% | $
Quotes you view appear here for quick access.

Microsoft Corporation Message Board

fan_tazer 24 posts  |  Last Activity: 1 hour 43 minutes ago Member since: Oct 28, 2012
SortNewest  |  Oldest  |  Highest Rated Expand all messages
  • fan_tazer fan_tazer May 14, 2015 4:56 PM Flag

    "FireEye and Microsoft replaced the encoded domains on TechNet with ones the companies controlled, which gave them a glimpse of the problem when infected machines called out to those domains.

    APT17 has been "targeting our customers for many years," Boland said. Organizations are typically targeted through spear-phishing, which involves sending emails with malicious links or attachments, he said.

    For the last couple of years, APT17 has infected computers with a malware program that FireEye calls BLACKCOFFEE. The malware can upload files, delete files and create a reverse shell on a computer, among other functions."

    Targeting "defense contractors, law firms, U.S. government agencies and technology and mining companies" for years. Lucky they found out about this before it went on very long.

  • fan_tazer fan_tazer May 14, 2015 3:25 PM Flag

    Tech Net doesn't run on Azure, does it?

    "China-based hackers used Microsoft's TechNet for attacks"

    "The group, which FireEye calls APT (advanced persistent threat) 17, is well-known for attacks against defense contractors, law firms, U.S. government agencies and technology and mining companies.
    Survey: Big data interest still growing

    It's not all positive, however: Security issues and problems with some existing products leave room for
    Read Now

    TechNet is highly trafficked website that has technical documentation for Microsoft products. It also has a large forum, where users can leave comments and ask questions.

    APT17 -- nicknamed DeputyDog -- created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group's malware were instructed to contact.

    The encoded domain then referred the victim's computer to a command-and-control server that was part of APT17's infrastructure, said Bryce Boland, FireEye's chief technology officer for Asia-Pacific.

    The technique of requiring an infected computer to contact an intermediary domain is frequently used. Often, hackers want the infected machines to reach out to a domain that is unlikely to look suspicious before proceeding to another less-reputable one.

    "It's completely normal to see a lot of traffic going to TechNet," Boland said.

    Sometimes, the command-and-control domains are embedded in the malware itself, but that makes it easy for computer security researchers to figure out which ones it contacts. Other times, malware is coded with an algorithm that generates possible domains names it should contact, but that can also be reverse engineered by analysts, Boland said.

    Security experts have seen attackers abuse other legitimate domains and services, such as Google Docs and Twitter, to accomplish the same goal as APT17, Boland said.

    "This is a challenge for any open platform," he said."

  • fan_tazer fan_tazer May 10, 2015 3:24 PM Flag

    It would seem that it could only be bad reporters. There was no merger.

    No doubt Microsoft hated paying $7.2 billion in order to keep Nokia from going out of business selling the Redmond OS on their smartphones. But they would have lost virtually all of their share in phones if they hadn't since no one else could get people to buy them. Perhaps they will not hate paying more licensing fees once the current ones require renewal. Hopefully they are paying per unit given their lack of traction among consumers.

    Why don't they sell their own Android phones and tablets if they "gets a cut from "ALL Androids Devices"."? They would be double dipping on all those sales. A much better deal than their current sad situation.

  • fan_tazer fan_tazer Apr 30, 2015 9:57 PM Flag

46.759-0.121(-0.26%)3:47 PMEDT