Paul,
It was not  IP addresses that they were after - any case this is public 
property and they don't have to steal. The MO suggests they weren't in search 
of the conventional big things like military technology either, because they 
have been doing this for years http://tinyurl.com/y8rvukp

These guys were after dissidents and have since got some whose emails they are 
forwarding - http://tinyurl.com/yg5nlft

And about words failing you logic test, i have seen the port of this code on 
the Metasploit and it gives you shell access to a Windows PC - now, any 
security practitioner will tell you, you couldn't ask for more than this.

But in conclusion i must agree with you; the number of conspiracy theories 
available make the issue very complex to understand

Regards,
Douglas Onyango +256(0712)981329

Life is the educators practical joke in which you spend the first half 
learning, and the second half learning that everything you learned in the first 
was wrong.

--- On Mon, 1/18/10, Paul Bagyenda <[email protected]> wrote:

From: Paul Bagyenda <[email protected]>
Subject: Re: [LUG] OT- Google and China
To: "Linux Users Group Uganda" <[email protected]>
Date: Monday, January 18, 2010, 6:51 PM

I'm sorry but this whole story seems a little doubtful to me. Why, if you are 
Chinese Intelligence, use such blunt-instrument methods to obtain IP from 
american companies? Why not develop a Kim Philby (yes, Google is your friend) 
for the purpose? Failing that, there must surely be hundreds of 
chinese-american techies in those companies who can be leaned on for whatever 
reason to provide info. 
 Great narrative this, what with words/phrases like "hacking" and "dissidents" 
and "IE flaw". Fails to pass basic logic tests though. 
P. 
On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote:
 
 
 
 
 









The Advanced persistent threats (APT) technology said to have been used
by these guys in the attack has been a real worry among security practioners. 
Because
this simply means that the attacker has muscle!! There has been talk that the
bad guys invest a lot in this technology that mostly involves stealthy tactics 
with
zero day attacks.  Again holes in IE continue to worry many.  But the real 
question though is, can Google afford to loose the China ?
  Regards;Thomas.  Thomas Bbosa , CISSP  BitWork Technologies
(U) Ltd 

Plot 135, UMA show Grounds –Lugogo

 P.O.BOX 851 , Kampala , UgandaTel:    
+256-414-579099Mob:  
+256-782480878 Fax:     +256-414-289218Website: http://www.bitworktech.com 







From: Daniel Bwente
[mailto:[email protected]] 

Sent: 15 January 2010 12:25

To: Linux Users Group Uganda

Subject: Re: [LUG] OT- Google and China 

  Insight on the attack
Vectors used to hit Google and others,



http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/



Operation “ Aurora ”

I am sure you are wondering about the name “ Aurora .”  Based on our analysis,
“ Aurora ”
was part of the filepath on the attacker’s machine that was included in
two of the malware binaries that we have confirmed are associated with the 
attack.





Cheers 

On Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]> 
wrote:As much as the US needs China 
for that credit line, China 
needs the US 
because we buy all their products. If the US 
stopped buying Chinese made products and China 
called in the debt owed by the US 
I think that China 
would blink first. This might turn into the beginning of that struggle.



_______________________________________________

LUG mailing list

[email protected]

http://kym.net/mailman/listinfo/lug

%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/



The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.

---------------------------------------



 







-- 

 Dan

 +256-071-2-552035



"You won't have eyes tonight. You won't have ears or a tongue. you will
wander the underworld blind, deaf and dumb and all the dead will know; This is
Hector: the fool who thought he killed Achilles." 






_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------



-----Inline Attachment Follows-----

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------




      
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to