Full Disclosure mailing list archives

Re: All China, All The Time


From: James Matthews <nytrokiss () gmail com>
Date: Thu, 14 Jan 2010 22:47:43 -0500

They used an IE exploit to get in. I don't understand Google said that they
used a complex way to access their systems. AFAIK many home users are hacked
daily the same way....



On Thu, Jan 14, 2010 at 7:44 PM, Ivan . <ivanhec () gmail com> wrote:

Interesting article on zdnet, talking about the targeting of the
lawful intercept system at Google

…they [hackers] apparently were able to access a system used to help
Google comply with search warrants by providing data on Google users,
said a source familiar with the situation, who spoke on condition of
anonymity because he was not authorized to speak with the press.
“Right before Christmas, it was, ‘Holy s***, this malware is accessing
the internal intercept [systems],’” he said.

http://blogs.zdnet.com/Foremski/?p=1047

2010/1/15 Michael Holstein <michael.holstein () csuohio edu>:

With all the hubbub around China yet again, I would like to remind you
of the utilities available at Hammer of God that allow one to completely
block any or all traffic to or from China or any other country in the world
via ISA/TMG.


Source for pre-built blocklists in DNSBL, CIDR, or Cisco ACL format :

http://www.okean.com/thegoods.html

Regards,

Michael Holstein
Cleveland State University


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://www.goldwatches.com

--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: