Skip to main content

in reply to حمید پیام عباسی

I always wonder how these "security experts" can identify which state is responsible for the compromise. In this case its "Chinese" state actors. But how do we really know? Wouldn't it be in the best interests of state sponsored hacking teams to hide or blame other states?
in reply to حمید پیام عباسی

Wouldn't it be in the best interests of state sponsored hacking teams to hide or blame other states?


Of course. If I were leading an offencive team at CSIS, I'd do my best to procure machines and credentials in anorher country to launch the campaign from. Ideally a known adversary. That doesn't mean that country isn't executing their own attacks. In fact my charade wouldn't work if I chose a country that has no track record of attacks.

in reply to Avid Amoeba

Dude this is notepad++, no one cares, we all know china Russia, employs multiple teams for hacking. But they still get caught and nothing happens, because they all will deny it.

This isn't the chinese Uber team, that plans ahead several months, this is more: oh I found exploit in notepad++, via some tool. It isn't worth the effort, because they are just looking for exploits in the wild.

in reply to حمید پیام عباسی

I can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.
in reply to Goretantath

gup.exe making network requests for other than: notepad-plus-plus.org, github.com and release-assets.githubusercontent.com


doublepulsar.com/small-numbers…

The write up is from December when it was first disclosed afaik