Feeds

Chinese Feds demand computer virus samples

Ministry of nefarious research

  • alert
  • submit to reddit

Internet Security Threat Report 2014

China's Ministry of Public Security has been requiring Western anti-virus vendors to supply samples of malicious code as a condition of doing business with Mainland consumers, the Wall Street Journal reports.

The official Chinese explanation would have us believe that the secret police have lately gone into the consumer protection business by claiming that the samples are necessary to enable the Feds to test the effectiveness of the software being sold.

Tantalized by the glittering promise of 1.2 billion (largely penniless) consumers, Network Associates, Symantec and Trend Micro have graciously complied, offering up approximately 300 virus samples to curry favor enough to sell their products in the PRC.

What the Chinese Feds really intend with these samples is unclear, but we can be confident that the consumer-protection cover story is the last explanation likely to be true.

It's long been known that China is developing a cyber-warfare capability, since it lacks the technological sophistication, manufacturing capacity and raw capital required to compete head-to-head with military juggernauts like the USA, EU, and, until recent years, Russia.

Beijing clearly sees information warfare as an inexpensive battlefield equalizer. But according to the Journal report, only the most common malicious programs in circulation -- all of which are easily detected -- have been surrendered.

Most of these are available on the Web to anyone capable of using a search engine with a modicum of ingenuity.

It seems implausible, then, that the PLA and internal security apparatus would rely on submissions from vendors when a thorough Web search will yield much the same raw material.

Nevertheless it's beyond question that the Chinese authorities intend to secure for themselves the capability of launching devastating cyber attacks. With that in mind, we might make sense of this trend if we consider that they might wish to see a broad sample of detectable viruses in hopes of modifying them to evade detection without diluting their effectiveness.

We can also be confident that they're gleefully breaking every copyright law known to man, reversing the anti-virus software in search of other weaknesses they can exploit along those lines.

Incredibly, Network Associates Research Director Vincent Gullotto is quoted by the Journal saying that he's "met with [the Ministry of Public Security], developed a certain level of trust, and believes they're doing what they're talking to us about."

Isn't it remarkable how greed can instantly transform a jaded businessman into a gullible Pollyanna? ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.