Hackers target C-level execs and their families

Florian Weimer fw at deneb.enyo.de
Thu Jul 5 09:44:21 PDT 2007


* Udhay Shankar N.:

> Hasn't this already been going on a while? I'm only surprised there
> hasn't been a big public incident yet.

Doesn't this one count?

| According to Chief Superintendent Arye Edelman, head of the Tel Aviv
| fraud squad, which ran the investigation, Haephrati used two methods
| to plant his malicious software (or malware) in the target
| computers. One was to send it via e-mail. The other was to send a disk
| to the target company that purported to contain a business proposal
| from a well-known company that would arouse no suspicions. Then, when
| an employee loaded the disk to view the proposal, the Trojan horse
| would infect his computer.

<http://www.haaretz.co.il/hasen/pages/ShArt.jhtml?itemNo=581790&contrassID=Cd=1>

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list