During his civil lawsuit against the People’s Republic of China, Brian Milburn says he never once saw one of the country’s lawyers. He read no court documents from China’s attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed.
Enlarge image Solid Oak Software Founder Brian Milburn
Patrick T. Fallon/Bloomberg
Brian Milburn, founder of Solid Oak Software Inc., poses for a portrait in his office in Santa Barbara, California, on Sept. 18, 2012.
Brian Milburn, founder of Solid Oak Software Inc., poses for a portrait in his office in Santa Barbara, California, on Sept. 18, 2012. Photographer: Patrick T. Fallon/Bloomberg
That doesn’t mean Milburn’s adversary had no contact with him.
For three years, a group of hackers from China waged a relentless campaign of cyber harassment against Solid Oak Software Inc., Milburn’s family-owned, eight-person firm in Santa Barbara, California. The attack began less than two weeks after Milburn publicly accused China of appropriating his company’s parental filtering software, CYBERsitter, for a national Internet censoring project. And it ended shortly after he settled a $2.2 billion lawsuit against the Chinese government and a string of computer companies last April.
In between, the hackers assailed Solid Oak’s computer systems, shutting down web and e-mail servers, spying on an employee with her webcam, and gaining access to sensitive files in a battle that caused company revenues to tumble and brought it within a hair’s breadth of collapse.
One-Man Fight
As the public dispute unfolded in decorous courtrooms, Milburn’s computer prowess was tested to its limits in what amounted to a digital home invasion by what he later learned was one of the most prolific hacking teams in China. He waged his own desperate one-man fight without weapons or help from authorities, swapping out servers, puzzling over middle-of-the- night malfunctions, and watching his sales all but evaporate -- his every keystroke monitored by spies who had turned his technology against him.
Milburn, 61, rarely took a day off during that time as he struggled around the clock to keep his computer network running and his firm afloat. He doubts he’ll ever know exactly what was going on, but he has theories.
“It felt like they had a plan,” says Milburn, sitting in his office two blocks from Santa Barbara’s main drag, where he’s now focused on rebuilding his business. “If they could just put the company out of business, the lawsuit goes away. They didn’t need guys with guns or someone to break my kneecaps.”
Clandestine Methods
The cyber attack against Solid Oak provides a rare look at the clandestine methods in play as high-tech spies and digital combatants seek to gain a brass-knuckle advantage in the global economy, from trade disputes to big-dollar deals to lawsuits. U.S. officials say that China in particular uses its national security apparatus for such intrusions, targeting thousands of U.S. and European corporations and blurring the traditional lines of espionage.
While his civil case was pending, Milburn didn’t discuss the cyber intrusion publicly, saying only that the company and its Los Angeles-based law firm had received e-mails containing spyware. He had no idea who was behind it until last August, when he provided malware samples to a security firm at the request of a Bloomberg reporter.
A forensic analysis of the malware by Joe Stewart, a threat expert at Atlanta-based Dell SecureWorks, identified the intruders who rifled Solid Oak’s networks as a team of Shanghai- based hackers involved in a string of sensitive national security-related breaches going back years.
Many Victims
Commercial hacker hunters -- who refer to the team as the Comment group, for the hidden program code they use known as “comments” -- tie it to a multitude of victims that include the the president of the European Union Council, major defense contractors and even Barack Obama’s 2008 presidential campaign. The group has been linked to the People’s Liberation Army, China’s military, according to leaked classified cables.
The Solid Oak attack is a micro tale of what some of the U.S. and Europe’s largest corporations have experienced, says Representative Mike Rogers, a Republican from Michigan who chairs the House Intelligence Committee. The campaign to steal private files and intellectual property, even to the point of collapsing businesses, amounts to a criminal racket for commercial gain, says Rogers.
“I used to work organized crime in Chicago -- I don’t know, but it sure seems like there are a lot of similarities,” says Rogers, a former FBI agent.
