Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: driftdiver; ansel12; Kartographer; familyop; rarestia; liege

http://www.isightpartners.com/2014/10/cve-2014-4114/
That is another good article on Sandworm and who they targeted. Again it paints a picture completely different than the one in the article this thread links. Specifically different than this allegation; “A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.” That statement seems to be a bunch of crap.

Here is another article about sandworm targeting SCADA apparently sandworm hasn’t been sucessful at penetrating a SCADA system to date. They were “spear-phishing” a weponized powerpoint document. The Microsoft vulnerabilty the weponized powerpoint used has been patched;
http://www.isightpartners.com/2014/10/sandworm-team-targeting-scada-systems/


89 posted on 11/06/2014 8:29:53 PM PST by dynoman (Objectivity is the essence of intelligence. - Marylin vos Savant)
[ Post Reply | Private Reply | To 87 | View Replies ]


To: dynoman

To be fair, a majority of infections and infiltrations on networked systems occur as a direct result of user behavior. Spear fishing is just another way that these entities gain access to personal data and corporate networks in general. It just takes one infected user BYOD on a secured corporate network to bring down an entire company’s security fence.


96 posted on 11/07/2014 3:19:20 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 89 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson