News

Google Points to China Again in Gmail Hack

According to Google, Jinan, China-based hackers accessed hundreds of users, including U.S. government officials, military personnel, journalists, Chinese political activists and officials of several Asian countries, most of them in South Korea.

In a post on the Google blog, the company said the hackers likely used phishing tactics to get users to give up their passwords with the intent of monitoring their e-mail messages. The attackers also apparently changed users' forwarding and deletion settings, Google said. Gmail lets users forward e-mail messages automatically and give other users access to the account.

The Washington Post, quoting a U.S. government official with knowledge of the attack, said the account of one Cabinet official was among those hacked.

The hackers gained access to a large amount of content, the Post reported, although the attack was limited to personal accounts; no official government accounts were breached. The FBI was notified of the attack last week. The Chinese government denied any involvement, calling Google's claims a "fabrication," the Washington Post reported.

Google said it disrupted the attack, notified the affected users and secured their accounts.

The targeted attack continues a trend toward under-the-radar attacks that successfully use phishing and other tactics to gain access to user accounts and network systems. The intent isn't to disrupt systems, but to quietly infiltrate them and gather information.

Similar attacks, often called Advanced Persistent Threats, have been used in recent high-profile breaches, such as those at Oak Ridge National Laboratory and RSA Security.

In March attackers gained access to information about RSA Security's SecurID authentication tokens, which subsequently were used in recent breaches of defense contractors Lockheed Martin and L3 Communications.

Google said the Gmail hack didn't disrupt its internal systems and contended that the problem wasn't with Gmail's security. Its blog post urged users to improve their approach to security, offering seven steps they could take, including using two-step verification, strong passwords used only with Gmail, and using Gmail features to monitor for their accounts for suspicious forwarding, delegated accounts and other activity.

About the Author

Kevin McCaney is the managing editor of Government Computer News.

Featured

  • Microsoft Adds 6 More Months to Expiring Certification Programs

    Microsoft has announced an extension to the end date of three certification programs slated for retirement.

  • Microsoft's Surface Pro X: It's Like the Surface RT, But Better

    There's a lot about the Surface Pro X that's reminiscent of the ill-fated Surface RT. But despite the similarities, this might just be one of the rare cases where the sequel is better than the original.

  • Q&A: The Challenges of Securing All Those Newly Remote Workers

    Security expert Dale Meredith identifies cybersecurity challenges, best practices and major concerns resulting from all the employees forced into home offices by COVID-19.

  • Astronaut Survival Training: A Crash Course in Sea Survival

    Lots of things can go wrong during a commercial spaceflight -- especially once your capsule leaves space. An unplanned ocean landing is just one of those worst-case scenarios.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.