Google The Hack Attack Cyber Attack Exposed

Share on Facebook0Share on LinkedIn0Share on Google+0Tweet about this on Twitter0

Google has turned a bad acorn into a blossoming poison-ivy bush. Google has a presence in many countries all over the world, but now they have decided that Chinese censorship on filtration are too much. The issue has brought about an all out war of code as to who did what. Google stated that “the problem was the result of a change it made to the string of characters it sends along with search requests, which may run afoul of China’s powerful Internet filter”; which of course china denies it ever being their fault. It’s a game of he said she said, and the scene gets worse. Google doesn’t have any intentions of fixing an unforgiving mistake, nor does China. China even went so far as to remove totally the praise and recognition of Google (Stray).

Google soon became a speckle in the eye of the beholder and made its presence in China very minimal. Not far then after an unknown group of cyber attackers in China have resulted in cyber attack against Google; leaving their service servers at multiple locations for its employees vulnerable to future attacks and exposure. The cyber-attack on Google and other U.S. companies was part of a suspected Chinese government operation launched last year that used human intelligence techniques and high-technology to steal corporate secrets, according to U.S. government and private-sector cybersecurity specialists. “The attack was very targeted. It targeted engineers and quality assurance developers, people with very high levels of access into the organization,” said George Kurtz, chief technology officer for computer security firm McAfee who investigated the attack for several of the affected companies. The cyber-criminals broke in using a tactic known as “phishing” where a legitimate e-mail is sent claiming to come from someone the user knows and trusts. Typically these e-mail messages have a booby-trapped attachment that, once opened, places malware on a computer. Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organization (Shiels). The integrity of Google’s former system has been weakened and susceptible to future breeches. The system was modified and renamed but the possibility of a duplicate or background running program is highly likely. Google has seen this to be a lesson as in whom to trust, seeing that it would have taken months to prepare and skills not acquired by the norm of programmers.

References

Stray, J. (2010). After Google’s move, a shift in search terms. Retrieved from http://www.nytimes.com/2010/03/29/technology/29googletrends.html?fta=y

Shiels, M. (2010). Security experts say google cyber-attack was routine . Retrieved from http://news.bbc.co.uk/2/hi/8458150.stm