Hackers target C-level execs and their families
Florian Weimer
fw at deneb.enyo.de
Thu Jul 5 09:44:21 PDT 2007
* Udhay Shankar N.:
> Hasn't this already been going on a while? I'm only surprised there
> hasn't been a big public incident yet.
Doesn't this one count?
| According to Chief Superintendent Arye Edelman, head of the Tel Aviv
| fraud squad, which ran the investigation, Haephrati used two methods
| to plant his malicious software (or malware) in the target
| computers. One was to send it via e-mail. The other was to send a disk
| to the target company that purported to contain a business proposal
| from a well-known company that would arouse no suspicions. Then, when
| an employee loaded the disk to view the proposal, the Trojan horse
| would infect his computer.
<http://www.haaretz.co.il/hasen/pages/ShArt.jhtml?itemNo=581790&contrassID=Cd=1>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the cypherpunks-legacy
mailing list