Topic Title:: Satish Pradhan Dnyanasadhana College
Topic Title:: Satish Pradhan Dnyanasadhana College
Topic Title:: Satish Pradhan Dnyanasadhana College
Topic Title:
CASE STUDY ON ATTACK GOOGLE CHINA (2009)
Academic year: (2020-2021)
Submitted By:
Kiran Borge - ( )
Pritam Tare - ( )
Sahil Peje -( )
Prathamesh Gunjal - ( )
This case briefly discusses about search engine market in China, Google's share in Chinese
market, Government rules and regulations related to the internet search.
The main issues discussed in this case study are:
Google's launch in the China and how it made its presence felt over there as well as the key
issues faced by the Google such as gaining the market share, although Google did a fair
amount of research before entering China but still wasn't able to beat the local competitor
Baidu which is the biggest in terms of search engine in China and accounts for nearly 60%
of the market share. Chinese Government rules and regulations related to the censorship in
China which was against the Google's Mission of providing the information. Cyber-attack on
Google China which mainly target the gmail accounts of the users who were Human
Right activists which forced Google on considering its exit from China. A brief analysis of
the internet search market in China by discussing the market share of various players such as
Google, Baidu, Microsoft, Yahoo and other local Players. Possible strategy which Google
could use in order to grow and sustain its market share.
Introduction:
This case study tries to find out the Google's performance in China by taking into account
current state of industry, doing the portfolio analysis, critically analyzing its strategy.
Google started its operations in China in 2005 earlier to that it provided search engine to
Chinese users through its servers based in US but in a very short span of time Chinese
Government developed its own firewall in order to provide the censored information to the
Chinese people by providing the cache copy of Google search results which resulted in
slowing down of its web pages, this resulted in slowing down its search results upto 7 times
as compared to its competitor Baidu. As a result of this, Google decided to open its
operations in China in order to resolve these issues as Google considered that it's better to
provide the information rather than providing no information at all. So, it provided the
censored information to Chinese population but still it found difficult to extend its presence in
the Chinese market in terms of developing products in the Chinese language and localizing
them whereas Baidu's pay 4 performance model was much better which was based on the
performance rather than the flat charges in the beginning itself which other search engines
used.
Google faced cyber-attacks in January 2010 which forced it to consider its exit from the
China and named it as Aurora attack, moreover this decision from Google was considered
diplomatic one by internet security experts as this decision would make Chinese Government
to reconsider its decision on the censorship which could help Google attain the same level of
leadership in the Chinese market as it enjoys the world over (Worthen, Ben,2010).
*Chinese hackers who breached Google's servers several years ago gained access to a
sensitive database with years’ worth of information about U.S. surveillance targets, according
to current and former government officials. The breach appears to have been aimed at
unearthing the identities of Chinese intelligence operatives in the United States who may
have been under surveillance by American law enforcement agencies. It’s unclear how much
the hackers were able to discover. But former U.S. officials familiar with the breach said the
Chinese stood to gain valuable intelligence. The database included information about court
orders authorizing surveillance orders that could have signalled active spying investigations
into Chinese agents who maintained e-mail accounts through Google's Gmail
service.Knowing that you were subjects of an investigation allows them to take steps to
destroy information, get people out of the country, said one former official, who, like others
interviewed for this article, spoke on the condition of anonymity to discuss a highly sensitive
matter. The official said the Chinese could also have sought to deceive U.S. intelligence
officials by conveying false or misleading information.
Although Google disclosed an intrusion by Chinese hackers in 2010, it made no reference to
the breach of the database with information on court orders. That breach prompted deep
concerns in Washington and led to a heated, months-long dispute between Google and the
FBI and Justice Department over whether the FBI could access technical logs and other
information about the breach, according to the officials. a senior Microsoft official suggested
that Chinese hackers had targeted the company’s servers about the same time that Google’s
system was compromised. The official said Microsoft concluded that whoever was behind the
breach was seeking to identify accounts that had been tagged for surveillance by U.S.
national security and law enforcement agencies.
“What we found was the attackers were actually looking for the accounts that we had
lawful wiretap orders on,” David W. Aucsmith, senior director of Microsoft’s Institute for
Advanced Technology in Governments, said at a conference near Washington, according to a
recording of his remarks.
“If you think about this, this is brilliant counterintelligence,” he said in the address, which
was first reported by the online magazine CIO.com. “You have two choices: If you want to
find out if your agents, if you will, have been discovered, you can try to break into the FBI to
find out that way. Presumably that’s difficult. Or you can break into the people that the courts
have served paper on and see if you can find it that way. That’s essentially what we think
they were trolling for, at least in our case.”
Microsoft now disputes that its servers had been compromised as part of the cyber spying
campaign that targeted Google and about 20 other companies. David W. Aucsmith, who cited
that campaign in his remarks, said in a statement to The Washington Post that his comments
were ‘not meant to cite any specific Microsoft analysis or findings about motive or attacks.’
The U.S. government has been concerned about Chinese hacking since at least the early
2000s, when network intrusions were discovered at U.S. energy labs and defence contractors.
The FBI has for years led a national security investigation into Chinese cyber espionage,
some of which has been linked to the Chinese military.
The Chinese, according to government, academic and industry analysts, have stolen massive
volumes of data from companies in sectors including defense, technology, aerospace, and oil
and gas. Gen. Keith B. Alexander, the director of the National Security Agency, has referred
to the theft of proprietary data as the “greatest transfer of wealth in history.”
