Hackers Hit Gmail Users, Defense Contractors, Mac Users

Meanwhile, new Mac Defender variant shows up within hours of Apple's security fix, and Northrop Grumman gets hacked.

Google revealed today that "hundreds" of Gmail accounts were compromised in a nasty spear phishing attack that targeted high-profile U.S. military and government officials, among others.

The news came on a day when Northrop Grumman joined Lockheed Martin and L-3 Communications on the list of defense contractors who appear to have been hacked in an event unrelated to the Gmail invasion.

Meanwhile, MacRumors reported that a new variant of the Mac Defender Trojan hit the streets within 8 hours of Apple's security update.

And so the game continues.

Google Hack

The Official Google Blog says, "This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel, and journalists."

This isn't Google's first problem in China, and Google's internal systems weren't affected, the company said. But it advised Gmail users to check their forwarding and access settings, be on alert for "suspicious activity" warnings in Gmail, and strengthen their security practices through two-step verification and strong passwords.

Along with "the strength of our cloud-based security and abuse detection systems," the post's author, Eric Grosse of the Google Security Team, credited user reports and Mila Parkour's Contagio Malware Dump blog for uncovering the cyberattack.

Back in February, Parkour provided all the details of the breach, including what a spoofed mail looks like and what to do about it. Her examples showed invaded Gmail accounts of people involved in military, political, and diplomatic activities.

How does military and diplomatic mail end up in a Gmail account instead of a .gov or .mil address? "Some people have a habit of forwarding messages from enterprise accounts to their personal mail for saving or easy reading at home," Parkour notes. The cybersleuth took advantage of weaker security protections and home's "relaxed atmosphere, which helps to catch the victim off guard."

Customized Phony Mail

Parkour described the phony mails as "customized and individualized for each target," sent from the spoofed address of an individual or agency known to the targeted user.

A "view download" link instead led to a fake Gmail login page, Parkour said. Once the invaders harvested each user's credentials, they were able to redirect mail to another account, read incoming and outgoing mail, and gather info. Details like a spouse's name or references to meetings were used to craft additional messages that were "plausible enough to generate responses or conversations from victims."

Meanwhile, the cheerful folks at Fox News point out that defense contractors have access to top-secret computer systems that do things like launch unarmed Predator drones. If military IT organizations can't keep thieves and bad guys out, what hope is there for the rest of us?

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags hackersGmailAppleNorthrop GrummanGooglesecuritye-mail securitylockheed martin

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lisa Greim

PC World (US online)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?