User not logged in - login - register
Home Calendar Books School Tool Photo Gallery Message Boards Users Statistics Advertise Site Info
go to bottom | |
 Message Boards » » Biggest-ever series of cyber attacks uncovered Page [1]  
GeniuSxBoY
Suspended
16786 Posts
user info
edit post

Quote :
"BOSTON (Reuters) - Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world.

Security company McAfee, which uncovered the intrusions, said it believed there was one "state actor" behind the attacks but declined to name it, though one security expert who has been briefed on the hacking said the evidence points to China.

The long list of victims in the five-year campaign include the governments of the United States, Taiwan, India, South Korea, Vietnam and Canada; the Association of Southeast Asian Nations (ASEAN); the International Olympic Committee (IOC); the World Anti-Doping Agency; and an array of companies, from defense contractors to high-tech enterprises."



Oh snap.

http://news.yahoo.com/biggest-ever-series-cyber-attacks-uncovered-u-n-040749882.html

8/3/2011 1:45:47 AM

qntmfred
retired
40598 Posts
user info
edit post

those guys just don't give a what

8/3/2011 1:46:54 AM

LeonIsPro
All American
5021 Posts
user info
edit post

Quote :
"Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world."


Is it as serious as the WHITE HOUSE EMAIL PHISHING?

OH NO NOT SPAM.

8/3/2011 1:48:34 AM

BIGcementpon
Status Name
11318 Posts
user info
edit post

Quote :
""In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know.""

hmmm

8/3/2011 1:49:53 AM

AndyMac
All American
31922 Posts
user info
edit post

So McAfee "discovered" these intrusions

I bet they can sell the stuff to stop them also, right?

8/3/2011 9:41:17 AM

Netstorm
All American
7547 Posts
user info
edit post

How did McAfee make this discovery, I wonder? Just curious if they'll give a methodology.

8/3/2011 9:42:21 AM

ClassicMixup
All American
3877 Posts
user info
edit post

^

Quote :
"McAfee learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a "command and control" server that they had discovered in 2009 as part of an investigation into security breaches at defense companies."


It would be stupid of them to go in-depth on how it was discovered.

8/3/2011 10:00:05 AM

smoothcrim
Universal Magnetic!
18958 Posts
user info
edit post

mcafee's network security products and teams (largely acquired and having nothing to do with shitty AV software) are actually top notch. i've met some of their lead architects and they know their shit. with this in mind and having spoken to my friend at length who works in SecOps at google, this is highly likely.

[Edited on August 3, 2011 at 10:03 AM. Reason : .]

8/3/2011 10:02:24 AM

BobbyDigital
Thots and Prayers
41777 Posts
user info
edit post

In related news, I reported Obama for spam based on my twitter feed late last week.

8/3/2011 10:08:38 AM

Specter
All American
6575 Posts
user info
edit post

Quote :
"Association of Southeast Asian Nations (ASEAN)"


lol

8/3/2011 10:32:33 AM

LeonIsPro
All American
5021 Posts
user info
edit post


Quote :
"Experts warned that commercial espionage was a bigger threat to business than Lulzsec and Anonymous."


Lol no shit.

8/3/2011 12:20:25 PM

ThatGoodLock
All American
5697 Posts
user info
edit post

if i was a fortune 2000 company i would just clone my entire data setup with dummy info and hold a hacking competition for big prize money, specifically inviting Anonymous and Lulzsec. They have no reason to go after a company who is willing to listen to improve their security and besides that it's much better to get poked in the eye (Anonymous) than stabbed in the back (China)

8/3/2011 1:42:35 PM

aaronburro
Sup, B
52880 Posts
user info
edit post

i guess this security stuff just baffles me. is it laziness on the part of companies, inexperience, bad equipment, bad software? why can't we get ahead of these guys

8/3/2011 2:13:52 PM

ThatGoodLock
All American
5697 Posts
user info
edit post

i always figured it was either the almighty dollar as in a risk/cost type analysis or a CEO that doesn't care what those geeks in IT do he just wants to pay someone cheap to do it

8/3/2011 2:20:09 PM

IS250tim
All American
943 Posts
user info
edit post

The real question is what was hacked, was it standard servers or mainframes? The prevailing though is that no one has hacked a mainframe before (or at least claimed to have - which if you do it, you think someone claims it), so if they got through its security, much scarier as that opens a whole new set of doors since most critical banking, stocks, medical, etc records are housed on the mainframe.

8/3/2011 7:14:40 PM

smoothcrim
Universal Magnetic!
18958 Posts
user info
edit post

while there is tons of mainframe stuff still going on (half my company's revenue comes from it) the data these mainframes use is accessible outside the mainframe world and makes the necessity to hack z/OS almost non-existent.

8/3/2011 7:19:29 PM

qntmfred
retired
40598 Posts
user info
edit post

^^^

[Edited on August 3, 2011 at 7:21 PM. Reason : it's all just a big cost-benefit analysis]

8/3/2011 7:20:26 PM

moron
All American
34036 Posts
user info
edit post

Could be social engineering too, there's only so much you can do to control that.

8/3/2011 7:25:17 PM

 Message Boards » Chit Chat » Biggest-ever series of cyber attacks uncovered Page [1]  
go to top | |
Admin Options : move topic | lock topic

© 2024 by The Wolf Web - All Rights Reserved.
The material located at this site is not endorsed, sponsored or provided by or on behalf of North Carolina State University.
Powered by CrazyWeb v2.39 - our disclaimer.