Berkeley CSUA MOTD:Entry 54153
Berkeley CSUA MOTD
2021/09/20 [General] UID:1000 Activity:popular

2011/8/3-27 [Politics/Foreign/Asia/China, Computer/SW/Virus] UID:54153 Activity:nil
        Chinese suspected behind massive wave of cyber attacks.
        \_ CHING CHONG I had an epithany!!!
2021/09/20 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2014/1/2-2/5 [Politics/Foreign/Asia/China, Politics/Foreign/MiddleEast/Iraq] UID:54761 Activity:nil
1/2     "What would a U.S.-China war look like?" (
2014/1/7-2/5 [Reference/Religion, Politics/Foreign/Asia/China] UID:54762 Activity:nil
1/7     Are you from a family of Mormons, Cuban exiles, Nigerian Americans,
        Indian Americans, Chinese Americans, American Jews, Iranian Americans
        or Lebanese Americans? (
        \_ Somehow she misssed WASP Episcopalians.
2013/3/28-5/10 [Computer/Rants, Politics/Foreign/Asia/China] UID:54641 Activity:nil
3/28    "Horrifying Video From China Shows Just How Suddenly A Sinkhole Can
        Appear" (
2013/2/5-3/4 [Politics/Domestic/Immigration] UID:54598 Activity:nil
2/5 (
        "I hope no one uses the term 'illegal immigrants' here today," said
        Committee Ranking Member John Conyers of Michigan. "Our citizens are
        not illeg -- the people in this country are not illegal. They are out
        of status."
        How did this guy get himself on the House Judiciary Committee?  Is it
2012/12/5-18 [Politics/Domestic/Election] UID:54548 Activity:nil
12/5    Romney is right after all -- our military does need more horses and
        bayonets!  Romney for 2012!
        \_ I'd never considered Romney's campaign as an ad for Revolution,
           but I guess that makes as much sense anything else.
        \_ The tax cut removal is ill timed.
        \_ holy crap. This is scary. US troops are most vulnerable as it is
2012/7/25-10/17 [Reference/History/WW2/Japan, Politics/Foreign/Asia/Japan] UID:54444 Activity:nil
        Japan rules!
        \_ Fifteen years ago I worked there for seven months.  I miss Japan!
           (I'm Chinese immigrant.)  More facts:
           - Besides cold drinks, vending machines also carry hot drinks like
             hot tea and corn soup.  And they are actually hot instead of warm.
2012/3/2-26 [Politics/Foreign/Asia/China] UID:54325 Activity:nil
3/2     I just came back from Asia and I'm completely convinced that
        it is where economic boom will really happen in the next decade.
        What's a good web site to learn Chinese?
2011/12/2-2012/2/6 [Politics/Foreign/Asia/China] UID:54247 Activity:nil
12/2    "Students Uncover China Nuke Tunnels" (
        ~3000 miles of tunnel network.
        \_ WaPo article on same:
2011/12/20-2012/2/6 [Politics/Foreign/Asia/China, Computer/Rants] UID:54268 Activity:nil
12/20   A higher percentage of people in China than in Pakintan have an
        unfavorable view of China:
        Go figure.
        \_ damn these self critical liberals!
2011/12/22-2012/2/6 [Politics/Foreign/Asia/China] UID:54270 Activity:nil
12/22   "Chinese Hack Into US Chamber of Commerce, Authorities Say" (
        "At one point, the penetration into the Chamber of Commerce was so
        complete that a Chamber thermostat was communicating with a computer
        in China."
2006/1/3-5 [Computer/SW/OS/Windows] UID:41214 Activity:nil
1/3     Regarding the WMF vulnerability, is it true that if you're using
        Firefox 1.5, you'll always be prompted when there's a WMF image on a
        web page?  I know those using IE are SOL unless they install the 0-day
        patch from Ilfak Guilfanov mentioned here:
        This part is funny:
2004/5/7 [Computer/SW/Virus] UID:30094 Activity:nil
5/7     Have you installed both Norton and McAfee on the same system?
