Google hackers wanted to know which Chinese intel operatives were being watched

Share this article:

Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities.

The intruders, who spearheaded the so-called Aurora attacks that breached more than 30 firms using weaponized PDFs, accessed a database at Google which contained data about court orders that authorized surveillance of certain individuals, presumably included among them Chinese spies. The revelation was reported Monday by The Washington Post, which quoted unnamed U.S. officials.

Among the most sensitive data accessed were court orders, called FISA orders, which, under the Foreign Intelligence Surveillance Act, could allow the government to access electronic data, like Gmail accounts, related to foreign or terrorist threats.

Recent comments from a Microsoft executive appeared to further corroborate these details. Last month, Dave Aucsmith, senior director for Microsoft's Institute for Advanced Technology, reportedly said the Aurora campaign's mission was to uncover court orders revealing U.S. law enforcement surveillance efforts.

Aucsmith has since clarified his remarks, saying he never meant to imply that Microsoft had been hacked by the same adversaries.

In a statement emailed to SCMagazine.com on Tuesday, he said he was referencing “statements in the media” during the 2010 attacks.  

“My comments were not meant to cite any specific Microsoft analysis or findings about motive or attacks, but I recognize that my language was imprecise,” said his statement. “What I should have said was, ‘According to what I've read concerning the so-called Aurora attack…industry investigators found that the point of entry was a backdoor access system created by Google in order to comply with government search warrants on user data.”

Google declined comment to SCMagazine.com, and the FBI has not immediately responded.

Meanwhile, a cyber espionage group believed to be based in China has resumed operations. On Sunday, the New York Times reported that the Chinese military hacking unit behind the theft of hundreds of terabytes of information from scores of organizations, many in the United States, had resumed its operations.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Beazley: employee errors root of most data breaches, but malware incidents cost ...

Insurance firm Beazley analyzed more than 1,500 data breaches it serviced between 2013 and 2014.

Apple issues seven updates, fixes more than 40 vulnerabilities in iOS 8, OS 10.9.5

Apple issues seven updates, fixes more than 40 ...

In one of its infrequent "Update Surprisedays," Apple plugged holes, boosted security and added features.

Canadian telecom co. Telus unveils first transparency report

The company received more than 100,000 government requests for customer data last year.