Wikileaks hit by 'denial of service attack'

On the day it began leaking US embassy cable communications, Wikileaks says it was hit by hackers.

Wikileaks

Wikileaks claimed to have been hit by a "mass distributed denial of service attack" yesterday.

The revelation came over the organisation's Twitter page on the day Wikileaks started to release a range of US Embassy cable communications.

The released data includes cables from 1966 up to the end of February 2010, covering confidential communications between 274 embassies in countries across the world and the US.

Advertisement - Article continues below

Wikileaks' website is now up and running as it continues to leak documents.

A hacker going by the name of th3j35t3r' claimed over Twitter to have been responsible for taking down the website.

Administrations across the world have raised concerns about the fallout of the leaks, with the US condemning the actions of Wikileaks, claiming the lives of diplomats have been placed at risk.

Julian Assange, Wikileaks founder, countered by claiming US authorities were worried about being held to account.

China hack

Although the documents have not been fully released yet, as they will be trickled out over the coming months, some information has emerged.

One document, picked up by the New York Times, claimed to cover communications from a Chinese contact telling the American Embassy in Beijing that China's Politburo had ordered a hack attack on Google.

Advertisement
Advertisement - Article continues below

The cable also reportedly suggested the Google hack formed part of a wider operation by the Chinese Government to breach systems including those of Western allies and US businesses.

Advertisement - Article continues below

According to the communications, the hacking work had been going on since 2002.

Google had threatened to leave China altogether earlier this year following claims the search giant had been hit by hack emanating from the emerging economic superpower. Google also cited issues with censorship controls in the country as a reason for potentially pulling out.

David Harley, senior research fellow at ESET, still had reservations about the provenance and motivations behind the attack.

"While Wikileaks has turned up some interesting comment from government officials, it would be naive to assume that these people have the best understanding of what's really happening," Harley told IT PRO.

"We do know that there's been quite a lot of samurai (hackers-for-hire) activity out of China for quite a few years, targeting both military and commercial enterprises, and some of that is claimed (in some cases, by the perpetrators) to have been state or military-sponsored, so given the difficulties between Google and China in the past year, we're clearly not looking at the flatly impossible."

Advertisement - Article continues below

Business message?

Nick Lowe, head of Western Europe sales for Check Point, said the fact that many workers had authorised access to the US Government network SIPRNET, from which the information was leaked, showed controls may not have been adequate.

"The fact that hundreds of thousands of authorised users had access to SIPRNET, and could download material to removable storage devices like memory sticks or DVDs, means there's huge potential for a breach - especially when the data written to the removable storage isn't encrypted," he added.

"Having policies alone on data security issues simply isn't enough. These have to be backed up by technology that applies security automatically, so that users cannot tamper with or work around it. Otherwise leaks are simply inevitable."

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement
Advertisement

Recommended

Visit/mobile/google-android/355837/arizona-files-lawsuit-against-google-for-illegally-tracking-android
Google Android

Arizona files lawsuit against Google for illegally tracking Android users’ locations

29 May 2020
Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/network-internet/email-providers/355822/gmail-introduces-new-features-to-makes-personalizing-your
email providers

Gmail introduces new features to makes personalizing your inbox easier

28 May 2020
Visit/security/phishing/355810/zloader-malware-returns-as-a-coronavirus-phishing-scam
phishing

ZLoader malware returns as a coronavirus phishing scam

27 May 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/data-breaches/355777/easyjet-faces-class-action-lawsuit-over-data-breach
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020