tag:blogger.com,1999:blog-4088979.post8163330679363342235..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: France v ChinaRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-4088979.post-27005855770497847822007-09-12T01:52:00.000-04:002007-09-12T01:52:00.000-04:00if all those accusations are true, i will be very ...if all those accusations are true, i will be very proud of being a chinese.<BR/>otherwise, i'd say that those who made accusations are bloody liars!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-44867635055726385702007-09-10T21:52:00.000-04:002007-09-10T21:52:00.000-04:00Perhaps New Zealand:http://www.nzherald.co.nz/sect...Perhaps New Zealand:<BR/>http://www.nzherald.co.nz/section/1/story.cfm?c_id=1&objectid=10462899Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-42116076410270259362007-09-09T17:45:00.000-04:002007-09-09T17:45:00.000-04:00Since 2003 Sept, we have found first big scale int...Since 2003 Sept, we have found first big scale intrusion event, the victim <BR/>is the National Police Agency, attacked by at least 2 groups of china hackers,<BR/>from HuBei and JianSu. <BR/><BR/><BR/>2003 Oct. Military Missile Plan Leakage.<BR/>2004 Jan, Executive Yuan 300+ PC compromised. <BR/>2004 Apr. Fake Official Dept. E-mail with Trojan found<BR/>2004 Sep. Ministry of Foreign Affairs and embassy compromised.<BR/>2004 Nov. DPP compromised.<BR/>2005 May. Big scale: Gov, High-Tech,on-line banking, Science Park(200+ companies compromised)<BR/>2005 Jul. Ministry of Foreign Affairs again.<BR/>2005 Sep. National Security council compromised.<BR/>2005 Nov. Military Central Command compromised.<BR/>2006 Mar. Legislative Yaun, Reporters compromised.<BR/>2007 Apr. Military Operation plan leakage due to USB data collect backdoor.<BR/><BR/>There are a least 8 China Hacker Groups. we call them as HuBei Jun(Jun for military troop)<BR/>ShangHai Jun, Beijing/TienJing Jun, GuoDong Jun, FuJian Jun, SiChuan Jun, JianSu Jun, SiAnn Jun. <BR/><BR/>What they want is to collect the contact list files (outlook, MSN ...) to build a huge database about relationships for future use,<BR/>from the contact list, hackers can send a 'well-make' trojaned mail to the others in the contact list, then victims <BR/>will trust the e-mail's subject and fake e-mail source, open it and been compromised. And, periodically jump back to collect the lastest <BR/>documents in all file types. Even steal your mail account to have a copy of your mail boxes. <BR/><BR/>(1) Organized: have principle, formal check-in/out time, <BR/>in our domain name (used by backdoor) observations, they start to work at 0700 GMT+8 Round 1, 1150 Lunch, 1400 Round 2, 1730 Take a break,<BR/>then, depends on group, have night team, to hack foreign countries. <BR/><BR/>(2) the Tools. not common seen in public Internet .<BR/>some hacker groups using the same military produced/purchased hacking tools.<BR/><BR/>(3) the source IP we sniffer from incident handling, can be directly mapping to military regions of China.<BR/><BR/>the story is on going everyday!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-50905769412878823442007-09-09T16:40:00.000-04:002007-09-09T16:40:00.000-04:00I'd like to see mention of the Italian government....I'd like to see mention of the Italian government.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-687441546800453322007-09-09T09:54:00.000-04:002007-09-09T09:54:00.000-04:00Matasano mentioned Italy a while back.<A HREF="http://www.matasano.com/log/867/chinese-hackers-use-zero-day-to-obtain-prada-zero-day/" REL="nofollow">Matasano </A> mentioned Italy a while back.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-22565287149476956072007-09-09T07:46:00.000-04:002007-09-09T07:46:00.000-04:00Has someone named Italy?http://www.google.com/tran...Has someone named Italy?<BR/><BR/>http://www.google.com/translate?u=http%3A%2F%2Fpunto-informatico.it%2Fp.aspx%3Fi%3D2059376&langpair=it%7Cen&hl=en&ie=UTF8Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-71783827361028340392007-09-08T21:19:00.000-04:002007-09-08T21:19:00.000-04:00What's happening with China? I have been seeing a ...What's happening with China? I have been seeing a lot of hits from China in the last few of years. But now, with the latest attacks apparently originating from China, I have to ask myself. Is China trying to hack the world?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-81118099300069172852007-09-08T20:43:00.000-04:002007-09-08T20:43:00.000-04:00We just need to get China and France to take each ...We just need to get China and France to take each other out. Here's something to consider: which is more harmful to the US - France or China - when it comes to "cyber" attacks?Anonymousnoreply@blogger.com