Unlikely Entanglement
Headquartered in a converted Victorian house, Milburn’s small company seems an unlikely candidate to become entangled in an international feud with China, except for one thing: it was a market leader in the U.S. for software that lets parents and schools block objectionable web content, like pornography and violence.
China was looking for software to do the same thing on a national scale. In May 2009, Chinese officials ordered web- filtering software called Green Dam Youth Escort installed on every computer sold in the country. They touted the software’s ability to protect young Internet users by filtering pornography. Critics in China, who identified more than 6,000 political keyword filters, branded it an extension of China’s censorship regime.
When University of Michigan researchers examined the program in June 2009 to see how it worked, they discovered that thousands of lines of code directly matched Milburn’s software, which has 1.1 million active users. Included, apparently by mistake, was a CYBERsitter upgrade announcement -- the “smoking gun” that the software had been pirated, according to Milburn.
Copied Code
An independent analysis later found that four of the five active filters were copied almost verbatim from CYBERsitter and that Green Dam could not operate correctly when those filters were disabled. It’s possible the code was stolen in an earlier hack, but Milburn believes the thieves simply bought a copy and broke the encryption protecting the code.
In interviews with reporters, he said he was considering a lawsuit and vowed to pursue an injunction.
On June 24 -- 12 days after Milburn went public with his legal intentions -- the hackers made their first appearance. Working from her home office 150 miles south of Santa Barbara in Orange County, Jenna DiPasquale, 39, who is Milburn’s daughter and Solid Oak’s one-woman marketing department, received a carefully forged e-mail containing hidden spyware.
Poisoned E-Mails
It looked like a routine message from Milburn, so DiPasquale clicked on the attachment, realizing only later that the e-mail address was a couple of letters off. Solid Oak employees received more bogus e-mails over the next few days, setting off alarm bells.
Milburn contacted Matthew Thomlinson, a Microsoft Corp. threat expert for help. Thomlinson found the malware had downloaded software that burrowed into the company’s Microsoft operating system, automatically uploading more tools the hackers could use to control the network remotely. The malware had been created on a Chinese-language computer, he concluded. As far as Milburn knew, though, his attackers could have been anyone from seasoned professionals to hacktivists tapping on a keyboard in a Beijing basement, he says.
The more urgent question was whether the attackers were behind the strange things that began happening in his network.
DiPasquale was at her desktop computer, helping the company’s attorneys with research sometime in August, when she noticed the light on her webcam come on. A few days later, a message flashed on her laptop indicating that the camera on that machine had been activated as well. She made an alarmed call to Milburn. After learning that Chinese hackers had eavesdropped on the Dalai Lama and his staff using their own computers, he went through the office, covering every webcam and microphone with black electrical tape.
Strange Problems
Then the company’s e-mail servers began shutting down, sometimes two or three times a week, slowing e-mail traffic, the main way the company provides customer service. Similar problems began plaguing the web servers -- a bigger problem since web sales of CYBERsitter supply more than half of Solid Oak’s revenue. By September and October, website sales were off 55 percent from mid-year and Milburn was struggling to figure out how the hackers might be behind it.
“I panicked,” says Milburn, who combines a beach comber’s countenance with the nervous energy of a workaholic. “What the hell is happening to my income, where is the money going, why aren’t we getting orders?”
‘Very Scary’
“This slow realization came that, ’wait a second, they’re coming after us now,’” says DiPasquale, who felt she could no longer trust her own computer. “It was very scary.”
Milburn had contacted the Federal Bureau of Investigation after the flurry of e-mail assaults, and an agent from the Seattle field office called and took details, including samples of the malware and, later, server logs, he says. But the agency shed almost no light on the situation, he says, and he was never told if the material was useful.
That doesn’t mean the bureau was in the dark about Milburn’s attackers. U.S. law enforcement and intelligence officials had amassed a long dossier on the group, which they had been tracking since 2002, according to leaked cables and two people familiar with government investigations into the group.
Laura Eimiller, an FBI spokeswoman in Los Angeles, said the bureau couldn’t comment on its interactions with Solid Oak or any investigation.
