{"id":200457,"date":"2015-04-11T02:16:15","date_gmt":"2015-04-11T06:16:15","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/chinas-great-cannon-ddos-tool-enforces-internet-censorship.php"},"modified":"2015-04-11T02:16:15","modified_gmt":"2015-04-11T06:16:15","slug":"chinas-great-cannon-ddos-tool-enforces-internet-censorship","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/censorship\/chinas-great-cannon-ddos-tool-enforces-internet-censorship.php","title":{"rendered":"China&#39;s &#39;Great Cannon&#39; DDoS tool enforces Internet censorship"},"content":{"rendered":"<p><p>    China is deploying a tool    that can be used to launch huge distributed denial-of-service    (DDoS) attacks to enforce censorship. Researchers have dubbed    it the Great Cannon.  <\/p>\n<p>    The first time the tool was    seen in action was during     the massive DDoS attacks that hit software development platform    GitHub last month. The attack sent large amounts of traffic    to the site, targeting Chinese anti-censorship projects hosted    there. It was the largest attack the site has endured in its    history.  <\/p>\n<p>    That attack was first thought    to have been orchestrated using Chinas Great Firewall, a    sophisticated ring of networking equipment and filtering    software used by the government to exert strict control over    Internet access in the country. The firewall is used to block    sites like Facebook and Twitter as well as several media    outlets.  <\/p>\n<p>    However, while the Great    Cannon infrastructure is co-located with the Great Firewall,    it is a    separate, offensive system, with different capabilities and    design, said researchers at the University of California,    Berkeley, and the University of Toronto on Friday.  <\/p>\n<p>    The Great Cannon is not    simply an extension of the Great Firewall, but rather a    distinct tool that hijacks traffic to individual IP addresses,    and can arbitrarily replace unencrypted content by sitting    between the Web server and end usera method known as a    man-in-the-middle attack. The system is used to manipulate the    traffic of systems outside of China, silently programming    browsers to create a massive DDoS attack, the researchers    said.  <\/p>\n<p>    The attack method deployed    against Github injected malicious Javascript into browsers    connecting to the Chinese search engine Baidu. When the Great    Cannon sees a request for certain Javascript files on one of    Baidus infrastructure servers that host commonly used    analytics, social, or advertising scripts, it appears to take    one of two actions. It either passes the request to Baidus    servers, which has happened over 98 percent of the time, or it    drops the request before it reaches Baidu and instead sends a    malicious script back to the requesting user, which has    happened about 1.75 percent of the time, the report    said.  <\/p>\n<p>    In the latter case, the    requesting user would be an individual outside China browsing a    website making use of a Baidu infrastructure server, such as    sites with ads served by Baidus ad network. In the DDos attack    against GitHub, the malicious script was used to enlist the    requesting user as an unwitting participant, the report    said.  <\/p>\n<p>    These findings are in line    with an analysis by the Electronic Frontier Foundation (EFF)    that described the attack method used last week. According to    the EFF, the attack was obviously orchestrated by people who    had access to backbone routers in China and     was only possible because the Baidu analytics script that is    included on sites does not use encryption by default. A    wider use of HTTPS could have prevented the attack, it    found.  <\/p>\n<p>    The Berkeley and Toronto    researchers confirmed the suspicions about the origin of the    attack, saying they believe there is compelling evidence that    the Chinese government operates the cannon. They tested two    international Internet links into China belonging to two    different Chinese ISPs, and found that in both cases the Great    Cannon was co-located with the Great Firewall. This strongly    suggests a government actor, they said.  <\/p>\n<p>    While DDoS attacks are quite    crude, the Great Cannon can also be used in more sophisticated    ways. A technically simple configuration change, switching the    system to operating on traffic from a specific IP address    rather than to a specific address, would allow Beijing to    deliver malware to any computer outside of China that    communicates with any Chinese server not employing    cryptographic protections, they said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/2908912\/chinas-great-cannon-ddos-tool-enforces-internet-censorship.html\/RK=0\/RS=ol_u4XQy0P0RiXnU5kuyyLhhcTI-\" title=\"China&#39;s &#39;Great Cannon&#39; DDoS tool enforces Internet censorship\">China&#39;s &#39;Great Cannon&#39; DDoS tool enforces Internet censorship<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> China is deploying a tool that can be used to launch huge distributed denial-of-service (DDoS) attacks to enforce censorship. Researchers have dubbed it the Great Cannon.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/censorship\/chinas-great-cannon-ddos-tool-enforces-internet-censorship.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[388393],"tags":[],"class_list":["post-200457","post","type-post","status-publish","format-standard","hentry","category-censorship"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/200457"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=200457"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/200457\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=200457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=200457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=200457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}