Feeds

Chinese ISP hijacked US military, gov web traffic

BGP wakeup call still not sounded

The essential guide to IT transformation

Eight months after traffic to as much as 15 percent of the world's internet destinations was mysteriously diverted through China, investigators for a US Congressional committee remain wary of the Asian superpower, even as they're quick to say they have no evidence it's the work of the Chinese government.

“Several incidents in early 2010 demonstrate that, regardless of whether Chinese actors actually intended to manipulate US and other foreign internet traffic, China’s internet engineers have the capability to do so,” they wrote in a report published on Wednesday.

“Although China is by no means alone in this regard, persistent reports of that nation’s use of malicious computer activities raise questions about whether China might seek intentionally to leverage these abilities to assert some level of control over the internet, even for a brief period.”

The assessment, released by the US-China Economic and Security Review Commission, claims that during two brief episodes in late March and early April, tainted network tables redirected huge amounts of internet traffic – some of it from the US military – through Chinese internet providers. In the April 8 incident, China Telecom advertised erroneous BGP, or Border Gateway Protocol, routes that funneled traffic through Chinese networks before it reached its intended destination.

The hijacking, which lasted 18 minutes, affected email and web traffic traveling to and from .gov and .mil domains, including those for the US Senate, four branches of the military, the office of the secretary of defense, and NASA, among other US governmental agencies, according to the report. It also affected traffic for large businesses, including Dell, IBM, Microsoft and Yahoo.

The 328-page report makes references to other technological threats posed by China, including last year's espionage attacks on Google and 33 other large companies, and recently enacted rules that require security vendors to share encryption information with the Chinese government.

The hijacking incidents weren't that different from what researchers did at the 2008 Defcon hacker conference in Las Vegas. By advertising false BGP routes that in essence claimed their IP addresses mapped the most direct route to the conference network, they sent all conference traffic to a computer under their control before ultimately sending to its destination.

Over the past month, a Firefox extension known as Firesheep has demonstrated to the masses just how susceptible unencrypted traffic is to snooping. In many respects, the fragility of BGP, which relies on trust and has no intrinsic security protections, ought to cause more concern. Emails, web traffic and other data traveling over the internet is wide open to tampering if its senders don't take proper precautions, a point that wasn't lost in Wednesday's report.

“Although the Commission has no way to determine what, if anything, Chinese telecommunications firms did to the hijacked data, incidents of this nature could have a number of serious implications,” it warned. “This level of access could enable surveillance of specific users or sites. It could disrupt a data transaction and prevent a user from establishing a connection with a site. It could even allow a diversion of data to somewhere that the user did not intend (for example, to a 'spoofed' site).”

Internet engineers have long known of the BGP weakness, but so far there's been little done to fix it. That leaves the security of the global network in many ways reduced to the honor system.

"Although a lot of parties can redirect traffic, doing so is a very public act," Bert Hubert, of Fox-IT and founder of PowerDNS, told The Register. "Everyone can see the sign, and systems are in place that take a global view of internet routing, and report on whatever is odd. Rerouting traffic this way works, but everyone can see you do it."

The report is here. ®

This article was updated to correct erroneous information about the magnitude of the hijacking. According to the report, it rerouted traffic to 15 percent of internet destinations, not 15 percent of the world's traffic.

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?