News

Internet Espionage a Great Equalizer

Report documents how cyber threats are becoming a low-cost tool for intelligence gathering.

Even the Dali Lama isn't safe from hacking, according to a new report.

The report, "Shadows in the Cloud," documents Internet espionage operations that targeted and compromised computer systems in India and the offices of the Dalai Lama, among other instances. Cyber threats are now the great equalizer around the world.

"Countries no longer have to spend billions of dollars to build globe-spanning satellites to pursue high-level intelligence gathering when they can do so via the Web," the report's authors write.

Most of this clandestine activity is aimed at the world's two fastest growing economies in China and India, according to the report. In the case of the Dalai Lama, hackers extracted an entire year's worth of e-mail messages to and from the spiritual leader.

The joint report by the Information Warfare Monitor and Shadowserver Foundation monitored attacks originating from the People's Republic of China, particularly Chengdu, the capital of China's Sichuan province. However, the report stops short of saying that these attacks are government sanctioned or have the official mandate of any government.

The report's release comes at a pivotal time. Google Inc. recently stopped censoring its Google.cn portal for the Chinese government after human rights advocates' e-mail accounts were tapped by hackers traced to China. Last week, Google turned its attention to Vietnam, where it says attackers have spread malware through Vietnamese language keyboard software, using that tactic to curtail political dissent.

Andrew Storms, director of security at security software firm nCircle, suggested that political spying over the Internet is now widespread.

"The only surprise [from the report] is the expectation that there's any major world power that isn't engaged in some form of cyber-monitoring of both friendly and adversarial relationships," Storms said. "The reality is that every country is vulnerable to cyber espionage and cyber attack."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • Microsoft Adds Privileged Identity Management Delegation to Azure Lighthouse

    The commercial release of Privileged Identity Management (PIM)-enabled Azure Lighthouse delegations is now available, Microsoft on Monday announced.

  • Microsoft Commercially Releases Entra Workload Identities

    Microsoft announced on Monday that its Entra Workload Identities service is now available as a commercial product offering, having reached the "general availability" stage.

  • The 2022 Microsoft Product Roadmap

    Microsoft has a lot in the docket for 2022, including new products like SQL Server 2022, Exchange Subscription Edition and Visual Studio 2022 for Mac.

  • OpenSSF Adopts Microsoft Open Source Software Security Guidelines

    The Open Source Security Foundation (OpenSSF) announced on Wednesday that it has adopted the Secure Supply Chain Consumption Framework (S2C2F) for ensuring the secure use of open source software (OSS) by developers.