and assistance, independent researchers with access to our log files discovered the following facts:

  • Millions of global internet users, visiting thousands of websites hosted inside and outside China, were randomly receiving malicious code which was used to launch cyberattacks against GreatFire.org’s websites.

  • Baidu's Analytics code (h.js) was one of the files replaced by malicious code which triggered the attacks. Baidu Analytics, akin to Google Analytics, is used by thousands of websites. Any visitor to any website using Baidu Analytics or other Baidu resources would have been exposed to the malicious code. A list of Baidu resources known to be used for the attack appears in the report.

  • That malicious code is sent to “any reader globally” without distinguishing that user’s geographical location, meaning that the authorities did not just launch this attack using Chinese internet users -  they compromised internet users and websites everywhere in the world.

  • The tampering takes places someplace between when the traffic enters China and when it hits Baidu’s servers. This is consistent with previous malicious actions and points to the Cyberspace Administration of China (CAC) being directly involved in these attacks.

More technical details of the attack can be read in a research report titled “Using Baidu to steer millions of computers to launch denial of service attacks”.

GitHub Suffers DDoS Attack

On March 25 the Chinese authorities used the same techniques to launch a DDoS attack on GitHub - our page was one of the main targets. To mitigate the DDoS attack, we mirrored content on our GitHub repository and asked users to access that page directly. The attackers then switched their attack to our GitHub page.

GitHub stated:

We are currently experiencing the largest DDoS (distributed denial of service) attack in github.com's history. The attack began around 2AM UTC on Thursday, March 26, and involves a wide combination of attack vectors. These include every vector we've seen in previous attacks as well as some sophisticated new techniques that use the web browsers of unsuspecting, uninvolved people to flood github.com with high levels of traffic. Based on reports we've received, we believe the intent of this attack is to convince us to remove a specific class of content.

We believe that “a specific class of content” refers to GreatFire.org’s GitHub page. To combat the DDoS attack from malicious JS code injected by CAC, GitHub modified https://github.com/greatfire/ to show a message to users: "WARNING: malicious javascript detected on this domain".

The URL to access our GitHub page ( https://github.com/greatfire/) is hard coded into the malicious JS. Our page is still accessible and only users who have been exposed to the malicious code will see the warning pop up message while browsing other websites. The GitHub attack is still ongoing and the malicious JS is still being injected for approximately 1% of foreign visitors to websites that are using elements from Baidu.

 

The Implications

When we first blogged about this attack we did not want to level accusations without evidence. Based on the technical forensic evidence provided above and the detailed research that has been done on the GitHub attack, we can now confidently conclude that the Cyberspace Administration of China (CAC) is responsible for both of these attacks.

Hijacking the computers of millions of innocent internet users around the world is particularly striking as it illustrates the utter disregard the Chinese authorities have for international as well as even Chinese internet governance norms. There was no way for an average internet user to prevent themselves from being exploited as part of this attack. This statement from Lu Wei, the head of the Cyberspace Administration of China, encapsulates our thoughts and concerns about these attacks:

We should establish an Internet order that helps maintain security. The Internet is a worldwide platform for sharing information. It is “a community of common interests”. No country is immune to such global challenges as cybercrime, hacking and invasion of privacy. In cyberspace, it is becoming increasingly difficult to uphold security for one’s own country by sacrificing that of others. It is also not practical to pursue one’s own interests by rejecting others’ needs. China is also a victim of hacking. We have always firmly opposed all forms of Internet attacks.

Inserting malicious code in this manner can only be done via the Chinese Internet backbone. Even if CAC did not launch the DDoS attack directly, they are responsible for managing the internet in China and it is not possible that they did not know what was happening. These attacks have occurred under CAC’s watch and would have needed the approval of Lu Wei.

Lu Wei and the Cyberspace Administration of China have clearly escalated the tactics that they use to control information. The Great Firewall has switched from being a passive, inbound filter to being an active and aggressive outbound one. This is a frightening development and the implications of this action extend beyond control of information on the internet. In one quick movement, the authorities have shifted from enforcing strict censorship in China to enforcing Chinese censorship on internet users worldwide. CAC can launch these attacks quickly and easily and they have the technical and financial resources behind them to continue to launch DDoS attacks against any website, anywhere in the world.

These attacks also illustrate the shortsighted nature of the Chinese authorities. Weaponizing Chinese internet services stifles global confidence in Chinese entrepreneurs and contributes to the fragmentation of the global internet. The SEC has already asked Weibo to explain how the censorship apparatus works - Baidu, a publicly-listed company in the US, may be called in to do the same.   

