Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic National Defense Magazine 11/12/2010 For 18 minutes in April, China’s state-controlled telecommunications company hijacked 15 percent of the world’s Internet traffic, including data from U.S. military, civilian organizations and those of other U.S. allies. This massive redirection of data has received scant attention in the mainstream media because the mechanics of how the hijacking was carried out and the implications of the incident are difficult for those outside the cybersecurity community to grasp, said a top security expert at McAfee, the world’s largest dedicated Internet security company. In short, the Chinese could have carried out eavesdropping on unprotected communications — including emails and instant messaging — manipulated data passing through their country or decrypted messages, Dmitri Alperovitch, vice president of threat research t McAfee said. Nobody outside of China can say, at least publicly, what happened to the terabytes of data after the traffic entered China. The incident may receive more attention when the U.S.-China Economic and Security Review Commission, a congressional committee, releases its annual report on the bilateral relationship Nov. 17. A commission press release said the 2010 report will address “the increasingly sophisticated nature of malicious computer activity associated with China.” Said Alperovitch: “This is one of the biggest — if not the biggest hijacks — we have ever seen.” And it could happen again, anywhere and anytime. It’s just the way the Internet works, he explained. “What happened to the traffic while it was in China? No one knows.” The telephone giants of the world work on a system based on trust, he explained. Machine-to-machine interfaces send out messages to the Internet informing other service providers that they are the fastest and most efficient way for data packets to travel. For 18 minutes April 8, China Telecom Corp. told many ISPs of the world that its routes were the best paths to send traffic. For example, a person sending information from Arlington, Va., to the White House in Washington, D.C. — only a few miles away — could have had his data routed through China. Since traffic moves around the world in milliseconds, the computer user would not have noticed the delay. This happens accidentally a few times per year, Alperovitch said. What set this incident apart from other such mishaps was the fact that China Telecom could manage to absorb this large amount of data and send it back out again without anyone noticing a disruption in service. In previous incidents, the data would have reached a dead end, and users would not have been able to connect. Also, the list of hijacked data just happened to include preselected destinations around the world that encompassed military, intelligence and many civilian networks in the United States and other allies such as Japan and Australia, he said. “Why would you keep that list?” Alperovitch asked. The incident involved 15 percent of Internet traffic, he stressed. The amount of data included in all these packets is difficult to calculate. The data could have been stored so it could be examined later, he added. “Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat,” Alperovitch said. McAfee has briefed U.S. government officials on the incident, but they were not alarmed. They said their Internet communications are encrypted. However, encryption also works on a basis of trust, McAfee experts pointed out. And that trust can be exploited. Internet encryption depends on two keys. One key is private and not shared, and the other is public, and is embedded in most computer operating systems. Unknown to most computer users, Microsoft, Apple and other software makers embed the public certificates in their operating systems. They also trust that this system won’t be abused. Among the certificates is one from the China Internet Information Center, an arm of the China’s Ministry of Information and Industry. “If China telecom intercepts that [encrypted message] and they are sitting on the middle of that, they can send you their public key with their public certificate and you will not know any better,” he said. The holder of this certificate has the capability to decrypt encrypted communication links, whether it’s web traffic, emails or instant messaging, Alperovitch said. “It is a flaw in the way the Internet operates,” said Yoris Evers, director of worldwide public relations at McAfee. No one outside of China can say whether any of these potentially nefarious events occurred, Alperovitch noted. “It did not make mainstream news because it is so esoteric and hard to understand,” he added. It is not defined as a cyberattack because no sites were hacked or shut down. “But it is pretty disconcerting.” And the hijacking took advantage of the way the Internet operates. “It can happen again. They can do it tomorrow or they can do it in an hour. And the same problem will occur again.” Posted at 9:50 AM by Stew Magnuson | Permalink | Email this Post | Comments (23) Comments Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic This is a huge wake up call to our Cyber Policy Leadership in the White House and in the Pentagon. The US should not be doing ANY business with China owned telecom/equipment companies for this very reason. I would have liked to seen a perspective on China's effort to buy into US based Telecom companies. This significantly increases the threat, and requires immediate action. Federal Agencies will need to step up their technology acquisition processes to include a check for potential Chinese made routers, switches and/computers that could expand China's ability to break into our secure networks. John A Weiler at 11/15/2010 5:20 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic As Michael Stevens mentions in his article titled, "China's Growing Cyber Threat, "China is directing “the single largest, most intensive foreign intelligence gathering effort since the Cold War” against the United States." http://www.securityweek.com/chinas-cyber-threat-growing China is investing in the resources needed for “building an informationalized force and winning an informationalized war,” including a 1,100 person cyber operation with a submarine cave entrance worthy of a James Bond film, all hidden beneath the white sands and villages of Hainan Island, a popular tourist destination. Mike at 11/15/2010 11:49 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Where's the part about Deutsche Telekom who's been hijacking data streams for