News

Google Points to China Again in Gmail Hack

According to Google, Jinan, China-based hackers accessed hundreds of users, including U.S. government officials, military personnel, journalists, Chinese political activists and officials of several Asian countries, most of them in South Korea.

In a post on the Google blog, the company said the hackers likely used phishing tactics to get users to give up their passwords with the intent of monitoring their e-mail messages. The attackers also apparently changed users' forwarding and deletion settings, Google said. Gmail lets users forward e-mail messages automatically and give other users access to the account.

The Washington Post, quoting a U.S. government official with knowledge of the attack, said the account of one Cabinet official was among those hacked.

The hackers gained access to a large amount of content, the Post reported, although the attack was limited to personal accounts; no official government accounts were breached. The FBI was notified of the attack last week. The Chinese government denied any involvement, calling Google's claims a "fabrication," the Washington Post reported.

Google said it disrupted the attack, notified the affected users and secured their accounts.

The targeted attack continues a trend toward under-the-radar attacks that successfully use phishing and other tactics to gain access to user accounts and network systems. The intent isn't to disrupt systems, but to quietly infiltrate them and gather information.

Similar attacks, often called Advanced Persistent Threats, have been used in recent high-profile breaches, such as those at Oak Ridge National Laboratory and RSA Security.

In March attackers gained access to information about RSA Security's SecurID authentication tokens, which subsequently were used in recent breaches of defense contractors Lockheed Martin and L3 Communications.

Google said the Gmail hack didn't disrupt its internal systems and contended that the problem wasn't with Gmail's security. Its blog post urged users to improve their approach to security, offering seven steps they could take, including using two-step verification, strong passwords used only with Gmail, and using Gmail features to monitor for their accounts for suspicious forwarding, delegated accounts and other activity.

About the Author

Kevin McCaney is the managing editor of Government Computer News.

Featured

  • Spaceflight Training in the Middle of a Pandemic

    Surprisingly, the worldwide COVID-19 lockdown has hardly slowed down the space training process for Brien. In fact, it has accelerated it.

  • Surface and ARM: Why Microsoft Shouldn't Follow Apple's Lead and Dump Intel

    Microsoft's current Surface flagship, the Surface Pro X, already runs on ARM. But as the ill-fated Surface RT showed, going all-in on ARM never did Microsoft many favors.

  • IT Security Isn't Supposed To Be Easy

    Joey explains why it's worth it to endure a little inconvenience for the long-term benefits of a password manager and multifactor authentication.

  • Microsoft Makes It Easier To Self-Provision PCs via Windows Autopilot When VPNs Are Used

    Microsoft announced this week that the Windows Autopilot service used with Microsoft Intune now supports enrolling devices, even in cases where virtual private networks (VPNs) might get in the way.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.