Status of Chinese People

About China and Chinese people's living condition

  • China Organ Harvesting Report, in 19 languages

  • Torture methods used by China police

  • Censorship

  • Massive protests & riots in China

  • Top 9 Posts (In 48 hours)

  • All Topics

  • Books to Read

    1. A China More Just, Gao Zhisheng
    2.Officially Sanctioned Crime in China, He Qinglian
    Will the Boat Sink the Water? Chen Guidi, Wu Chuntao
    Losing the New China, Ethan Gutmann
    Nine Commentaries on The Communist Party, the Epochtimes
  • Did you know

    Reporters Without Borders said in it’s 2005 special report titled “Xinhua: the world’s biggest propaganda agency”, that “Xinhua remains the voice of the sole party”, “particularly during the SARS epidemic, Xinhua has for last few months been putting out news reports embarrassing to the government, but they are designed to fool the international community, since they are not published in Chinese.”
  • RSS Feeds for Category

    Organ Harvesting

    Human Rights

    Made in China







    Feed address for any specific category is Category address followed by 'Feed/'.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 223 other followers

Archive for the ‘Virus’ Category

‘Most Sophisticated’ Android Trojan Surfaces in China

Posted by Author on December 30, 2010, Dec. 30, 2010 –

Geinimi, a highly sophisticated Trojan, has been detected in Android devices in China.

However, it appears to be more of a sign of things to come rather than a serious threat to U.S. Android users.

Dubbed Geinimi (a scrambulation of Gemini) by Lookout Mobile Security, a startup based in San Francisco, the botnet-like Trojan sends location information, device identity and even stored contacts to an unknown server.

According to Lookout co-founder Kevin MaHaffe, the most significant feature of Geinimi is its sophisticated command-and-control mechanism. Read the rest of this entry »

Posted in China, Mobile Phone, News, Software, Technology, Virus, World | Comments Off on ‘Most Sophisticated’ Android Trojan Surfaces in China

Chinese Antivirus Companies Create the Viruses They Kill

Posted by Author on December 12, 2010

By Li Ping, Epoch Times Staff, Dec 12, 2010-

A well-placed Chinese security official has been given a suspended death sentence for taking bribes in exchange for his role in an antivirus software fraud scheme.

Yu Bing, former director of the Internet monitoring department of Beijing’s Public Security Bureau, had his agency send out a “virus warning” telling the public to download software from the company Rising Antivirus, to combat a particular computer virus.

But that virus was itself devised by Rising Antivirus, who bribed Yu to send out an email to drum up business, according to a Dec. 2 First Financial Daily report. Read the rest of this entry »

Posted in Business, China, Company, News, Software, Technology, Virus, World | Comments Off on Chinese Antivirus Companies Create the Viruses They Kill

Google’s Password Control System attacked by Cyber hacking from China

Posted by Author on April 20, 2010

By JOHN MARKOFF, New York Times, April 19, 2010 –

Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s Web services, including e-mail and business applications.

The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services.

The intruders do not appear to have stolen passwords of Gmail users, and the company quickly started making significant changes to the security of its networks after the intrusions. But the theft leaves open the possibility, however faint, that the intruders may find weaknesses that Google might not even be aware of, independent computer experts said.

The new details seem likely to increase the debate about the security and privacy of vast computing systems such as Google’s that now centralize the personal information of millions of individuals and businesses. Because vast amounts of digital information are stored in a cluster of computers, popularly referred to as “cloud” computing, a single breach can lead to disastrous losses.

The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program, according to the person with knowledge of the internal inquiry, who spoke on the condition that he not be identified.

By clicking on a link and connecting to a “poisoned” Web site, the employee inadvertently permitted the intruders to gain access to his (or her) personal computer and then to the computers of a critical group of software developers at Google’s headquarters in Mountain View, Calif. Ultimately, the intruders were able to gain control of a software repository used by the development team…….(New York Times)

Posted in Business, China, Company, cyber attack, Google, hacking, Internet, News, Politics, Social, Spyware, Technology, USA, Virus, World | Comments Off on Google’s Password Control System attacked by Cyber hacking from China

Symantec finds China top source of malware attacks- targeting businesss directors

Posted by Author on March 26, 2010

by Lance Whitney, Via, Mar. 26, 2010-

More malware is now coming out of China than from any other country, according to a new report from Symantec.