specific Shanghai IP ranges for several WEEKS? (A slowdown which *was* noticeable by those affected.) jeff at 11/16/2010 1:01 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic wow. that's crazy. i thought the rule was just don't browse the internet in china. didn't realize they could still attack me in my own home. sucks. http://tech.rawsignal.com troy at 11/16/2010 1:34 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Talk to Cisco. David C. Manchester at 11/16/2010 2:12 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic I am sorry to say that, but you are wrong regarding the safety of encrypted communication. The peers using encryption to communicate, exchange the public keys. As the word 'public' means, there is no harm if the public key is known to a third party, because the key is intended to be known to anybody. Indeed, there is some risk of the man-in-the-middle attack but your e-mail agent, web browser or ssh terminal should inform you the security certificate of the peer is not trusted. See: en.wikipedia.org/wiki/Diffie–Hellman_key_exchange Maksymilian Wojakowski at 11/16/2010 2:35 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic One of the biggest weaknesses is the list of "root certificates" bundled with every browser. It is not a standard list, every browser developer has its own rules and regulations what he will add. There was a security incident a few months ago that all major browsers were adding an old, out-of-use certificate that no one really knew well. Then, a lot of root certificates are from US based companies - and it is already known that some US state agencies can easily decrypt traffic that is encrypted via these certificates by using special "keys". I suppose it will be the same for China state agencies and the Chinese certificates. In our case (https://secure.cloudsafe.com/) we opted for a Swiss root certificate. It is one of the very few independent and secure authorities in the world. Roberto at 11/16/2010 3:45 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic "from Arlington, Va., to the White House in Washington, D.C. — only a few miles away — could have had his data routed through China" Quite unlikely, while the prefix might have been pick-up, the routers would have been determined it is not the best path from VA to China to the White House, and would have choose to send traffic in China due to the cost of such routing. The incident lasted 18 minutes. The one really impacted might have been Asian traffic, but due to the time line of the incident a human error is a very possible scenario too. Cliffer at 11/16/2010 4:48 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Cisco what have you done? It's ironic. A U.S Company named Cisco is the one who provides China with all the hi-tech network devices. USA is really a weird country. You promote Chinas activities by selling and cooperating with them the best network equipment and the most advanced., yet you start whining when they hijack the world and your own country. J at 11/16/2010 5:55 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Tea cup + Storm. Why are some people in the states so freaked out about China? Get over it. They are no threat. Not now, not before and not in the future - learn from history people. As to the key stuff...the author thinks we are all dumb and has forgotten about the concept of one way trap door algorithms, DH encryption and finger printing. I am reminded of that South Park episode that came out the week after the 2008 Olympics.... pathetic. Richard Ford at 11/16/2010 6:20 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Trust the SWISS? Perhaps you should read: http://en.wikipedia.org/wiki/Crypto_AG It is a well known case of how it was leaked that a very respected Swiss company was a front for NSA operations. Even the Vatican threw away some of their encryption devices in the 90s once this information became public knowledge. Good Luck against the Chinese. The world has given them the keys to the kingdom they produce the chips that run the worlds computers, no? Feeble attempts from people that do not know what goes into the microcode....Game over Bubba! Swiss Cheese at 11/16/2010 6:45 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic @Roberto - It doesn't matter which CA one uses. As long as another CA appears in a browser's trusted root list, that other CA can issue a rogue certificate against our domain. There is no added benefit of using one CA over another. All CAs in the browser's trusted root list have equal standing. cjp at 11/16/2010 9:32 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic The description of "Internet encryption" in this piece, particularly in the context of discussing military and intelligence traffic, is simplistic and unbecoming of a publication with the word "defense" in the title. There are other means of doing transport security on the Internet, ones that do not rely on assymetric keys at all, or employ securely managed assymetric keying -- it is fairly disappointing this is so completely missed here. JHK at 11/16/2010 10:32 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic BGPmon.net has a detailed explanation of what exactly happened that day: http://bgpmon.net/blog/?p=282 If this was an intentional attack instead of an accident, they didn't really try to hide this attack. There are ways to have this attack executed in a more stealth mode. BGP Dude at 11/16/2010 11:17 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Er, anyone got any proof? Of course not. Anti Chinese propaganda. Uncle Sam's got no money left and wants to blame someone, how about the guys that have been lending you theirs. Pathetic. Geltmeister at 11/16/2010 3:49 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Yeah...but...but....but they like paper lanterns, and dragon parades and the "pop-pop-pop" of firecrackers and Americans love Crab Rangoon and General TSO's chicken. They must be our friends. Vox at 11/16/2010 4:43 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic The list of certificates bundled with every web browser on the planet includes multiple certificates under the control of the Chinese Government. Given access to these certs, the protections provided by SSL and S/MIME are worthless. CA Dude at 11/16/2010 5:11 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic "Since traffic moves around the world in milliseconds, the computer user would not have noticed the delay." This is not correct. Traffic going from the East coast to China and back, even at close to the speed of light, will