全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 7006|回复: 17
打印 上一主题 下一主题

看来Linode“要火”

[复制链接]
跳转到指定楼层
1#
发表于 2010-1-15 00:42:03 | 只看该作者 回帖奖励 |正序浏览 |阅读模式
http://arstechnica.com/security/ ... ind-google-attack.a

VeriSign's iDefense security lab has published a report with technical details about the recent cyberattack that hit Google and over 30 other companies. The iDefense researchers traced the attack back to its origin and also identified the command-and-control servers that were used to manage the malware.

The cyber-assault came to light on Tuesday when Google disclosed to the public that the Gmail Web service was targeted in a highly-organized attack in late December. Google said that the intrusion attempt originated from China and was executed with the goal of obtaining information about political dissidents, but the company declined to speculate about the identity of the perpetrator.

Citing sources in the defense contracting and intelligence consulting community, the iDefense report unambiguously declares that the Chinese government was, in fact, behind the effort. The report also says that the malicious code was deployed in PDF files that were crafted to exploit a vulnerability in Adobe's software.

"The source IPs and drop server of the attack correspond to a single foreign entity consisting either of agents of the Chinese state or proxies thereof," the report says.

The researchers have determined that there are significant similarities between the recent attack and a seemingly related one that was carried out in July against a large number of US companies. Both attacks were apparently managed through the same command-and-control servers.

"The servers used in both attacks employ the HomeLinux DynamicDNS provider, and both are currently pointing to IP addresses owned by Linode, a US-based company that offers Virtual Private Server hosting. The IP addresses in question are within the same subnet, and they are six IP addresses apart from each other," the report says. "Considering this proximity, it is possible that the two attacks are one and the same, and that the organizations targeted in the Silicon Valley attacks have been compromised since July."

If the report's findings are correct, it suggests that the government of China has been engaged for months in a massive campaign of industrial espionage against US companies.


自己看吧..

管理员如果觉得我发的位置部队就移吧
18#
发表于 2010-1-19 18:43:19 | 只看该作者
恩,那天我突然发现我的VPN和密码实在太简单,于是全部修改了。并且UPDATE了一下。重新配置了下IPTABLE,于是。。今天就杯具了
17#
发表于 2010-1-18 22:09:18 | 只看该作者
google和Linode有合作?
16#
发表于 2010-1-16 16:58:31 | 只看该作者

回复 14# 的帖子

Linode配合调查
15#
 楼主| 发表于 2010-1-16 15:51:29 | 只看该作者

回复 14# 的帖子

哈哈,那Linode还不更火了,Google都去用Linode了!
14#
发表于 2010-1-16 13:23:58 | 只看该作者
13#
发表于 2010-1-15 15:05:29 | 只看该作者

回复 12# 的帖子

呵呵,统一漏洞。
12#
发表于 2010-1-15 11:40:22 | 只看该作者

回复 11# 的帖子

Linode的都是Linux不大可能黑到这么多吧
11#
发表于 2010-1-15 11:22:56 | 只看该作者
用的linode的服务器,到底是黑的还是买的?
10#
发表于 2010-1-15 11:21:20 | 只看该作者
原帖由 Wei 于 2010-1-15 00:52 发表
简单的说攻击google的人用的linode


不排除这个可能性,呵呵。
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2025-10-25 06:07 , Processed in 0.116696 second(s), 11 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表