We correctly predicted last year that China would increase their use of MITM attacks in an effort to censor encrypted websites. We now sadly predict that the DDoS attacks against us and GitHub are likely to signal a ramping up of attacks against foreign internet properties. These kinds of attacks should draw scorn and criticism from government officials of all countries around the world.

It is important to note that throughout this attack, our Android FreeBrowser app has not been impacted and is still helping thousands of Chinese internet users to bypass censorship and the great firewall every day.

On behalf of the millions of unsuspecting users manipulated by these actions, we call on Lu Wei and the Cyberspace Administration of China (CAC) to bring an end to these DDoS attacks immediately and to apologise for their blatantly disrespectful and dangerous actions.

Further Information

After the attacks started, many overseas Chinese saw these warning messages and started to post screenshots on social media.

One person uploaded a video to YouTube showing what happens when a user is injected with malicious JS in the GitHub DDoS attack. You can also see GitHub’s mitigation efforts in this video.

There are fascinating details about the attack on GitHub and changes made by the Cyberspace Administration of China to maintain the attack.

An earlier report about an unrelated GFW upgrade stated that “Every machine in China has the potential be a part of a massive DDOS attack on innocent sites,” and “They have weaponized their entire population.” That was too optimistic. Now CAC has weaponized the entire Internet population.

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Mon, Nov 25, 2024

China’s New Effort to Achieve Cyber Sovereignty

How Real-Name Registration policies create an “ideological firewall” that chills dissent by eliminating user anonymity and selectively restricting transnational access to Chinese social media apps.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Subscribe to our blog using RSS.

Comments

My spouse and I absolutely love your blog and find the majority of your post's to be exactly I'm looking
for. Does one offer guest writers to write content to suit your needs?
I wouldn't mind producing a post or elaborating on most of
the subjects you write about here. Again, awesome website!

My webpage ... photo retouching service

把墙拆了,本站自然也就关闭了,不知道耗费大量物力财力搞ddos攻击有何意义

They did not weaponise their own population, they weaponised foreigners (particularly overseas Chinese). By doing so, they do not have to pay the cost of the traffic traversing their backbone network.

The attack was injected at the inbound link of the international gateway, ultimately making this an untrustworthy provider.
If baidu (or any other network service provider) is to be trusted outside China, they must now bypass the CCP controlled international links.

I am a professional writer having good experience as well as qualifications.
http://www.writeversity.com

my secret blog is down , all attack IP is from China , seems I need to block the Chinese IP myself..

We're a group of volunteers and opening a brand new scheme in our community.
Your web site provided us with helpful info
to work on. You've performed a formidable process and our entire community might be grateful to you.

Feel free to visit my blog - tłumaczenia przysięgłe gdańsk

You can learn tto make tеn different types of paper airplanes օn this free website.Αѕ he is also tҺe President of the Japan Origami
Airplane Association, Һe apparently decided to makе a гun at 27.
The more recent variations օf this recreation incluɗe way more missions ɑnd
objectives.

mү site: www.printonet.pl

Thanks for sharing this nice post - For more info: -
Packers and Movers Gurgaon @ http://getpackers.in/packers-and-movers-gurgaon.html
Packers and Movers Delhi @ http://getpackers.in/packers-and-movers-delhi.html
Packers and Movers Pune @ http://getpackers.in/packers-and-movers-pune.html
Packers and Movers Bangalore @ http://getpackers.in/packers-and-movers-bangalore.html

Thanks for sharing this nice post - For more info: -
Packers and Movers Mumbai @ http://getpackers.in/packers-and-movers-mumbai.html
Packers and Movers Hyderabad @ http://getpackers.in/packers-and-movers-hyderabad.html
Packers and Movers Kolkata @ http://getpackers.in/packers-and-movers-kolkata.html
Packers and Movers Chennai @ http://getpackers.in/packers-and-movers-chennai.html

Taking after this strategy, you ought to deal with tasks in place of slightest troublesome and speediest to hardest and most lengthy. You will then permit yourself to commit the greater part of your time to the tasks that require the most time, effort, and focus , without different other tasks abating furious as a background process in the mind. It would be enjoyable to work on monstrous 10-15 page paper without more diminutive assignments annoying at you. If not, you may be forced to seek help from any custom essay writing service http://essayacademia.com to finish the larger task on time.

You must download lagu for this site, its awesome.

