Tuesday, June 28, 2022
  • Hype
  • Murai
  • Lipstiq
  • Diva
  • Varnam
  • Moviedash
  • Autofreaks
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
No Result
View All Result
Home News Internet

China’s “Great Cannon” Turns Unsuspecting Users Into DDoS Machines

by Farhan
April 13, 2015
China’s “Great Cannon” Turns Unsuspecting Users Into DDoS Machines
Share on FacebookShare on Twitter

China Flag

Several anti-censorship site came under DDoS attack last month, an act that investigators noted came out of China. While many suspected that the Great Firewall of China was being turned into a weapon, the truth has turned out to be much worse. Calling it the “Great Cannon”, researchers have uncovered details about China’s latest internet weapon.

Both GreatFire.org and a mirror site for the Chinese version of the New York Times came under heavy DDoS attack last month, and what was unusual was sustained length of the attack. It lasted for close to a week, and did not abate despite defensive measures being taken.

image01-1024x735

Researchers at the time noted that the attack was coming out of China, which had apparently repurposed ads to redirect traffic at the targeted websites. However, new information indicates that this was only a small part of the Great Cannon, which intercepts foreign traffic coming into the country. This not only allows its to monitor all incoming traffic, but also alter it as the government sees fit. It could be that the DDoS attack last month was simply a trial run, and the Chinese government is still fine tuning how the weapon works.

Internet users do not even have to surf into Chinese websites like Baidu, where the original attack came from, to become trapped by the Great Cannon. Researchers speculate that any site serving ads from China could also potentially end up injecting malicious code into computers.

image03-1024x809

ADVERTISEMENT

While the DDoS attack was a demonstration of what the Great Cannon is capable of, it doesn’t appear to be the only thing it can do. The system is built into China’s internet backbone, which allows it access to all traffic. Unlike the Great Firewall that is an “on-path” system that is designed mainly for eavesdropping on communications. Although both function as very powerful tools for online censorship.

That being said, China is not the first country to deploy this sort of cyber-weapon. Documents by Whistleblower Edward Snowden revealed a similar threat deployed by the American NSA and their British counterparts in the GCHQ. Called Quantum, the system functions in the same way as the Great Cannon; although neither the NSA nor the GCHQ has deployed it in such a blatant show of force.

The_Pentagon_January_2008

Quantum was mainly used to redirect traffic to a site of the operators’ choosing in order to perform targeted surveillance. Not that the act was any less dangerous for the average internet user.

There is little that can be done when the source of the online threat happens to lie on the internet backbone of a country, and it will be interesting to see how nations respond to this latest turn of events.

[Source: The New York Times]

Tags: Censorshipchinachina internet censorshipcyber attackddosGCHQGreat CannonInternetMalwareNSA
Back to top
ShareTweetSendShare

ADVERTISEMENT

RELATED ARTICLES

Google Shutting Down Hangouts This November
Software

Google Shutting Down Hangouts This November

by John Law
June 28, 2022

Google announced that it is shutting down Hangouts users and migrating the app to Chat, once the app will no...

Read more
micro-mobility guidelines speed limit
News

Speed Limit Of 25 km/h For Micro-Mobility Vehicles Being Considered

by Heirul Kamel
June 28, 2022

As revealed by transport minister Wee Ka Siong on 13 June, the government will introduce guidelines on the use of...

Read more
Luno Launches New Campaign To Encourage Wider Adoption
Cryptocurrency

Luno Launches New Campaign To Encourage Wider Adoption

by John Law
June 28, 2022

Luno launched its latest campaign, “Move with Luno” to promote personal finance journeys as well as achieve "financial fitness". The...

Read more
Logitech Lift vertical ergonomic mouse
Lightning Reviews

Logitech Lift Mouse Lightning Review: Not Essential, But Still Comfortable

by Ikmal Rozlan
June 28, 2022

Those who work with a computer daily know all too well the cramps, fatigue, pronation, and supination that are afflicted...

Read more
Load More
No Result
View All Result

TRENDING TODAY

  1. 1
    E-Hailing

    Gojek Confirms It Will Not Be Entering Malaysia

  2. 2
    News

    Employees Can Apply For Flexible Working Arrangements Starting 1 September

  3. 3
    E-Hailing

    Gojek Might Be Coming To Malaysia As Logo-Bearing Vehicle Spotted In KL

Lowyat.NET

Consumer Tech News & Reviews Malaysia

NETWORK

  • Hype
  • Murai
  • Lipstiq
  • Diva
  • Varnam
  • Moviedash
  • Autofreaks

ABOUT

  • Advertise
  • Careers
  • Privacy Statement
  • Contact Us
  • Editorial Policy
  • Terms & Conditions

©2022 LOWYAT MEDIA, LLC. ALL RIGHTS RESERVED.

No Result
View All Result
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables

©2022 LOWYAT MEDIA, LLC. ALL RIGHTS RESERVED.

We use cookies to improve your experience. Learn More.