China Hijacked Internet Traffic From Federal Sites
For 18 minutes in April China Telecom re-routed traffic from .gov, .mil and other sites through Chinese servers, according to a Congressional commission.
A state-owned Chinese telecommunications firm "hijacked" Internet traffic in April, affecting traffic from U.S. government domains and raising serious implications for Internet safety, according to a report by a Congressional commission.
Affected was traffic going to and from U.S. .gov and .mil sites, including sites for the Senate, the four main armed services branches, the office of the Secretary of Defense, NASA, the Department of Commerce, the National Oceanic and Atmospheric Administration and others, according to the report.
Commercial websites for large technology companies -- including Dell, Yahoo, Microsoft and IBM -- also were re-routed during the diversion period.
Other servers around the world adopted the path opened up by China Telecom as well; during the 18 minutes, traffic to about 15 percent of Internet destinations was routed through servers located in China.
The commission said it could not determine what China Telecom did to the data that was diverted; however, such an incident and others like it could have a "number of serious implications" and enable "severe malicious activities."
Arbor Networks chief security officer Danny McPherson, who explained the implications of the incident to the panel, said that China Telecom could have intended the diversion to conceal a targeted attack, according to the report.
The level of access afforded by such a diversion also could have enabled the firm to conduct surveillance on specific users or sites, disrupt a data transaction, prevent a user from connecting to a site or send data somewhere a user did not intend, according to the report.
Indeed, the idea of China Telecom engaging in such activity is certainly troublesome, as a report prepared by Northrop Grumman last year for the U.S.-China Economic and Security Review Commission concluded that China is probably spying on the U.S. government to gain advantage for any potential cyber conflicts.
Moreover, some of the most sophisticated hacker attacks -- including one on Google in January that caused the vendor to withdraw from China -- also originated in that country.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.