Civil Action
Milburn forged ahead in court in an attempt to win damages for the alleged theft. He and his small team of lawyers had spent six months analysing the similarities in the two software programs. He filed suit in January 2010 against the Chinese government and two Chinese software companies that had developed Green Dam.
Milburn’s suit also named seven big computer manufacturers, including Sony Corp. and Lenovo Group Ltd., which the suit alleges had begun installing or distributing the software in the program’s early phases.
As in the digital fight, not all of Milburn’s legal adversaries were what they seemed. Zhengzhou Jinhui Computer System Engineering Co., one of the two Chinese companies that developed Green Dam, had ties to the People’s Liberation Army University, a research center for China’s military, according to a June 2009 U.S. Embassy diplomatic cable published by Wikileaks the following year.
No Information
No one from Zhengzhou Jinhui was available to address the CYBERsitter allegations, according to a person who answered the phone at the company.
A spokesman for China’s foreign ministry said he had no information on the cyber assault against Solid Oak and declined to comment further. When Milburn’s suit was filed, Chinese officials said the government “highly values and fully respects the intellectual property rights of software.”
Six days after the suit was filed on Jan. 5, 2010, Milburn’s Los Angeles-based law firm at the time, Gipson Hoffman & Pancione, was hit with a cyber intrusion using e-mails similar to those aimed at Solid Oak but with different malware, according to the law firm. Forensics analysis shows that attack probably emanated from China as well, says Stewart, the Dell SecureWorks threat expert.
It had been clear to everyone that one motive for the attacks might be espionage related to possible legal action, Milburn says. If the hackers were able to steal documents or record conversations, they could preview strategies and negotiating positions, even identify legal weaknesses in the case.
No Chances
Milburn decided not to take chances with the lawsuit. Using techniques gleaned from talking to security experts, his small team developed their own ad hoc counter-espionage measures. Solid Oak and its lawyers exchanged legal documents using rotating webmail accounts or document-sharing sites like San Francisco-based Dropbox Inc., deleting the accounts after a single use.
Occasionally, Milburn drove to an empty house he and his wife owned in the hills around Santa Barbara. Sitting at the kitchen table, he’d make phone calls or exchange e-mails with his attorneys, alternating between four different cell phones from three different carriers.
The lawsuit seemed to trigger a more serious phase of the attack, Milburn says. Computer failures that had occurred a couple times a week now sometimes happened two or three times a day.
Failures Escalate
Milburn constantly had to reboot servers, occasionally in the middle of the night. During work hours, it became hard for DiPasquale to get Milburn on the phone because he always seemed preoccupied fixing something. Tempers at work flared more often.
“Everybody started to wonder what they were doing wrong on a personal level,” DiPasquale says, adding that because Milburn couldn’t trace the source of the network problems, it became hard to sort out who was to blame or why. “Things got very tense.”
One thing was clear: the technology that ran Milburn’s company was no longer solely under his control.
In March 2010, a staccato of text message alarms woke him in the middle of the night, signalling that his servers were all shutting down. He hurriedly drove the four-mile winding road to the office to find that his commercial-grade SonicWALL firewall had failed, taking his entire network off line. He spent a good part of the next day on the phone with the manufacturer, who was stumped.
“Those things are like old carburetor engines, they never quit,” Milburn says.
Through Cobwebs
After his e-mail servers crashed during an exchange with his attorneys, he crawled under the large house that serves as the company’s headquarters in search of a device that someone might have physically planted. Pawing through cobwebs with a flashlight, he spent an hour opening utility boxes and eyeing the fiber-optic cable. He found nothing.
Milburn says he was riding “that fine line between ultra- caution and paranoia.”
Born in Santa Monica, Milburn didn’t graduate from high school, but he has a relentlessly autodidactic drive that is common in early tech entrepreneurs. He taught himself how to write code, and eventually mastered complex Internet software protocols.