The United States still leads the world in the number of malware attacks sent from mail servers. Symantec’s report (PDF) found U.S. mail servers responsible for distributing 36.6 percent of all global malware in March, followed by China at 17.8 percent and Romania at 16.5 percent.

Symantec captured these results by analyzing the IP addresses of sending mail servers. The company uncovered a large amount of malware from the United States in large part because many Web-based e-mail services, such as Gmail and Yahoo Mail, are hosted in the U.S.

But analyzing the source of malware based on the mail servers doesn’t tell the full picture as the sender can use any Web-based e-mail account. By checking the actual sender’s IP address found in the e-mail’s header, Symantec found individuals in China responsible for 28.2 percent of malware, Romania for 21.1 percent, and the U.S. for 13.8 percent. Overall, the analysis discovered that most of the attacks coming from mail services in North American actually stem from other regions, including Asia, Europe, and Africa.

(Credit: Symantec)

“When considering the true location of the sender rather than the location of the email server, fewer attacks are actually sent from North America than it would at first seem,” Paul Wood, a senior analyst at Symantec’s MessageLabs Intelligence, said Thursday in a statement. “A large proportion of targeted attacks are sent from legitimate webmail accounts which are located in the US and therefore, the IP address of the sending mail server is not a useful indicator of the true origin of the attack.”

China, of course, has been in the news lately due to its ongoing battles with Google over search and censorship. China has also been tagged as the source of the cyberattacks launched against Google and other companies.

In its latest analysis, Symantec also discovered more malware targeted to people with specific job roles. The five leading titles hit by malware now include director, senior official, vice president, manager, and executive director. The people receiving a higher number of attacks are typically in charge of foreign trade and defense policy, especially related to Asian countries, said the report.

E-mail file attachments hiding malware continue to be a popular method of attack. The most common types of files found in such e-mails were .xls (Microsoft Excel) and .doc (Microsoft Word) documents. Along with .zip and .pdf files, these four accounted for 50 percent of the files attached to malicious messages this month…… (more details from CNet)

Posted in China, Internet, News, Software, Spyware, Technology, Virus, World | 2 Comments »

Mocmex, An Insidious Computer Virus Made in China, Have Larger Targets

Posted by Author on February 25, 2008

Deborah Gage, San Francisco Chronicle Staff Writer, Friday, February 15, 2008-

An insidious computer virus recently discovered on digital photo frames has been identified as a powerful new Trojan Horse from China that collects passwords for online games – and its designers might have larger targets in mind.

“It is a nasty worm that has a great deal of intelligence,” said Brian Grayek, who heads product development at Computer Associates, a security vendor that analyzed the Trojan Horse.

The virus, which Computer Associates calls Mocmex, recognizes and blocks antivirus protection from more than 100 security vendors, as well as the security and firewall built into Microsoft Windows. It downloads files from remote locations and hides files, which it names randomly, on any PC it infects, making itself very difficult to remove. It spreads by hiding itself on photo frames and any other portable storage device that happens to be plugged into an infected PC.

The authors of the new Trojan Horse are well-funded professionals whose malware has “specific designs to capture something and not leave traces,” Grayek said. “This would be a nuclear bomb” of malware.

By studying how the code is constructed and how it’s propagated, Computer Associates has traced the Trojan to a specific group in China, Grayek said. He would not name the group.

The strength of the malware shows how skilled hackers have become and how serious they are about targeting digital devices, which provide a new frontier for stealing information from vast numbers of unwary PC owners. More than 2.26 million digital frames were sold in 2007, according to the Consumer Electronics Association, and it expects sales to grow to 3.26 million in 2008.

The new Trojan also has been spotted in Singapore and the Russian Federation and has 67,500 variants, according to Prevx, a security vendor headquartered in England.

Grayek said Mocmex might be a test for some bigger attack, because it’s designed to capture any personal, private or financial information, yet so far it’s only stealing passwords for online games.

“If I send you a package but it doesn’t explode, why did I send it?” he said. “Maybe I want to see if I can get it out to you and how you open it.”

