I think Paul meant IP as in Intellectual Property...
On Jan 19, 2010, at 12:13 AM, Douglas Onyango wrote:
Paul,
It was not IP addresses that they were after - any case this is
public property and they don't have to steal. The MO suggests they
weren't in search of the conventional big things like military
technology either, because they have been doing this for years http://tinyurl.com/y8rvukp
These guys were after dissidents and have since got some whose
emails they are forwarding - http://tinyurl.com/yg5nlft
And about words failing you logic test, i have seen the port of this
code on the Metasploit and it gives you shell access to a Windows PC
- now, any security practitioner will tell you, you couldn't ask for
more than this.
But in conclusion i must agree with you; the number of conspiracy
theories available make the issue very complex to understand
Regards,
Douglas Onyango +256(0712)981329
Life is the educators practical joke in which you spend the first
half learning, and the second half learning that everything you
learned in the first was wrong.
--- On Mon, 1/18/10, Paul Bagyenda <[email protected]> wrote:
From: Paul Bagyenda <[email protected]>
Subject: Re: [LUG] OT- Google and China
To: "Linux Users Group Uganda" <[email protected]>
Date: Monday, January 18, 2010, 6:51 PM
I'm sorry but this whole story seems a little doubtful to me. Why,
if you are Chinese Intelligence, use such blunt-instrument methods
to obtain IP from american companies? Why not develop a Kim Philby
(yes, Google is your friend) for the purpose? Failing that, there
must surely be hundreds of chinese-american techies in those
companies who can be leaned on for whatever reason to provide info.
Great narrative this, what with words/phrases like "hacking" and
"dissidents" and "IE flaw". Fails to pass basic logic tests though.
P.
On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote:
The Advanced persistent threats (APT) technology said to have been
used by these guys in the attack has been a real worry among
security practioners. Because this simply means that the attacker
has muscle!! There has been talk that the bad guys invest a lot in
this technology that mostly involves stealthy tactics with zero day
attacks. Again holes in IE continue to worry many.
But the real question though is, can Google afford to loose the
China ?
Regards;
Thomas.
Thomas Bbosa , CISSP
BitWork Technologies (U) Ltd
Plot 135, UMA show Grounds –Lugogo
P.O.BOX 851 , Kampala , Uganda
Tel: +256-414-579099
Mob: +256-782480878
Fax: +256-414-289218
Website: http://www.bitworktech.com
From: Daniel Bwente [mailto:[email protected]]
Sent: 15 January 2010 12:25
To: Linux Users Group Uganda
Subject: Re: [LUG] OT- Google and China
Insight on the attack Vectors used to hit Google and others,
http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/
Operation “ Aurora ”
I am sure you are wondering about the name “ Aurora .” Based on
our analysis, “ Aurora ” was part of the filepath on the attacker’s
machine that was included in two of the malware binaries that we
have confirmed are associated with the attack.
Cheers
On Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]
> wrote:
As much as the US needs China for that credit line, China needs the
US because we buy all their products. If the US stopped buying
Chinese made products and China called in the debt owed by the US I
think that China would blink first. This might turn into the
beginning of that struggle.
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them
(including attachments if any). The List's Host is not responsible
for them in any way.
---------------------------------------
--
Dan
+256-071-2-552035
"You won't have eyes tonight. You won't have ears or a tongue. you
will wander the underworld blind, deaf and dumb and all the dead
will know; This is Hector: the fool who thought he killed Achilles."
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them
(including attachments if any). The List's Host is not responsible
for them in any way.
---------------------------------------
-----Inline Attachment Follows-----
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them
(including attachments if any). The List's Host is not responsible
for them in any way.
---------------------------------------
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them
(including attachments if any). The List's Host is not responsible
for them in any way.
---------------------------------------
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
The above comments and data are owned by whoever posted them (including
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------