Laura Milburn, 63, his wife of 21 years, calls him “brilliant” but also “incredibly stubborn.” A few years earlier she watched him in a legal tussle with a neighbor who had built a deck four feet over what they thought was their property line. Milburn ended up spending more than $100,000 in a year-long fight just so they could split the difference, with each side getting two feet, she says.
No Clue
“He’s not the kind of person who would back down to someone because they threaten him,” Laura Milburn says. Even so, she adds, “I don’t think he had a clue what he was getting into.”
Both of those traits explain why Milburn didn’t hire an expensive incident response team to hunt the hackers down in his network -- the kind larger corporations often use.
Milburn, after all, had built Solid Oak’s network himself. “I thought they might be able to get around some IT guy, but there’s no way they were going to get around me,” he says.
Milburn learned everything he could about computer security. He read professional papers and called up experts he knew. He began writing his own software to monitor the connections his computers were making to outside networks, looking for tell-tale signs of the hackers at work.
Buried Folder
In April 2010, during a 6:30 a.m. check of his servers -- by then part of his daily routine -- Milburn stumbled on a folder buried in an obscure Microsoft directory, one that’s normally unused. What he found inside startled him. The file contained the encrypted versions of all eight passwords in his system -- the keys to the entire network. The hackers could use the passwords to control just about anything he could, from web servers to e-mail.
The folder was gone two days later, he says, and in its place were several pieces of software he didn’t recognize. Later, he found out they were custom-designed software the hackers use to perform tasks on corporate networks. He had found their tool kit.
Rather than panic, Milburn said he felt an adrenalin rush.
“It was like, ’okay, now I can figure out what they’re doing.’” After months of detective work, Milburn was no longer chasing ghosts.
Two Battles
Even at the best of times, Solid Oak’s headquarters is a warren of server rooms and cluttered offices that, Milburn says, could sometimes resemble the inside of a well-maintained garage. In the summer of 2010, it reflected the disarray of a company in crisis, littered with the results of Solid Oak’s two on-going battles, one legal, one digital.
The firewall that blew out in March, a small box the size of an office telephone, still sat propped in a chair. Foot-high stacks of legal documents covered tables and spilled onto the floor. Two 60-foot data cables -- which Milburn could use in a pinch to circumvent his own compromised e-mail system via a commercial internet connection -- ran from one end of the office to the other.
Milburn’s biggest concern was that the hackers seemed to be trying to hit the heart of his business. The lawsuit months earlier had brought a rush of publicity for CYBERsitter, and Milburn released a new version of the software. That combination would normally boost sales.
Sales Dive
While bulk sales and orders over the phone were up, 60 percent of Solid Oak’s business depended on users buying the $39.95 program directly from the website. As the network problems continued, so did the fall in sales. Milburn wouldn’t provide month-to-month sales figures, saying it could aid competitors, but he says the normally profitable company dipped into the red after a big drop in web sales the month the lawsuit was filed. Net losses averaged $58,000 a month after that, even as Milburn slashed expenses, he says.
Tracing the drop, he could see that customers were coming to the website to buy the software like always. They’d type in credit card numbers and click submit, but most of the orders -- on some days 98 percent -- weren’t going through, Milburn says. He replaced servers and tried other fixes. Nothing worked.
As his income dried up, Milburn kept the company afloat in part with insurance proceeds from the loss of two properties in the November 2008 Tea Fire in the hills of Santa Barbara that burned 210 homes over three days.
Foregoing Salaries
He went without pay, and DiPasquale agreed to forego her salary for a few months too. She and her husband, a professional chef, drew down their savings, but by the summer of 2010, the money was running out.
Some tough conversations played out at home, DiPasquale says. She argued that what was going on was wrong; quitting would mean the hackers had won.
Her husband wondered exactly what they had gotten into and where it would end. “He was saying, ’What are we up against? Is there going to be someone sitting outside the house?’” she says. Because she was working alone at home, he made sure the house alarm was on every day before leaving for work.