The initial reports of infected frames came from people who had bought them over the holidays from Sam’s Club and Best Buy. New reports involve frames sold at Target and Costco, according to SANS, a group of security researchers in Bethesda, Md., who began asking for accounts of infected devices on Christmas Day. So far the group has collected more than a dozen complaints from people across the country.

The new Trojan isn’t the only piece of malware involved. Deborah Hale of Sans said the researchers also found four other, older Trojans on each frame, which may serve as markers for botnets – networks of infected PCs that are remotely controlled by hackers.

There is W32.Rajump, which deposits the same piece of malware that infected some of Apple’s video iPods during manufacturing in October 2006. It gathers Internet Protocol addresses and port numbers from infected PCs and ships them out, according to Symantec. One destination is registered to a service in China that allows people to conceal their own IP addresses.

Then there is a generic Trojan; a Trojan that opens a back door on PCs and displays pop-up ads; and a Trojan that spreads itself through portable devices like Mocmex does.

How all this malware got onto the photo frames and what it’s doing there is unclear. Trojans can download other Trojans, which is part of how botnets are controlled.

While SANS is investigating the infections, the retailers are saying little.

Sam’s Club said it has found no infected frames, and its distributor, Advanced Design Systems, did not return calls seeking comment.

A few Target customers complained about frames distributed by Uniek, a store spokesman confirmed. Target is no longer selling those frames, but that’s because the frames didn’t sell well over the holidays, he said. Target has found no infections, he said, but is watching for them.

Best Buy said one line of its Insignia frames – also now discontinued – was infected during manufacturing but would not provide details.

Costco did not return calls seeking comment.
How to avoid problems

Protecting against these new computer viruses, which so far are aimed at PCs running Windows, is hard – and sometimes impossible.

Updated antivirus software works unless the malware writers get ahead of the antivirus vendors, which is what happened with the new Trojan. Computer Associates, for example, just began protecting against it last week.

While some advise disabling Autorun in Windows, which allows devices to run automatically when they’re plugged into a USB port, it’s not a failsafe. Doing so requires some computer expertise, and this Trojan re-enables Autorun if it’s turned off, according to Brian Grayek of Computer Associates. “If you plug in (the frame), you’re already infected,” he said.

Deborah Hale at SANS suggested that PC users find friends with Macintosh or Linux machines and have them check for malware before plugging any device into a PC.

She also recommended backing up data with an online service such as that offers free backup for home users with less than 2 gigabytes of data. But it does not back up the operating system, she warned. If you’re attacked and your PC fails, you’ll have to reformat and reload all of the programs.

If you think bought an infected device, call your retailer.

— Best Buy: (877) 467-4289

— Sam’s Club: (888) 746-7726

— Target: (800) 591-3869

— Costco: (800) 955-2292

– Original report from San Francisco Chronicle: Virus from China the gift that keeps on giving

Posted in China, Computer, Internet, News, Software, Spyware, Technology, USA, Virus, World | 1 Comment »

UK MI5 Warns 300 Business Leaders of China State-sponsored Spying

Posted by Author on December 4, 2007

AFP, Dec. 1, 2007-

LONDON (AFP) — The head of Britain’s domestic security service has warned business leaders that China has been carrying out state-sponsored espionage against vital parts of the economy.

The director-general of MI5, Jonathan Evans, wrote to 300 chief executives and security heads at banks, accountancy and legal firms, warning them they were under attack from “Chinese state organisations” via the Internet, The Times said Saturday.

It is thought to be the first time London has directly accused Beijing of involvement in web-based espionage, the daily said.

Britain’s Prime Minister Gordon Brown said last weekend he is due to visit China in January next year. The Times said Evans’s warning, which it had seen, threatened to cast a diplomatic shadow over the trip.

In particular, Evans warns companies doing business in China to be on their guard against the Chinese Army, because they were using the Internet to steal sensitive commercial data.

The newspaper quoted a security expert as saying that among the techniques used by Chinese groups were “custom trojans” — software that hacks into a firm’s network and feeds back confidential information.

The MI5 letter, on which the Home Office (interior ministry) refused to comment, includes a list of so-called “signatures” that can be used to identify such trojans, plus Internet addresses used to launch them, it added.

