From: "FromTheRafters" <erratic@nomail.afraid.org>
| Replies in this thread seem to back and forth between two of the hackers'
| motivations. One where he is after the data at rest, and one where he goes
| after subverting the system (and maybe gets the data after decryption). The
| subject line asks about a keylogger that may have been added during the
| time the laptop was left unattended in a hotel room - and how to detect it.
| I assume of course a so-called "rootkit" was involved. Any hacker worthy
| of the title would want to use stealthing techniques. So the question
| becomes
| how can I tell if my computer has been rootkitted?
| What is interesting is the shift from outright theft of a laptop to the
| perhaps
| more lucrative compromise of the laptop. Steal someone's personal data
| and open a credit card account - then buy a truckload of laptops. Modern
| banking makes it all possible - and they charge you for "protection" against
| such happenings.
| ...what a racket!
Since we are talking about China, we would be dealing with the PLA. The Chinese
government has a "relationship" with the Chinese hacher community. The purpose of which
woul be espiniage. Either industrial or military. They would NOT steal the notebook.
There intent woul be a stealthy install of malware.
--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


Reply With Quote