Feeds

Yahoo!'s Chinese affiliate disowns parent for siding with Google

Other Tech giants keep mum over China syndrome

Securing Web Applications Made Simple and Scalable

Yahoo!'s Chinese affiliate has slammed its part owner for siding with Google in an ongoing row over cyber-espionage attacks on Western businesses, widely blamed on the Chinese government.

Last week, Yahoo! said it was "aligned" with Google in fighting "attempts to infiltrate company networks to obtain user information". This came in the wake of Google's surprise statement that it was considering exiting China, after discovering attempts to hack into the webmail accounts of Chinese dissidents. Yahoo! added that it condemned "cyber-attacks regardless of origin or purpose".

Alibaba Group, which runs Yahoo!'s operations in China and is 40 per cent owned by the US tech firm, has distanced itself from its part-owner's statement. It describes the outburst as reckless, "given the lack of facts in evidence," Reuters reports.

Google and at least 20 other Western firms were hit by targeted attacks first detected in December. Google took the unusual step of going public on the attacks last Tuesday, saying it would stop censoring Chinese search results and threatening a pull-out in response. Adobe confirmed it was also the victim of the same run of attacks, which exploited a zero-day vulnerability in Internet Explorer. This was used to drop a Trojan on compromised systems, as explained in a write-up on the attacks by McAfee here.

VeriSign iDefense has withdrawn earlier claims, denied by Adobe, that an unpatched Adobe Reader vulnerability featured in the attacks.

Yahoo!, Symantec and Juniper Networks have also been named as targets of the IE-based attacks.

Cyber-espionage attacks, using booby-trapped emails and unpatched software vulnerabilities, have been part and parcel of the internet for at least five years. It is therefore only Google's stand and the apparent sophistication of the latest run of attacks that mark them out as anything special.

Reuters cites unnamed sources in suggesting that Yahoo may have known about the latest wave of attacks, before Google's technical staff got in touch to warn that it might have been hit. This remains unconfirmed, especially in the absence of a clear timeline for the attacks.

Yahoo! is one of the few tech heavyweights to express solidarity with Google. The primary concern of most technology firms is probably to avoid doing anything to upset business relations with China.

Respecting the privacy of Chinese internet users is a sensitive subject for Yahoo!. The webmail and search firm was lambasted by human rights activists for handing over emails sent by dissidents three years ago. At the time, Yahoo! said it was only complying with local laws.

In related news, Reuters reports that Google is investigating the possibility that local employees may have colluded in facilitating the hack. Some Google China employees have reportedly been blocked from accessing Google's intranet, while others were shuffled off to other offices in the region. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.