L’attacco dalla Cina alle 30 aziende USA proveniva da computer dello Stato cinese, secondo Verisign

Tutto lascerebbe ritenere che lo spionaggio industriale sia di Stato e sia iniziato almeno a luglio 2009.

Researchers identify command servers behind Google attack.

“The source IPs and drop server of the attack correspond to a single foreign entity consisting either of agents of the Chinese state or proxies thereof,” the report says.

The researchers have determined that there are significant similarities between the recent attack and a seemingly related one that was carried out in July against a large number of US companies. Both attacks were apparently managed through the same command-and-control servers.
“The servers used in both attacks employ the HomeLinux DynamicDNS provider, and both are currently pointing to IP addresses owned by Linode, a US-based company that offers Virtual Private Server hosting. The IP addresses in question are within the same subnet, and they are six IP addresses apart from each other,” the report says. “Considering this proximity, it is possible that the two attacks are one and the same, and that the organizations targeted in the Silicon Valley attacks have been compromised since July.”
If the report’s findings are correct, it suggests that the government of China has been engaged for months in a massive campaign of industrial espionage against US companies.

If you like this post, please consider sharing it.

Leave a Comment

Your email address will not be published. Required fields are marked *