So how do these error messages look like?
Inquiring minds want to know...
A researcher has discovered a flaw in software used to spy on government agencies and contractors that can alert security personnel that their networks have been infiltrated by the otherwise hard-to-detect programs. The discovery by Joe Stewart, Dell SecureWorks' director of malware research, could help administrators detect so …
According to the report at http://www.secureworks.com/research/threats/htran/
"we were lucky enough to observe a transient event that showed a deliberate attempt to hide the true origin of an APT" in the PRC, so it sounds as though it's very compelling evidence, possibly even beyond a reasonable doubt :-)
I was helping a friend of my daughter. In another state, so I was giving him a tutorial about proxies. Strangely enough his machine was proxying though the PRC and Taiwan, no other apparent infection. Given that his mother apparently worked in a sensitive governmental area well....
Targeted fish -> child
child+usb -> parents computer
parent + usb -> Significant compromise.
It would have been interesting to have been involved with the cleanup of the thing, but 10 to 1 the active payload on the PC would have been minimal since its web access was poisoned...