53 Pages, 10 Months, 1295 Infected Hosts, 103 Countries, And They Still Can't Say "Windows Malware"
Mar 31, 2009, 13:03 (10 Talkback[s])
(Other stories by Carla Schroder)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"They identified compromised systems by location and IP address,
and made a nice pie chart showing the distribution by country. They
identified high, medium, and low-value targets. They witnessed
machines being profiled and sensitive documents stolen. They
witnessed keystroke loggers, and Webcams and microphones activated
on the sneak. They learned that the malware that fuels the Ghost
Net is spread via Web sites and email attachments. The
investigation took 10 months and covered 103 countries.
"After all that, I am puzzled why they would omit such basic
information as what software was vulnerable on the infected hosts.
It sure looks like a growing trend to not name names, doesn't it.
Except when they're blaming end users. Though in this report it
appears to be as much political as technological."