Corporate Espionage and Trojan Horses
Picture credit: http://www.emich.edu
Via Arik's blog, an excellent recap of the Israeli corporate espionage scandal.
* [Some] ...very prominent Israeli companies were infected by a trojan. Foreign companies may have been victims as well, but names of those were not provided. * The trojan was targeted specifically at those companies by the perpetrator, and more specifically at key people in those companies and PR companies working for those companies. * The trojan was targeted at Windows machines. * The attack vector was social engineering, using e-mail and CD-ROMs sent to the victims as ‘a business proposal’. * Data proliferated from some of the infected machines includes (but is not limited to) the ‘My Documents’ folder and screen captures. * The stolen data was sent to “FTP servers” both out and inside Israel. The protocol used for the actual transfer was not disclosed. * The trojan was never detected within the infiltrated companies until the police looked for it... |
Saar Drimer also states, "...the police’s own computers were compromised by the very method they were investigating!"
Arik's blog: Trojan horses abound
No comments:
Post a Comment