On 01/09/2017 01:51 PM, m.roth@xxxxxxxxx wrote:
Always Learning wrote:
On Fri, 2017-01-06 at 12:54 -0500, m.roth@xxxxxxxxx wrote:
James B. Byrne wrote:
On Thu, January 5, 2017 17:23, Always Learning wrote:
Cyber attacks are gradually replacing armed conflicts.
Better fight with bits than blood.
Yes, but... attacks on the friggin' IoT could result in lots of blood.
Or, less so, what do you mean all the rail lines have been knocked out
of commission for a week, and we can't get food to the eastern half of
the country? Or power?
<snip>
Query: How did the Reds get into the Democrats computer systems ? Hope
it wasn't a Redhat/Centos system but an 'open Windoze' set-up.
In at least one of the several, it was a phishing attack. ....
Though not being a professional cyber spy, still I don't see how it's
possible at all to determine the source of the hack. Once someone's
machine succumbs to a phish, the attacker could install something like
tor which would conceal all hacker traffic with the hacked machine.
Indeed, a professional could, further, set up a chain or web of such
compromised machines, each connected to the other via tor to further
hide the hacker's home... if that would even be necessary (?).
Moreover, https://www.youtube.com/watch?v=C2jD4SF9gFE and others also
provide enlightening expert details about the software allegedly used in
the hack, maintaining it was a couple years old, not even the latest
versions available "off the shelf" on the dark web, hardly software
which would be used by a state agent.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos