Home > Uncategorized > Hackers Vs Huawei in the Def Con

Hackers Vs Huawei in the Def Con

HACKERS at the infamous Def Con were shown how to easily slip into computer networks through some routers made by Chinese electronics colossus Huawei Technologies, as per a news report published in the news.com.au.

“For the 20th anniversary of Def Con the gift his China,” Recurity Labs chief Felix “FX” Lindner said as he opened his presentation this week. “Nobody needs a back door; this is plausible deniability,” he quipped as he detailed weaknesses in three small Huawei routers that could be exploited using basic hacking techniques. “You get what you pay for. Sorry.”

Lindner and his teammate Gregor Kopf were particularly troubled that Huawei has not issued any security advisories about its routers to warn users to take precautions. “These machines have serious security issues,” Kopf told AFP. “In my eyes, the greatest danger is that you don’t know how vulnerable it is; you’re left in the dark.” Kopf referred to the routers studied by Recurity as having technology reminiscent of the 1990s and said that once attackers slipped in they could potentially run amok in networks. “It looks pretty bad,” Kopf said. “To be fair, we only looked at three routers. But based on this sample, chances are other equipment they offer is very vulnerable.”

Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East and the company has been striving to gain ground in US and European markets, according to Germany-based Recurity.

 

Huawei is already battling an image problem in the broader technology market due to its perceived close ties with the Chinese military and government. It was recently blocked from bidding for contracts on Australia’s ambitious national broadband project, reportedly due to concerns about cyber-security. The company has in the past also run afoul of US regulators and lawmakers because of worries over its links with the Chinese military and Beijing – fears that Huawei has dismissed.

This year, the US reported a flood of bogus military parts (electronic parts) from China discovered in missiles and other weapons, American-made fighter jets, transport planes. A 14-month US Congressional investigation uncovered 1,800 cases of counterfeit electronic components for American military equipment, in total involving over one million bogus parts. The investigators discovered fake electronic components in all kinds of military equipment, including: targeting systems for helicopter-launched hellfire missiles; instrument panels of military cargo planes; mission computers for interceptor rockets and in crucial ice-detection sensors for naval patrol aircraft. – I wrote in a post June 26 2012.

Chinese companies apparently have a covert capability to remotely access communications technology sold to the US and other Western countries and could “disable a country’s telecommunications infrastructure before a military engagement,” according to former and current intelligence sources cited ina report in Joseph Farah’s G2 Bulletin.- mentions a 11 June 2012 blog post in raptureimminent.wordpress.com.

The issue centers on the Chinese firm Huawei Technologies Co. Ltd., which U.S. intelligence sources say has direct links to the Chinese government and the People’s Liberation Army, or PLA. These sources assert that Huawei and other Chinese telecommunications firms such as ZTE Corp. have “electronic backdoors” to telecommunications technology sold to the U.S. and other countries.
Revelation of China’s electronic backdoor capability into U.S. and Western telecommunications networks comes on the heels of recent WND/G2Bulletin revelations that China has been manufacturing counterfeit components that have made their way into sensitive U.S. weapons systems. mentioned the facebook page of Army Operations Security (OPSEC).

Washington already has declared that a cyber attack on U.S. computer systems would constitute an act of war and that would call for a military response. The Pentagon earlier this month said that there would be a U.S. military response if there is a cyber attack on government networks – in effect, equating hacking with an act of war.

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s