Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93122 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Cyberespionage 2.0...


  • Please log in to reply
1 reply to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 06 April 2010 - 06:53 AM

FYI...

2010 - Data Theft traced to intruders in China...
New report - India-focused spy ring - Cyberespionage 2.0...
- http://www.nytimes.c...ce/06cyber.html
April 5, 2010 - "... Tensions have risen between China and the United States this year after a statement by Google in January that it and dozens of other companies had been the victims of computer intrusions coming from China. The spy operation appears to be different from the Internet intruders identified by Google and from a surveillance ring known as Ghostnet, also believed to be operating from China, which the Canadian researchers identified in March of last year. Ghostnet used computer servers based largely on the island of Hainan to steal documents from the Dalai Lama, the exiled Tibetan spiritual leader, and governments and corporations in more than 103 countries.
The Ghostnet investigation led the researchers to this second Internet spy operation, which is the subject of their new report, titled “Shadows in the Cloud: An investigation Into Cyberespionage 2.0.” The new report shows that the India-focused spy ring made extensive use of Internet services like Twitter, Google Groups, Blogspot, blog.com, Baidu Blogs and Yahoo! Mail to automate the control of computers once they had been infected. The Canadian researchers cooperated in their investigation with a volunteer group of security experts in the United States at the Shadowserver Foundation, which focuses on Internet criminal activity. “This would definitely rank in the sophisticated range,” said Steven Adair, a security researcher with the group. “While we don’t know exactly who’s behind it, we know they selected their targets with great care”.
By gaining access to the control servers used by the second cyber gang, the researchers observed the theft of a wide range of material, including classified documents from the Indian government and reports taken from Indian military analysts and corporations, as well as documents from agencies of the United Nations and other governments..."

- http://www.shadowser...lendar/20100406
April 06, 2010 - "Today the Information Warfare Monitor and the Shadowserver Foundation have released a report titled "Shadows in the Cloud: An investigation into cyber espionage 2.0”*. This report details a cyber espionage network that targeted compromises against systems belonging to the Indian Government, Tibetan interests to include those in the Dalai Lama's office, and others. The New York Times first introduced the report yesterday evening. The report serves as a stark reminder that these underground networks exist and that they are often very successful at stealing highly sensitive information. Unfortunately this type of activity is not atypical and happens globally on a regular basis. We highlighted that the advanced persistent threat (APT) is all too common earlier this year in a post on cyber espionage**."
* http://www.f-secure....n_The_Cloud.pdf
April 7, 2010 - 954KB PDF file

** http://www.shadowser...lendar/20100119

:ph34r:

Edited by AplusWebMaster, 07 April 2010 - 04:35 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#2 Kariya

Kariya

    New Member

  • Authentic Member
  • Pip
  • 15 posts
  • Interests:Music, video games, computers, anime

Posted 20 April 2010 - 02:17 PM

oooooh scary!

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users