In his own battle, Milburn became more obsessed. He’d get up by 5 a.m., work until 7 p.m. grab something to eat, then sign on from home to check his servers again. Constantly missing meals, Milburn began subsisting on pre-packaged sandwiches from a convenience store close to the office.
Sabotage Evidence
“It would be ten o’clock at night and I’d get an idea, ’huh, let me just check this,’” Milburn says. “That would lead to another hour of frustration trying to figure something out.”
Examining the script that controlled the payment processing function in November that year, he noticed that a single character was missing from the string -- an apostrophe. That was enough to cause the page to time out, rather than to complete the credit card transaction. Customers were leaving in frustration.
The apostrophe was sometimes there and sometimes not, so some payments went through. There may have been other ways that the hackers were sabotaging his sales, but Milburn was sure he had found at least one.
“A hacker could certainly edit the script and break it so it wouldn’t work,” says Stewart, the Dell SecureWorks threat expert. “That would be a great way to do it without calling attention to the fact that they were in the system.”
No one ever told Milburn that he was facing, not amateurs but professionals who had ransacked secure U.S. government networks, until the results of Stewart’s analysis last August.
Unique Tools
The tools Milburn found in his network were unique to the Comment group, according to Stewart. They included software designed to let the hackers send out stolen files and steal security credentials.
Without a more in-depth investigation, Stewart said it was difficult, if not impossible, to determine the hackers’ goal as they rifled Milburn’s network. Some of what Milburn experienced, including repeated and regular crashing of his servers, could have been an unintended side-effect as the hackers infested the network with backdoors and other malware.
Or it might have been deliberate. From a hacker’s point of view, everything Milburn experienced is technically “pretty elementary,” says Nicholas Percoco, who heads SpiderLabs, a Chicago-based security division of Trustwave Corp. Percoco and his team are paid by corporations to hack into their networks to test security -- what’s known as penetration testing. “If I can do it, the Chinese certainly can do it,” he says.
Reaching Settlement
At one point, Milburn was able to identify a server that the hackers appeared to be using as a staging point to attack other targets. He was never able to shut down their activities, though.
In August 2011, a California district judge rejected a move by some of the defendants to shift Solid Oak’s lawsuit to China, and ruled that it could go ahead in a U.S. court. Negotiations for settlement moved forward in earnest.
Solid Oak reached agreement with defendants for an undisclosed sum last February, and the case was dismissed two months later. Milburn says he can’t discuss the terms, including exactly which defendants participated. His attorney, Gregory Fayer, now at Fayer Gipson LLP, says the Chinese government, which had by then declared that the Green Dam program would be strictly voluntary, was not among them. In U.S. District Court in California, the presiding judge declared China in default in the lawsuit for failing to respond.
Hackers Depart
Within two months of the settlement, Milburn says, the unusual activity in the company’s computer network had nearly stopped.
The wild ride of those three years did more than wreak havoc on Solid Oak’s computers. It threw into question Milburn’s retirement plans, he says. During the worst moments, he wondered if he would have to start over, get rid of the CYBERsitter domain name and try again under a new digital identity, just to be free of his adversaries.
Milburn now feels he can move on, even if he didn’t prevail. Sales haven’t fully recovered, but he says he now has a chance to rebuild his customer base.
“It turns out they were just better than me,” says Milburn, whose doctor recently diagnosed him with a stress-related ailment.
“But it was the right thing to do,” he says. “You don’t do anybody a favor by not taking a stand on this kind of stuff.”
With the company’s finances now more stable, DiPasquale recently went out and bought a new computer. “I just wanted to tie the last one to an anvil and toss it in the sea,” she says.
Even so, DiPasquale says, “I don’t think I’ll ever feel completely safe on my own computer again.”
With assistance from Dune Lawrence in New York; Baizhen Chua and Edmond Lococo in Beijing; and Liza Lin in Shanghai. Editors: Marcia Myers, Melissa Pozsgay
To contact the reporter on this story: Michael Riley in Washington at michaelriley@bloomberg.net;
To contact the editor responsible for this story: Melissa Pozsgay at