always take much longer than "sending information only a few miles away". Washington, DC to Beijing, China and back is 23342 miles, or 0.125 light seconds, whereas "a few miles" would be closer to 0.00001 seconds. That's why large web sites distribute their content on servers across the globe, so the one closest to the user can respond. Mike at 11/16/2010 5:45 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic This article is so-god-damned simplistic and more rumors. The Chinese didn't even try to hide it as per the BGPmon.net monitor. I'm 99% sure this was simply a fat-finger good old fashioned programming error on their peering/IP transit routers. This has HAPPENED MANY TIMES IN THE US/CANADA AND EUROPE. Oh and BTW, the Chinese great firewall/DPI (deep packet inspection) "Golden Shield" according to public documents these days is mostly Huawei high-end routers including the NE80E, SIG9800 and a few others. Huawei have sold this product WORLDWIDE including Europe and the Middle East and they simply market the product/engineer the product like Cisco & Juniper. The Chinese government (aka CCP, some propaganda department probably) is responsible for the operation of the filter lists which gets passed to the semi-nationalized telecom operators (China Telecom, China Unicom/(ex. Netcom), China Mobile and a few others licensed for international inter-connect). China Telecom uses AS4134 and Unicom/Netcom uses 4837 for international peering with foreign countries. There are a few other Chinese AS'es I believe but those are for special reserved usage like VPN. The way it works is very simple, there are two layers. There's an internal AS layer within the provinces of China (not connected to outside the country) and an international layer. All international peering/IP-transit traffic is connected to a Cisco/Juniper device which passes all traffic to a Huawei DPI (deep packet inspection) for high-speed ASIC based filtering. If a keyword matches (e.g. twitter, facebook) the packet is dropped and the Chinese have aggregate logged data of filtered data like any other commercial product off the Huawei device. It is technically impossible to do massive packet capture unless they are specifically targeting something. The Chinese-fucked up routes probably sent to Chinese-border international border routers, their Huawei DPI probably dropped those packets. They also manipulate/use faux-DNS using their Huawei DPI. (So if you use opendns in China the DNS will still be manipulated, it's TIME FOR ENCRYPTED DNS!) Here's another open industry secret: The Chinese like any other international ISP have to connect their network to the international internet up-stream ISPs/ASN's right. I believe now they even have some of their DPI hardware in the US/Europe. Again all public data, see: https://www.peeringdb.com/private/participant_view.php?id=308 https://www.peeringdb.com/private/participant_view.php?id=730 If the US gov't really wanted to see China's internet filter lists they could theoretically do the following (again this would be POLITICAL SUICIDE I'M GUESSING AND possibly touch off a war with China, and would require a warrant obviously): Go to Any2 LA or Equinix San Jose or any other Chinese international peering/IP-transit place and go to China Telecom or China Unicom's cage. Seize the Huawei DPI device. Simple. Copy the data. Do analysis. Return it back to the Chinese!? LOL. It's a Chinese-registered APNIC IP with a public WHOIS registration of "FSKWC NET". Mhmm... F must standard for Firewall. Must be the Chinese-DPI-GFW firewall cluster. The internet community has discovered that all traffic to Mainland China passes through a FSKWC NET device before it goes further in-ward to China. Some of these devices we know are in the US and Europe where the Chinese peer before they are sent across the pacific on one of the Trans-pacific or Eur-Asia fiber-optic cables (TPE, etc...) The real problem with China is political and political change. I believe this will change over time as change evolves, develops and moves towards a more open model. As an engineer I really don't care about political crap, I wish they would just develop an open internet policy like HK or Singapore or Japan. Filtering political extremism is fine for stability (remember in Chinese thinking/culture it's all about "stability" versus "individuality" in the West), just don't filter entertainment sites like YouTube/Twitter or Facebook. 99.9% of IP traffic to those sites are entertainment anyways. Wasn't there a recent study that says 60% of tweets to twitter was un-read anyways? I just don't want to use my god-damned VPN when I travel to China just to catch-up on my friends entertainment instead of standard HTTPS. Oh and recommendations for website/software developers: Implement .com/.net DNS-SEC ASAP. Then MS and Mozilla should install the default DNS-SEC checker by default. Then Chinese internet users will know that their DNS entries are being forged (remember this is only one stage of the "Golden Shield"/"GFW"). They can program their ... DPI to forge the DNS-SEC responses anyways. When this happens they will have to face international internet governance pressure (aka ICAN and a few others) community on why the hell they are forging responses to something that makes the internet more secure. Like their forgery of International DNS. Will at 11/16/2010 5:54 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Before we all freak out I hope (well pray) the US Government checks the fingerprints of the public key before just accepting it... I mean like is this basic or is it basic? I assume they don't rely on the hierarchical trust signing system... Michael Williams at 11/16/2010 9:25 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic @Will - fantastic post, thank you! Matt at 11/16/2010 9:48 PM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic Global Strike oligarchy China. The neo-totalitarian technological Mao expands and no one is safe. Put your paranoia level defense. Freedom for the planet. http://hacksperger.wordpress.com/ Er1cBl41r at 11/17/2010 5:22 AM Re: Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic You need to read JR02-2009, Tracking Ghostnet, the Canadian report on the Chinese infecting 1295 computers in 103 countries, just to spy on Tibet. Face it, the Chinese are waging an internation cyber terrorist war on the entire world. Let us just hope that since they are becoming the world's largest economic power they want to keep their country affluent and not start a real military war. Benny Vento at 11/17/2010 9:44 AM