Saturday, August 6, 2011

Hackers in your window, so that hide your children hide your files

Eric Schonfeld is currently working on TechCrunch as co-author. He joined in 2007 and based in New York. Schonfeld oversees the editorial content of the site, selects and edits guest posts, conference program helps Disrupt and CrunchUps, produces some TCTV shows and daily wrote in a blog post. He is also the father of three. ? Read More

Shady RAt map

Remember when Google was hacked by Chinese spies about 18 months ago? Well, that just scratched the surface of some of the more serious and persistent hacking operations over the past few years. In a detailed blog post that is both instructive and brilliant piece of marketing, McAfee, Vice President of threat research Dmitry Alperowitsch set out the details of the operations of the shadowy rat (remote access), an ongoing series of invasions of the computer system, which began back in 2006 and compromised 72 organizations, including the United Nations, the International Olympic Committee, the world anti-doping agentstvaOboronnyh contractors, United States, federal and State Government agencies, the United States national security think tank, tech companies and even regrettable computer security firm "(presumably McAfee competitor).

The magnitude of the attacks made things like recent Sony Playstation or News Corp hacks look like children's toys. Trust indicators point to a "State actor" perhaps China (McAfee post does not define any State actor, he suspects, but China has long been here).

Alperowitsch quite frighteningly says:

I am convinced that every company in every conceivable industry with significant size and value of intellectual property and trade secrets has been compromised (or will soon), the vast majority of victims are rarely intrusion detection or its consequences. In fact, I share the entire set of Fortune Global 2000 firms into two categories: those who know they were compromised and those who don't yet know.

. . . What we have seen in the past five or six years has been nothing short of historically unprecedented transfer of wealth — secret secrets (including from sensitive government networks), source code, databases, e-mail archives, plans and intelligence details for new oil and gas fields in the auctions, shopping, legal contracts, SCADA configuration, schema design and much more "decreased truck" from the numerousmostly Western companies and disappeared in the growing electronic archives have opponents.

McAfee learned all those details with manage your server "& control" Command, sending exploits. Shady rat operation led to the long gathering confidential information from government agencies, companies and international organizations. Alperowitsch explains how it works:

Compromises were standard procedure for these types of targeted incursions: spear Phishing email containing the attacker is sent to the person with the right level of access in the enterprise and to exploit the opening on an unpatched system will initiate download malware implant. Malware will perform and trigger a backdoor communication channel to the Web Server Command control & and interpret the instructions coded into hidden comments embedded in the code of a Web page. It will be quickly followed by lively jumps on the infected computer and we begin to rapidly escalate privileges and laterally move within the Organization to establish a new permanent footholds through additional compromised machines running malware implants, as well as the orientation for the quick exfiltration of key data they came for.

Do you feel scared and vulnerable yet? Well I am sure that McAfee will sell your company's service, which will make you feel safer security monitoring. But you really will be any safer if public Hackers want access to the files? They could climb in your windows right now.


McAfee, Inc. (NYSE: MFE) makes the antivirus and security software. Their main brand, McAfee VirusScan, but other brands are the IntruShield, Entercept and Foundstone.

Read More

View the original article here

No comments:

Post a Comment