– Original report from AFP : Spy chief warns of China web threat

Posted in Business, China, Computer, Economy, Europe, Internet, Law, News, Politics, Software, Spyware, Technology, UK, Virus, World | Comments Off on UK MI5 Warns 300 Business Leaders of China State-sponsored Spying

China Suspected In New Zealand Government Computer Systems Hacking

Posted by Author on September 11, 2007

By HANK SCHOUTEN, The Dominion Post, Via, New Zea;and, 11 September 2007-

Government computer systems have been hacked into by foreign governments, the country’s chief spymaster says.

Government departments’ websites have been attacked, information has been stolen and hard-to-detect software has been installed that could be used to take control of computer systems, Security Intelligence Service director Warren Tucker said.

In his first interview since taking up the post in November, Mr Tucker said there was evidence that foreign governments were responsible for the attacks.

He would not discuss what country was responsible but referred to comments by Canada’s security service about Chinese spying activities.

Russia and China have been implicated in attacks on the British parliament’s computer system.

Mr Tucker also noted the bungled attempt by Mossad agents from Israel to secure New Zealand passports in 2004.

China was accused last week of hacking into German Government systems and the Pentagon’s computer systems in the United States.

Mr Tucker said the SIS and its kindred agency, the Government Communications Security Bureau, had responded to the cyber attacks by stepping up a security awareness campaign.

In some cases, departments did not even realise their computer systems had been breached.

Sensitive information had been stolen and attempts had been made to gain access to classified information.

In one attack, a department had been penetrated and a programme had been inserted to generate bogus but genuine looking e-mails. Mr Tucker would not name the department or elaborate.

But he said the SIS was stepping up its foreign intelligence gathering operations as part of a realignment of the service, which had just 166 staff when he took over but now has over 200.

“As we’ve stepped up our activities we’ve become more concerned about what we have found,” said Mr Tucker, who consented to the interview on condition that he would not be questioned about Algerian refugee Ahmed Zaoui.

Mr Tucker said the terrorist threat to New Zealand was low but rising – a reflection of overseas concerns about Islamic extremists and the radicalisation of some communities.

The service was engaged on issues of real concern to New Zealand. “The relatively small number of people we monitor are the sort of people you would want us to monitor and would be surprised if we didn’t.”

The SIS had also moved to boost its security vetting of people entering New Zealand and to speed up security clearance processes for people handling sensitive Government information.

The scandal last year when a Beehive messenger leaked a Cabinet paper about the Government’s plan to open Telecom to competition had had a bearing on the initiative.

Mr Tucker, a former director of the Government Communications Security Bureau, told The Dominion Post he believed there was a need for the service to be more open, accessible and more closely aligned to the core values of New Zealand, which were integrity, trustworthiness, being upfront and a willingness to admit mistakes.

It was important for the SIS to be seen as an integral part of the machinery of government, and that its work was seen as necessary and important and that the service was trusted.

– Original report from : NZ spies uncover cyber attacks

Posted in China, Computer, Hacker, Internet, Law, New Zealand, News, People, Politics, spy, Spyware, Technology, Virus, website, World | Comments Off on China Suspected In New Zealand Government Computer Systems Hacking

China Hosts 44.8% of The World’s Malware-infected Websites

Posted by Author on September 5, 2007

According to a report released Monday by antivirus company Sophos, China– including Hong Kong– hosted 44.8 percent of the world’s infected sites in August. The U.S. ranked a distant second, hosting 20.8 percent of sites that contain malicious code, reported by CNET

Some new spam tricks revealed by Sophos on its website:

Spammers continue to find new and more devious ways to evade detection. Recent tricks include using attachments such as PDFs. These can contain clickable links, which makes this file format particularly attractive to spammers as links to malicious URLs can be included.

The links in spam email lure users to compromised webpages, where spyware and other malware is automatically installed on the users’ computers.

Once infected, compromised computers can be used to steal confidential data and trade secrets or to spam out millions of emails. In June, SophosLabs™ identified nearly 30,000 new malicious webpages daily.

“Sophos security threat report: Update July 2007” can be downloaded from this page: Trends in malware threats

Posted in China, Computer, email, Hong kong, Internet, Law, News, Software, Technology, Virus, website, World | Comments Off on China Hosts 44.8% of The World’s Malware-infected Websites

%d bloggers like this: