Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: for-q-clinton

If you RTFA, you’ll see that the initial penetration was via a Microsoft software package, Messenger, then stealing Google source code via what sounds like a Windows penetration.

I quote thusly:

“The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program, according to the person with knowledge of the internal inquiry, who spoke on the condition that he not be identified.

By clicking on a link and connecting to a “poisoned” Web site, the employee inadvertently permitted the intruders to gain access to his (or her) personal computer and then to the computers of a critical group of software developers at Google’s headquarters in Mountain View, Calif. Ultimately, the intruders were able to gain control of a software repository used by the development team. “


10 posted on 04/19/2010 7:20:56 PM PDT by NVDave
[ Post Reply | Private Reply | To 1 | View Replies ]


To: NVDave

Do you know what OS the user clicked on was? Was it linux, Windows, OS X, or some other OS?

I believe Google has a lot of Linux in their envirnment. And if it was an inside job they would have known about the version and patch level of Linux.

Just becasue they used messenger to send the link doesn’t mean messenger was the vulnerability.

And if it was Windows (or any OS for that matter) was it a known vulnerability with a fix already available and Google didn’t push it to all their desktops? If so, that is a real concern as Google isn’t properly maintaining their inside environment with current security patches.


11 posted on 04/19/2010 7:25:15 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 10 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson