News & Information for Technology Purchasers NewsFactor Sites:     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
You are here: Home / World Wide Web / Who Hacked the Dalai Lama?
DDoS Protection Powered By Verisign
Who's Behind the Dalai Lama Website Hack?
Who's Behind the Dalai Lama Website Hack?
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus

The Dalai Lama has been hacked. Well, at least his Chinese-language website has. According to Kaspersky Lab experts, a snippet of code on the Central Tibetan Administration website redirects Chinese-speaking visitors to a Java exploit that drops an advanced persistent threat-related backdoor.

In a blog post, Kaspersky's Kurt Baumgartner explained that the attack itself is precisely targeted. An appended, embedded iframe redirects the Chinese-speaking visitors to a Java exploit that maintains a backdoor payload.

"The English and Tibetan versions of the website do not maintain this embedded iframe on the Chinese version," he said. "At this point in time, it seems that the few systems attacked with this code are located in China and the U.S., although there could be more . . . Backdoors detected with the Swisyn verdict are frequently a part of APT-related toolchains, and this one most certainly is."

Watering Hole Attacks

Baumgartner said the Java exploit appears to attack the older CVE-2012-4681 vulnerability, which he called "a bit of a surprise." An actor distributing the original CVE-2012-4681 zero-day Gondzz.class and Gondvv.class in August 2012 used it.

"The Payload.main method contains some interesting but simple capabilities that enable an attacker to download the payload over https and AES decrypt it using Java's built-in AES crypto libraries, but the package is not configured to use that code in this case," he said.

"Instead, a couple of lines in its configuration file direct the exploit to drop and execute the jar file's win32 exe resource. The backdoor itself is detected by most of the AV crowd as variants of gaming password stealers, which is flatly incorrect," he added.

Baumgartner also noted that this threat actor has been quietly operating these sorts of watering hole attacks for at least a couple years along with the standard spearphishing campaigns against a variety of targets that include Tibetan groups.

Is it the Government?

Several security researchers declined to comment on the issue. We asked Rob Enderle, principal analyst at The Enderle Group, for his sense about what is going on. He told us this appears to be another example of governments using hackers to find out what their citizens are doing and attempting to eliminate dissention before it can emerge.

"Since the Dalai Lama is somebody the Chinese government isn't particularly fond of and since they would probably like to know who's visiting that site -- given the target -- you'd assume this is a Chinese government attack," Enderle said.

"You would think criminals that wanted to exploit individuals would probably target a site where rich people go," he added. "If you are a criminal organization would you really spend your time targeting the Dalai Lama's site?"

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter
MAY BE OF INTEREST is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.

NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.