Thanks for all your information, Website is very nice and informative content.
http://healthydrugz.com/
http://www.menspowerx.com/

It is appropriate time to make some plans for the future and it is time to be happy. I’ve read this post and if I could I desire to suggest you few interesting things or tips. Maybe you can write next articles referring to this topic. I desire to read more things about it.

http://www.advancehappynewyear2016.com
http://www.advancehappynewyear2016.com

Future yeah because it's very fashionable people and be turned the activity experience non led by opportunity to ghetto the net I organized on last evening and really in Feb me count happen actually in

happy new year 2016 images pictures photos wallpapers

happy new year 2016 Quotes wishes messages sms greetings

Check out our latest collection of Rakhi HD Images 2015, Rakhi Live Wallpapers, Rakhi Bollywood Songs, Send Rakhi Online, Rakhi Making, Rakhi sms messages in Hindi and English for brothers and sisters, Raksha Bandhan Images 2015, Rakhi Gifts for Sisters, Raksha Bandhan Quotes - 2015

==> http://www.rakshabandhanimages2015.net/ <==

Check out our latest collection of Rakhi HD Images 2015, Rakhi Live Wallpapers, Rakhi Bollywood Songs, Send Rakhi Online, Rakhi Making, Rakhi sms messages in Hindi and English for brothers and sisters, Raksha Bandhan Images 2015, Rakhi Gifts for Sisters, Raksha Bandhan Quotes - 2015 :

==> Raksha Bandhan Images 2015 <==
==> Raksha Bandhan Special Bollywood Songs 2015 <==

Thank you for such a well written article. It’s full of insightful information and entertaining descriptions. Your point of view is the best among many.

http://www.mayfairservicedapartments.com/

It is appropriate time to make some plans for the future and it is time to be happy. I’ve read this post and if I could I desire to suggest you few interesting things or tips.
thanks by stallion business

What an article i just loved it amazing awesome. i will love to listen more on this.
You can also check these
http://www.happydiwali2015cards.com
would love to listen more on this great !
Thanks

I know that would be fine if i say i need to make :

http://conceptive.in/gandhi-jayanti-2015/gandhi-jayanti-images/

would love to listen more on this great !
Thanks

Thanks for post this helpful post - Please visit for More information about -
Packers and Movers in Chennai @
http://www.expert5th.in/packers-and-movers-chennai/
Packers and Movers in Hyderabad @
http://www.expert5th.in/packers-and-movers-hyderabad/
Packers and Movers in Pune @
http://www.expert5th.in/packers-and-movers-pune/
Packers and Movers in Mumbai @
http://www.expert5th.in/packers-and-movers-mumbai/

This article is really fantastic and thanks for sharing the valuable post.
Packers and Movers in Gurgaon @
http://www.expert5th.in/packers-and-movers-gurgaon/
Packers and Movers in Delhi @
http://www.expert5th.in/packers-and-movers-delhi/
Packers and Movers in Bangalore @
http://www.expert5th.in/packers-and-movers-bangalore/

Thanks for all your information, Website is very nice and informative content.
Packers and Movers in Faridabad @
http://www.expert5th.in/packers-and-movers-faridabad/
Packers and Movers in Noida @
http://www.expert5th.in/packers-and-movers-noida/
Packers and Movers in Thane @
http://www.expert5th.in/packers-and-movers-thane/
Packers and Movers in Navi Mumbai @
http://www.expert5th.in/packers-and-movers-navimumbai/
Packers and Movers in Ghaziabad @
http://www.expert5th.in/packers-and-movers-ghaziabad/

Thanks for post this helpful post - Please visit for More information about -
Packers and movers in Gurgaon @
http://www.dteller.in/packers-and-movers-gurgaon/
Packers and Movers in Bangalore @
http://www.dteller.in/packers-and-movers-bangalore/
Packers and Movers in Hyderabad @
http://www.dteller.in/packers-and-movers-hyderabad/
Packers and Movers in Pune @
http://www.dteller.in/packers-and-movers-pune/

They did not weaponise their own population, they weaponised foreigners (particularly overseas Chinese). By doing so, they do not have to pay the cost of the traffic traversing their backbone network

http://conceptive.in/

Nice and informative article thanks to share with us.
http://edugeeksalert.in/

Does one offer guest writers to write content to suit your needs?
I wouldn't mind producing a post or elaborating on most of
the subjects you write about here. Again, awesome website!
My webpage , thanks alote by http://www.indiantrio.com

wow thanks for share great info here i really like it your site and you can check http://www.hatestory3boxofficecollection.in/

http://www.hatestory3movie.in/

Pages

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.