        Which is better?
2003/7/1-2 [Computer/SW/Mail] UID:28887 Activity:moderate
7/1     Does anyone use any SMTP antivirus scanning software for unix/linux?
        I'm looking at Sophos, McAfee, etc. Symantec seems to have the worst
        \_ Using Sophos.  Not to shabby.  They stay on top of new viruses
           pretty damn well, and its resource footprint is quite small.
           Only thing is you must restart to load updates, which is a touch
2000/3/18-19 [Computer/SW/OS/Windows] UID:17798 Activity:high
3/17    Mcafee VirusScan now requires Internet Explorer 4.0 or above.
        This is the end of the world.
        \_ And I feel fine.
        \_ Don't you listen to Microsoft? Internet Explorer IS a part of
           the operating system.  Don't let those LINsUX freaks tell you
           that IE'S JUST A USER PROGRAM MAN.
Cache (4427 bytes)
Massive hacking trail uncovered: McAfee 8:08pm EDT US Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. REUTERS/Hyungwon Kang US Department of Homeland Security analysts work at the National Cybersecurity & Communications Integration Center (NCCIC) located just outside Washington in Arlington, Virginia on September 24, 2010. Jim Finkle BOSTON | Wed Aug 3, 2011 12:11am EDT BOSTON (Reuters) - Hackers breached the computer networks of 72 organizations around the world over a five-year period, in the biggest hacking campaign discovered to date, security firm McAfee said on Wednesday. Here are questions and answers on the attacks, dubbed "Operation Shady RAT" by McAfee, which was bought by Intel Corp earlier this year: Q Who are the victims? A They include: - Governments of Canada, India, South Korea, Taiwan, United States and Vietnam. McAfee declined to identify many of the victims by name. A McAfee found evidence of security breaches dating back to mid-2006, but said the hacking might have begun well before that. Some of the attacks lasted just a month, others stretched to as many as 28 months. The hackers sent so-called spear-phishing emails, which are tainted with malicious software, to specific people at the targeted organizations. When the unsuspecting individual clicks on an infected link, it allows intruders to jump on to the machine and use it to infiltrate the computer network. A McAfee investigators have done their best to guess what was likely stolen, based on interviews with a number of victims. McAfee Vice President of Threat Research Dmitri Alperovitch said the attacker sought data that would give it military, diplomatic and economic advantage. "If you look at an industry and think about what is most valuable in terms of intellectual property, that is what they were going after," Alperovitch said. As examples, he cited email archives, negotiation documents and schematics for electronics. A McAfee's Alperovitch said he believes that a nation state was behind the attacks, but he declined to identify it. He said the attacker is the same country that was behind other security breaches that McAfee has previously investigated. Jim Lewis, an expert in cyber attacks with the Center for Strategic and International Studies, was briefed by McAfee. Lewis said the presence of Taiwan and the International Olympic Committee in the victims list suggest China is most likely the perpetrator of the attack. A "This is the biggest transfer of wealth in terms of intellectual property in history," Alperovitch said. "The scale at which this is occurring is really, really frightening." "Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors," he said. A While investigating some attacks against defense contractors, McAfee researchers found a "command and control" server in 2009 used to manage the campaign. In March of this year, they returned to that computer and found logs that revealed all of the attacks. McAfee is typically unable to discuss its investigations because of non-disclosure agreements. The company was able to discuss Operation Shady RAT because it was not bound by any confidentiality agreements in this case. A RAT stands for "remote access tool," a type of software that hackers and security professionals often use to access computer networks from afar. commentFrame We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. wmcmyers wrote: The West has been placating China for too long. If there is credible evidence that China is behind this program of espionage, it should face severe consequences. This might include the seizure of Chinese assets in the United States and elsewhere in the West; travel limitation on the officials responsible, or similar penalties. The one thing we cannot do is just ignore this behavior. If we do, it will continue, with unpredictable consequences. If China continues to behave in such war-like ways, it should face war-like consequences.