Security - we've heard of it
"a complete list of usernames and passwords from an unspecified [US government] agency". The Keystone Kops, presumably?
Leaked US diplomatic cables have provided some of the first hard evidence that the US is engaged in a heated cyberespionage battle with China, a conflict diplomats reckon is showing few signs of cooling off. Diplomatic cables, obtained by WikiLeaks and released to the media by a third party last week, trace a series of …
Nothing released from anything put out by Wikileaks is either a surprise or anything that remotely shows the Chinese Government involved in an illegal act. No smoking gun, nothing. In fact the only illegal thing in all of this was committed by the people who stole the diplomatic cables. What's not known is how the data got to Wikileaks and who assisted them.
"Websites associated with attacks dating back to 2006 were registered using the same postal code in the central Chinese town of Chengdu that is used by the People's Liberation Army Chengdu Province First Technical Reconnaissance Bureau (TRB)"
Is it just me or is this too stupid to be true. A 'secret spy agency' decides to cyber atack everyone and the first thing they do is register their attack websites to their own, known address??
Next point, they got away with 50 MB of data from emails. That's less than 50 emails where I work (due to MS bloatware).
Watch out world! Those are some scary spies!
If the US is already not too bothered about making an international incident out of it, why waste time and effort hiding who you are? I'd guess that it's probably quite easy to work out when an attack comes from a foreign superpower, and it would probably be reasonably easy to assume it was China.
was in the 50MB of email and from whom it came. Particularly if they did some sort of remote filtering and only took the good stuff.
I imagine that if you had 50M of text only email from Bill Gates' email account that he used to communicate with his VP staff, you'd have some pretty valuable stuff.
Biting the hand that feeds IT © 1998–2019