Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Great Cannon used against Hong Kong web site #19

Open
wkrp opened this issue Dec 7, 2019 · 0 comments
Open

Great Cannon used against Hong Kong web site #19

wkrp opened this issue Dec 7, 2019 · 0 comments
Labels

Comments

@wkrp
Copy link
Member

wkrp commented Dec 7, 2019

Chris Doman of AlienVault reports that the Great Cannon has been used to DDoS a Hong Kong–related web site, ongoing now since 2019-11-25, but first detected in September 2019. This is the third documented use of the Great Cannon. The first was against GitHub in 2015, and the second was against mingjingnews.com in 2017.

The "Great Cannon" has been deployed again (archive)

The Great Cannon is currently attempting to take the website LIHKG offline. LIHKG has been used to organize protests in Hong Kong. Using a simple script that uses data from UrlScan.io, we identified new attacks likely starting Monday November 25th, 2019.

Websites are indirectly serving a malicious javascript file from either:

  • http://push.zhanzhang.baidu.com/push.js; or
  • http://js.passport.qihucdn.com/11.0.1.js

Normally these URLs serve standard analytics tracking scripts. However, for a certain percentage of requests, the Great Cannon swaps these on the fly with malicious code.

LIHKG has published its own report of the attack, dated 2019-08-31.

於過去一天,有人利用來自世界各地的殭屍網絡對本討論區進行 DDoS 攻擊,本次攻擊為前所未見的大型規模,我們有理由相信是有⁠組織性、甚至達到國家級別的攻擊。

由 2019-08-31 08:00 至 23:59,我們錄得的攻擊數據:

  • 總共超過 15億 次網絡請求 (Total Requests)
  • 最高單一小時內超過 650萬 單一用戶瀏覽 (Unique Visitors)
  • 最高峰的攻擊頻率為每秒 26萬 次網絡請求,持續大概 30 分鐘後被阻擋

LIHKG has been under unprecedented DDoS attacks in the past 24 hours. We have reasons to believe that there is a power, or even a national level power behind to organise such attacks as botnet from all over the world were manipulated in launching this attack.

Here are the figures on the attack during the period 0800 - 2359 on 31 August 2019:

  • Total request exceeded 1.5 billion;
  • Highest record on unique visitors exceeded 6.5 million/hr;
  • Highest record on the Total Request frequency was 260k/sec in which then lasted for 30 minutes before it is banned.

A reminder of how the Great Cannon works: the unwitting DDoS attackers are not web users in China, but web users outside China. When someone outside China browses a web site that includes one of the above .js resources, their HTTP requests traverse the Great Firewall, and that is where the malicious code is injected. Global Voices has a good summary (archive):

While LIHKG has blocked all IPs from mainland China, when someone from overseas visited Baidu or Qihoo360 hosted in mainland China, the script would point them to LIHKG and hence the forum faced a massive DDoS attack coming from all over the world.

Here is the obfuscated malicious JavaScript file linked from the report, which also mentions "bugs in the malicious Javascript code that we won't discuss here." Doman links to (archive) several other samples (archive) and an unobfuscated version.

@wkrp wkrp added the China label Dec 7, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant