Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Google Government IT

Experts Closing In On Google Attack Coders 141

ancientribe writes "The targeted attacks out of China that hit Google, Adobe, and other US organizations are still ongoing and have affected many more companies than the original 20 to 30 reported. Security experts now say they are getting closer to identifying the author or authors of the malware used to breach Google and other organizations."
This discussion has been archived. No new comments can be posted.

Experts Closing In On Google Attack Coders

Comments Filter:
  • Boy I can't wait! (Score:5, Insightful)

    by Weaselmancer ( 533834 ) on Thursday February 11, 2010 @01:10AM (#31095996)

    As soon as the United States identifies the culprits in China...wow are they in trouble.

  • Not Surprising (Score:3, Insightful)

    by LuNa7ic ( 991615 ) on Thursday February 11, 2010 @01:17AM (#31096040)
    Do you really expect that they would say anything else? "Sorry guys, this one has us stumped, we've no idea who did it." There are 15 paragraphs in TFA, and they've used them to not say a damned thing. Why did they even put this press release out?
  • Re:Propaganda (Score:2, Insightful)

    by BhaKi ( 1316335 ) on Thursday February 11, 2010 @01:19AM (#31096060)
    Ah, I'm worng. Again.
  • by chill ( 34294 ) on Thursday February 11, 2010 @02:26AM (#31096442) Journal

    About 80 percent of APT attacks use custom malware, Mandia says. "We recently took over 1,800 programs we've collected since 2008 that are all part of APT ... and ran it through AV, and only 24 percent of the malware triggered antivirus," he says. "Over a year ago, none of it was triggering AV."

    Signature-based anti-virus scanning isn't going to help. That model is broken and only useful for the "AOL mindset" of the general public. That is, the people who go "ohhhh, SHINY. [click]" and get infected by year-old malware.

    Serious pressure on software vendors to make sure their app doesn't need admin rights to run on a Windows box would be a nice step.

  • Re:Propaganda (Score:5, Insightful)

    by ahabswhale ( 1189519 ) on Thursday February 11, 2010 @02:53AM (#31096580)

    Why should they bother with the hassle of getting an exemption? More importantly, how does the fact that they do not have an exemption make them part of some government propaganda machine?

    Oh, and Chrome runs on Linux and OS-X. Not sure where you get the notion that it's Windows only.

    The only thing that doesn't hold water here is your argument.

  • by Anonymous Coward on Thursday February 11, 2010 @09:03AM (#31098420)

    All intelligence agencies do that.

    If you don't know who is going to be the fall guy, it's going to be you.

  • by Ukab the Great ( 87152 ) on Thursday February 11, 2010 @10:29AM (#31099260)

    We have to find the villains who did this nefarious thing. Otherwise, we'd lack scapegoats and would have it admit to ourselves that:

    - Adobe didn't learn a single damn lesson from Microsoft's Word Macro Virus debacles as to why allowing code to be embedded in what most users consider to be a static, non-code executing document is such a bad thing.

    - A business that supposedly hires the Best And The Brightest and discards applicants due to bad SAT scores 15 years ago got pwned.

    - Businesses were too dumb and shortsighted to update their browsers to something less obsolete and pay for a standard's compliant redesign of their web applications.

    - That most of these massive attacks are caused by script kiddies in China trying to impress girls by exploiting corporate stupidity, as opposed to Neo's elite evil twin.

Today is a good day for information-gathering. Read someone else's mail file.

Working...