|Main Archive Page > Month Archives > full-disclosure-uk archives|
They used an IE exploit to get in. I don't understand Google said that they used a complex way to access their systems. AFAIK many home users are hacked daily the same way....
On Thu, Jan 14, 2010 at 7:44 PM, Ivan . <email@example.com> wrote:
> Interesting article on zdnet, talking about the targeting of the
> lawful intercept system at Google
> …they [hackers] apparently were able to access a system used to help
> Google comply with search warrants by providing data on Google users,
> said a source familiar with the situation, who spoke on condition of
> anonymity because he was not authorized to speak with the press.
> “Right before Christmas, it was, ‘Holy s***, this malware is accessing
> the internal intercept [systems],’” he said.
> 2010/1/15 Michael Holstein <firstname.lastname@example.org>:
> >> With all the hubbub around China yet again, I would like to remind you
> of the utilities available at Hammer of God that allow one to completely
> block any or all traffic to or from China or any other country in the world
> via ISA/TMG.
> > Source for pre-built blocklists in DNSBL, CIDR, or Cisco ACL format :
> > http://www.okean.com/thegoods.html
> > Regards,
> > Michael Holstein
> > Cleveland State University
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-- http://www.goldwatches.com --
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/