Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: dynoman

To be fair, a majority of infections and infiltrations on networked systems occur as a direct result of user behavior. Spear fishing is just another way that these entities gain access to personal data and corporate networks in general. It just takes one infected user BYOD on a secured corporate network to bring down an entire company’s security fence.


96 posted on 11/07/2014 3:19:20 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 89 | View Replies ]


To: rarestia

Yes if you read the article the weaponized powerpoint was a lure; “Many of the lures observed have been specific to the Ukrainian conflict with Russia and to broader geopolitical issues related to Russia.” If the target didn’t open the powerpoint there was no exploit.

Way different than what the ABC article linked in the opening post implies.

“A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security.”

That statement is simply not true.


98 posted on 11/07/2014 3:40:44 AM PST by dynoman (Objectivity is the essence of intelligence. - Marylin vos Savant)
[ Post Reply | Private Reply | To 96 | View Replies ]

To: rarestia

Another comment puts it this way; “•An attacker can exploit this vulnerability [now patched in Microsoft Windows] to execute arbitrary code but will need a specifically crafted file and use social engineering methods (observed in this campaign) to convince a user to open it.”


99 posted on 11/07/2014 3:46:33 AM PST by dynoman (Objectivity is the essence of intelligence. - Marylin vos Savant)
[ Post Reply | Private Reply | To 96 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson