Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Jump to content

Great Cannon

From Wikipedia, the free encyclopedia

The Great Cannon of China is an Internet attack tool that is used by the Chinese government to launch distributed denial-of-service attacks on websites by performing a man-in-the-middle attack on large amounts of web traffic and injecting code which causes the end-user's web browsers to flood traffic to targeted websites.[1] According to the researchers at the Citizen Lab, the International Computer Science Institute, and Princeton University's Center for Information Technology Policy, who coined the term, the Great Cannon hijacks foreign web traffic intended for Chinese websites and re-purposes them to flood targeted web servers with enormous amounts of traffic in an attempt to disrupt their operations. While it is co-located with the Great Firewall, the Great Cannon is "a separate offensive system, with different capabilities and design."[2]

Besides launching denial-of-service attacks, the tool is also capable of monitoring web traffic[3] and distributing malware in targeted attacks in ways that are similar to the Quantum Insert system used by the U.S. National Security Agency.[4]

Mechanism

[edit]

The Great Cannon hijacks insecure traffic inbound to servers within the Great Firewall, and injects JavaScript that redirects that traffic to the target.[5] These attacks fail when websites have HTTPS encryption.[6]

Known uses

[edit]

The first known targets of the Great Cannon (in late March 2015) were websites hosting censorship-evading tools, including GitHub, a web-based code hosting service, and GreatFire, a service monitoring blocked websites in China.[7]

In 2017, the Great Cannon was used to attack the Mingjing News website.[8]

As of December 2019, the Great Cannon was being used to attempt to take down the Hong Kong–based LIHKG online forum, even though the Basic Law of Hong Kong clearly states that Hong Kong's internet is the affairs of Hong Kong and Hong Kong only.[8]

Reaction

[edit]

Quartz reported that the 2015 GitHub attack caused "severe" political problems for China, including the United States Department of State viewing it as "an attack against US infrastructure".[9]

See also

[edit]

References

[edit]
  1. ^ Perlroth, Nicole (April 10, 2015). "China Is Said to Use Powerful New Weapon to Censor Internet". The New York Times. Archived from the original on April 11, 2015. Retrieved April 10, 2015.
  2. ^ Marczak, Bill; Weaver, Nicolas; Dalek, Jakub; Ensafi, Roya; Fifield, David; McKune, Sarah; Rey, Arn; Scott-Railton, John; Deibert, Ronald; Paxson, Vern (April 10, 2015). "China's Great Cannon". The Citizen Lab. Munk School of Global Affairs, University of Toronto, Canada. Archived from the original on April 10, 2015. Retrieved April 10, 2015.
  3. ^ Franceschi-Bicchierai, Lorenzo (April 10, 2015). "The 'Great Cannon' is China's Powerful New Hacking Weapon". Motherboard - Vice. Vice Media LLC. Archived from the original on April 12, 2015. Retrieved April 10, 2015.
  4. ^ Stone, Jeff (April 10, 2015). "China's 'Great Cannon' Lets Internet Censors Hack Sites Abroad – Just Ask GitHub". International Business Times. IBT Media Inc. Archived from the original on April 10, 2015. Retrieved April 10, 2015.
  5. ^ Marczak, Bill; Weaver, Nicholas; Dalek, Jakub; Ensafi, Roya; Fifield, David; McKune, Sarah; Rey, Arn; Scott-Railton, John; Deibert, Ron; Paxson, Vern (2015-04-10). "China's Great Cannon". The Citizen Lab. Retrieved 2020-06-30.
  6. ^ "Don't Be Fodder for China's 'Great Cannon' — Krebs on Security". 10 April 2015. Retrieved 2020-06-30.
  7. ^ Peterson, Andrea (April 10, 2015). "China deploys new weapon for online censorship in form of 'Great Cannon'". The Washington Post. Archived from the original on April 17, 2015. Retrieved April 10, 2015.
  8. ^ a b Doman, Chris (2019-12-04). "The "Great Cannon" has been deployed again". AT&T Cybersecurty blog. Archived from the original on 2019-12-06. Retrieved 2019-12-06.
  9. ^ "China's fierce censors try a new tactic with GitHub—asking nicely". 28 June 2016.