• I always wonder how these “security experts” can identify which state is responsible for the compromise. In this case its “Chinese” state actors. But how do we really know? Wouldn’t it be in the best interests of state sponsored hacking teams to hide or blame other states?

    • catdog@lemmy.ml
      link
      fedilink
      arrow-up
      8
      ·
      3 hours ago

      I can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.

    • Avid Amoeba@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      3 hours ago

      Wouldn’t it be in the best interests of state sponsored hacking teams to hide or blame other states?

      Of course. If I were leading an offencive team at CSIS, I’d do my best to procure machines and credentials in anorher country to launch the campaign from. Ideally a known adversary. That doesn’t mean that country isn’t executing their own attacks. In fact my charade wouldn’t work if I chose a country that has no track record of attacks.

      • slowcakes@programming.dev
        link
        fedilink
        arrow-up
        2
        ·
        1 hour ago

        Dude this is notepad++, no one cares, we all know china Russia, employs multiple teams for hacking. But they still get caught and nothing happens, because they all will deny it.

        This isn’t the chinese Uber team, that plans ahead several months, this is more: oh I found exploit in notepad++, via some tool. It isn’t worth the effort, because they are just looking for exploits in the wild.