Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Mechanism  





2 Known uses  





3 Reaction  





4 See also  





5 References  














Great Cannon






Deutsch
Français
Bahasa Indonesia


 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


The Great Cannon of China is an Internet attack tool that is used by the Chinese government to launch distributed denial-of-service attacks on websites by performing a man-in-the-middle attack on large amounts of web traffic and injecting code which causes the end-user's web browsers to flood traffic to targeted websites.[1] According to the researchers at the Citizen Lab, the International Computer Science Institute, and Princeton University's Center for Information Technology Policy, who coined the term, the Great Cannon hijacks foreign web traffic intended for Chinese websites and re-purposes them to flood targeted web servers with enormous amounts of traffic in an attempt to disrupt their operations. While it is co-located with the Great Firewall, the Great Cannon is "a separate offensive system, with different capabilities and design."[2]

Besides launching denial-of-service attacks, the tool is also capable of monitoring web traffic[3] and distributing malware in targeted attacks in ways that are similar to the Quantum Insert system used by the U.S. National Security Agency.[4]

Mechanism[edit]

The Great Cannon hijacks insecure traffic inbound to servers within the Great Firewall, and injects JavaScript that redirects that traffic to the target.[5] These attacks fail when websites have HTTPS encryption.[6]

Known uses[edit]

The first known targets of the Great Cannon (in late March 2015) were websites hosting censorship-evading tools, including GitHub, a web-based code hosting service, and GreatFire, a service monitoring blocked websites in China.[7]

In 2017, the Great Cannon was used to attack the Mingjing News website.[8]

As of December 2019, the Great Cannon was being used to attempt to take down the Hong Kong-based LIHKG online forum, even though the Basic Law of Hong Kong clearly states that Hong Kong's internet is the affairs of Hong Kong and Hong Kong only.[8]

Reaction[edit]

Quartz reported that the 2015 GitHub attack caused "severe" political problems for China, including the United States Department of State viewing it as "an attack against US infrastructure".[9]

See also[edit]

References[edit]

  1. ^ Perlroth, Nicole (April 10, 2015). "China Is Said to Use Powerful New Weapon to Censor Internet". The New York Times. Archived from the original on April 11, 2015. Retrieved April 10, 2015.
  • ^ Marczak, Bill; Weaver, Nicolas; Dalek, Jakub; Ensafi, Roya; Fifield, David; McKune, Sarah; Rey, Arn; Scott-Railton, John; Deibert, Ronald; Paxson, Vern (April 10, 2015). "China's Great Cannon". The Citizen Lab. Munk School of Global Affairs, University of Toronto, Canada. Archived from the original on April 10, 2015. Retrieved April 10, 2015.
  • ^ Franceschi-Bicchierai, Lorenzo (April 10, 2015). "The 'Great Cannon' is China's Powerful New Hacking Weapon". Motherboard - Vice. Vice Media LLC. Archived from the original on April 12, 2015. Retrieved April 10, 2015.
  • ^ Stone, Jeff (April 10, 2015). "China's 'Great Cannon' Lets Internet Censors Hack Sites Abroad – Just Ask GitHub". International Business Times. IBT Media Inc. Archived from the original on April 10, 2015. Retrieved April 10, 2015.
  • ^ Marczak, Bill; Weaver, Nicholas; Dalek, Jakub; Ensafi, Roya; Fifield, David; McKune, Sarah; Rey, Arn; Scott-Railton, John; Deibert, Ron; Paxson, Vern (2015-04-10). "China's Great Cannon". The Citizen Lab. Retrieved 2020-06-30.
  • ^ "Don't Be Fodder for China's 'Great Cannon' — Krebs on Security". 10 April 2015. Retrieved 2020-06-30.
  • ^ Peterson, Andrea (April 10, 2015). "China deploys new weapon for online censorship in form of 'Great Cannon'". The Washington Post. Archived from the original on April 17, 2015. Retrieved April 10, 2015.
  • ^ a b Doman, Chris (2019-12-04). "The "Great Cannon" has been deployed again". AT&T Cybersecurty blog. Archived from the original on 2019-12-06. Retrieved 2019-12-06.
  • ^ "China's fierce censors try a new tactic with GitHub—asking nicely". 28 June 2016.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Great_Cannon&oldid=1218735055"

    Categories: 
    Cyberwarfare
    Denial-of-service attacks
    Internet censorship in China
    Political repression in China
    Hacking (computer security)
    Espionage
    Botnets
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
    Wikipedia articles that are too technical from January 2022
    All articles that are too technical
    Articles containing potentially dated statements from December 2019
    All articles containing potentially dated statements
     



    This page was last edited on 13 April 2024, at 14:08 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki