[LINK] GhostNet
Rick Welykochy
rick at praxis.com.au
Mon Mar 30 09:19:06 AEDT 2009
stephen at melbpc.org.au wrote:
> Brenda forwards,
>
>> http://www.f-secure.com/weblog/archives/00001636.html
>> has a good explanation of the conficker/downadup worm
>
> 'Vast Spy System Loots Computers in 103 Countries'
> (Nb2, no mention, in either news reports, re specific operating systems)
In my readings of the press, with 100% accuracy to date, when the operating
system is not mentioned, it is Windows. I put this down to ignorance of
what an operating system is plus the ubiquity of Windows.
This case is no different. From the University of Illinois/Cambridge report
linked by Tom K <http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf>
The Tibetan monks whose machines were compromised were using Outlook Express
(i.e. Windows), and the initial infection vector was executable .DOC files
(Windows). My guess is they were files with a .doc.exe extension
but the extension .exe was hidden. This is a very common exploit in Windows.
The opening sentences of the report's conclusions are telling:
"In this note we described how agents of the Chinese government
compromised the computing infrastructure of the Office of His
Holiness the Dalai Lama. They used social phishing to install
rootkits on a number of machines and then downloaded sensitive
data. People in Tibet may have died as a result."
Things are going to get worse (more seamless and easy attacks to individual
and corporate Windows boxen) before they get better (Windows is ditched for
a more secure alternative).
cheers
rickw
--
_________________________________
Rick Welykochy || Praxis Services
We are all born mad.
Some remain so.
-- Samuel Beckett in Waiting for Godot.
More information about the Link
mailing list