The Chinese emphatically deny that they are engaged in hacking into U.S. computer systems
and have said that many intrusions into their own networks emanate from servers in the
United States. “The Chinese government prohibits online criminal offenses of all forms,
including cyber-attack and cyber espionage, and has done what it can to combat such
activities in accordance with Chinese laws,” a Chinese Embassy spokesman, Yuan Gao, said
in an e-mail. “We’ve heard all kinds of allegations but have not seen any hard evidence or
proof ”.Experts said an elaborate network of interconnected routers and servers can make the
Internet tailor-made for the shadowy work of spying and counter spying. It stands to reason,
they said, that adversaries would be interested in finding vulnerabilities in the networks of the
companies that authorize surveillance on behalf of the government. “It is an absolute rule of
thumb that the best counterintelligence tool isn’t defensive” it’s offensive. It’s penetrating the
other service, said Michael V. Hayden, a former director of the National Security Agency and
the CIA, who said he had no knowledge of the incidents. Hacking into a surveillance
database, he said, ‘is a form of that.’
Google’s crisis began in December 2009, when, several former government officials said, the
firm discovered that Chinese hackers had penetrated its corporate networks through “spear
phishing” a technique in which an employee was effectively deceived into clicking a bogus
link that downloads a malicious program. The hackers had been rooting around insider
Google’s servers for at least a year. Alarmed by the scope and audacity of the breach, the
company went public with the news in January 2010, becoming the first U.S. firm to
voluntarily disclose an intrusion that originated in China. In a blog post, Google chief legal
officer David Drummond said hackers stole the source code that powers Google’s vaunted
search engine and also targeted the e-mail accounts of activists critical of China’s human
rights abuses.As Google was responding to the breach, its technicians made another startling
discovery: its database with years of information on surveillance orders had been hacked. The
database included information on thousands of orders issued by judges around the country to
law enforcement agents seeking to monitor suspects e-mails. The most sensitive orders,
however, came from a federal court that approves surveillance of foreign targets such as
spies, diplomats, suspected terrorists and agents of other governments. Those orders, issued
under the Foreign Intelligence Surveillance Act, are classified. Google did not disclose that
breach publicly, but soon after detecting it, the company alerted the FBI, former officials
said. Bureau officials told FBI Director Robert S. Mueller III, who briefed President Obama.
At one point, an FBI supervisory agent working on Chinese cyberespionage cases travelled to
Google’s Mountain View, Calif., headquarters to conduct a national security investigation,
the former officials said. The company, without any guarantees about the scope of the
investigation, denied access. The bureau undertook an extensive assessment to include
determining whether individuals under surveillance had moved to other means of
communication. Although the assessment showed no damage to national security because of
the breach, Google took steps to shield sensitive data. Michael M. DuBose, former chief of
the Justice Department’s Computer Crime and Intellectual Property Section, declined
to comment on either the Microsoft or Google cases. But he said, in general such
intrusions serve as a wake-up call for the government that the overall security and
effectiveness of lawful interception and undercover operations is dependent in large part on
security standards in the private sector.
ii. Researchers who have investigated these attacks said they were traced to China
several ways and that they share characteristics with previous attacks linked to the
Chinese government. The attacks used command-and-control servers based in Taiwan
that are commonly used by or on the behalf of the Chinese government, according to
iDefense.
3. How were the companies targeted?
It is possible the attackers used "multiple exploits and multiple, tailor-made Trojans
for different targets," said Jellenc. "That is an extraordinary leap in sophistication
from other targeted attack campaigns we've seen in the past," he said. Microsoft said
on Thursday that a newly discovered vulnerability in Internet Explorer was used in the
attacks. Initially, malicious PDFs targeting a hole in Adobe Reader were suspected to be
culprits, but Adobe said on Thursday that it has no evidence that is the case.
Coincidentally, Adobe patched a so-called "zero-day hole" in Reader and Acrobat on
Tuesday that was discovered in mid-December and had been exploited in attacks in the
wild to deliver Trojan horse programs that install backdoor access on computers. In such
targeted attacks, an attacker typically sends an e-mail to a specific administrator or other
worker inside a company, often masquerading as someone the recipient knows. If the
recipient opens the attachment, the malware is dropped onto the target computer from
where it can be remotely controlled to steal data, access sensitive parts of the network, or
even launch an attack on other computers. In at least one of the attacks, the attack code
was set to download the Hydraq Trojan onto victim computers, according to Rick
Howard, iDefense intelligence director, who said his lab analyzed a copy of the malware
it received from a target company.
4. Were insiders involved?
Sources told CNET that Google is looking into whether there was insider involvement.
Companies that are attacked that do business in China will typically investigate, as a
matter of course, whether someone in their Chinese office might have ties to the
government there or have been involved in some way, either by planting malware inside
the company or passing it on to unwitting targets in the company, sources said.
"The route the attackers used was malicious software used to infect personal
computers."
--Google blog post
5. What was stolen from the companies?
iDefense says source code was targeted at the companies and that most of the attacks
appear to have been successful. Google said some intellectual property was stolen but did
not elaborate. The company also said limited account information of two Gmail users was
accessed.
IDG News Service, citing an unnamed source, reported that attackers "apparently were
able to access a system used to help Google comply with search warrants by providing
data on Google users," referred to as an "internal intercept" system.
Meanwhile, Texas-based hosting provider Rackspace confirmed early on Wednesday that
a server at the company had been compromised and used in the attacks. It was not known
what information was stored there.
6. Does this follow the pattern of other attacks?
Yes. Researchers at iDefense said the characteristics of the attacks on Google and the
others were very similar to those of China-based attacks launched last summer, including
using the same DNS provider, similar hosts for command-and-control communication
and related IP addresses. "Considering this proximity, it is possible that the two
attacks are one and the same, and that the organizations targeted in the Silicon
Valley attacks have been compromised since July" iDefense said.