Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

China Censors May Have Caused Huge Internet Outage: Group

BEIJING – China’s Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong — a fiasco a cyber-monitoring group Wednesday blamed on the country’s own censors.

BEIJING – China’s Internet suffered a massive breakdown as traffic was routed to an overseas site linked to the banned religious group Falun Gong — a fiasco a cyber-monitoring group Wednesday blamed on the country’s own censors.

Web users in the country — which tightly restricts Internet access — had trouble accessing numerous sites for about an hour on Tuesday afternoon, said Greatfire.org, which tracks the vast Chinese online censorship apparatus known as the Great Firewall.

“We have conclusive evidence that this outage was caused by the Great Firewall,” it said on its website, calling the incident “one of the largest Internet outages ever in China”.

Internet users were sent to an IP address owned by US-based Dynamic Internet Technology, which runs a tool called FreeGate designed to bypass Chinese internet censors.

The IP address — 65.49.2.178 — is linked to dongtaiwang.com, a news portal run by Falun Gong members, Greatfire.org said.

The state news agency Xinhua raised the possibility of hacking, and the official China Internet Network Information Center attributed the breakdown to a “root server for top-level domain names”.

But Greatfire.org cast doubt on those claims, citing technical tests and saying such an act was “not enough to cause this outage”.

Advertisement. Scroll to continue reading.

Falun Gong is a Buddhist-inspired religious group that was banned in China in 1999 and branded an “evil cult”.

Dynamic Internet Technology lists as clients on its website the Epoch Times — a publication linked to the spiritual movement — along with Human Rights in China and other groups.

China’s vast censorship apparatus proactively suppresses any information or websites online deemed sensitive, from popular sites such as Facebook and Twitter to a frequently updated list of search terms.

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.