Feeds

Chinese Feds demand computer virus samples

Ministry of nefarious research

  • alert
  • submit to reddit

Remote control for virtualized desktops

China's Ministry of Public Security has been requiring Western anti-virus vendors to supply samples of malicious code as a condition of doing business with Mainland consumers, the Wall Street Journal reports.

The official Chinese explanation would have us believe that the secret police have lately gone into the consumer protection business by claiming that the samples are necessary to enable the Feds to test the effectiveness of the software being sold.

Tantalized by the glittering promise of 1.2 billion (largely penniless) consumers, Network Associates, Symantec and Trend Micro have graciously complied, offering up approximately 300 virus samples to curry favor enough to sell their products in the PRC.

What the Chinese Feds really intend with these samples is unclear, but we can be confident that the consumer-protection cover story is the last explanation likely to be true.

It's long been known that China is developing a cyber-warfare capability, since it lacks the technological sophistication, manufacturing capacity and raw capital required to compete head-to-head with military juggernauts like the USA, EU, and, until recent years, Russia.

Beijing clearly sees information warfare as an inexpensive battlefield equalizer. But according to the Journal report, only the most common malicious programs in circulation -- all of which are easily detected -- have been surrendered.

Most of these are available on the Web to anyone capable of using a search engine with a modicum of ingenuity.

It seems implausible, then, that the PLA and internal security apparatus would rely on submissions from vendors when a thorough Web search will yield much the same raw material.

Nevertheless it's beyond question that the Chinese authorities intend to secure for themselves the capability of launching devastating cyber attacks. With that in mind, we might make sense of this trend if we consider that they might wish to see a broad sample of detectable viruses in hopes of modifying them to evade detection without diluting their effectiveness.

We can also be confident that they're gleefully breaking every copyright law known to man, reversing the anti-virus software in search of other weaknesses they can exploit along those lines.

Incredibly, Network Associates Research Director Vincent Gullotto is quoted by the Journal saying that he's "met with [the Ministry of Public Security], developed a certain level of trust, and believes they're doing what they're talking to us about."

Isn't it remarkable how greed can instantly transform a jaded businessman into a gullible Pollyanna? ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.