Feeds

Cyber attack hits law firm that sued China

Coincidence?

Choosing a cloud hosting partner with confidence

A law firm that filed a lawsuit against the Chinese government says it was hit by a cyber attack that looks strikingly similar to one that targeted Google, Adobe Systems, and 32 other large companies.

On Monday, Attorneys at Gipson Hoffman & Pancione began receiving trojan-laced emails made to appear as if they were sent by other members of the firm, according to a release. The emails, at least some of which originated in China, attempted to trick the target in to clicking on a link or attachment," Information Week reported.

Last week, the Los Angeles-based firm said it sued the People's Republic of China and two Chinese software developers over allegations the Green Dam Youth Escort monitoring program lifted code from web-filtering software made by Cybersitter.

The attacks follow Google's startling announcement on Tuesday that hackers it believed were acting on behalf of China penetrated the defenses of 34 large companies, including Google and Adobe Systems. Google has pledged to stop honoring the Chinese government's demands to filter search results on Google.cn and has threatened to exit the world's biggest internet market altogether.

At time of writing, Google.cn continued to filter results related to the Tiananmen Square massacre and other topics considered taboo by the Chinese government.

On Thursday, anti-virus maker McAfee said the attackers targeted at least three of the companies by exploiting a zero-day vulnerability in Internet Explorer. It's possible they used other exploits as well.

The attacks against Gipson Hoffman & Pancione have been reported to the FBI and members of the House Intelligence Committee. ®

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.