Unlike locating a missile launch, it’s impossible to prove the exact origin of most cyber attacks. What appears to be the origin can simply be a machine remote controlled through a hundred other machines bouncing the signal from opposite sides of the planet. And even if intelligence followed and analyzed those 100 machines without a single compromise, they’ll likely end up at a dead end. A hacker can use long distance antennas to upload code far from the true access point and be gone months before the attack even begins.
Intelligence agencies will entirely spoof evidence to make it appear from another country. Everything including slang used in the code is spoofed to make it appear like someone else
Sure, I believe that.
But when I look at which country is also engaged in a trade war with Australia right now, and constantly making insulting statements through their diplomats, I think there’s a pretty obvious suspect here.
Exactly, which is why the source of the hacking was unknown.
But...while the source was unknown, a simple graph of the time of attacks showed (as an example) that the hacks were taking place at 8:00 PM to Midnight, then would slack off for about a half hour, then pick up again at 12:30 AM and continue on until 5 or 6 AM.
Just the workday over in Shanghai. (don’t know if I got those times right or not, no coffee yet)