PC Invader Costs a Kentucky County $415,000 192
plover recommends a detailed account by Brian Krebs in the Washington Post's Security Fix column of a complex hack and con job resulting in the theft of $415,000 from Bullitt County, Kentucky. "The crooks were aided by more than two dozen co-conspirators in the United States, as well as a strain of malicious software capable of defeating online security measures put in place by many banks. ...the trouble began on June 22, when someone started making unauthorized wire transfers of $10,000 or less from the county's payroll to accounts belonging to at least 25 individuals around the country... [T]he criminals stole the money using a custom variant of a keystroke logging Trojan known as 'Zeus' (a.k.a. 'Zbot') that included two new features. The first is that stolen credentials are sent immediately via instant message to the attackers. But the second, more interesting feature of this malware... is that it creates a direct connection between the infected Microsoft Windows system and the attackers, allowing the bad guys to log in to the victim's bank account using the victim's own Internet connection."
Windows TCO (Score:5, Insightful)
Don't forget to include this in your Windows TCO calculations.
Re: (Score:3, Interesting)
But the second, more interesting feature of this malware, the investigator said, is that it creates a direct connection between the infected Microsoft Windows system and the attackers, allowing the bad guys to log in to the victim's bank account using the victim's own Internet connection.
Actually, if you root a *nix box, this part looks kinda trivial.
Re:Windows TCO (Score:4, Insightful)
Yet we don't see much of that, do we? In spite of the massive *nix share of the server market, it's windows systems that prove easiest to compromise.
Re: (Score:3, Insightful)
keyloggers aren't used on servers as much...regardless of the OS.
Re: (Score:2)
network snooping is.
Re:Windows TCO (Score:5, Insightful)
Re:Windows TCO (Score:5, Insightful)
I use Windows, OS X and Linux, and none of my PCs have ever been compromised, but the Windows one sure is harder to protect.
Re: (Score:2, Insightful)
Re:Windows TCO (Score:5, Insightful)
simplified a bit :
Linux - don't run as root, install updates regularly, think twice before entering root password.
Windows - attempt to have the logged in user not running as admin, install updates regularly, install run update and monitor virus scanner + firewall software. think twice before entering admin password (if running as non-admin)
OSX - never had admin on OSX, from what i understand its the same as linux with respect to security.
the effort to run (pre vista) windows as non-admin is substantially harder than non-admin linux.
installing updates is approximately the same effort.
windows (currently) requires extra software installed to be secure.
Objectively windows is harder to secure (harder on 2 out of 3). (this also assumes that this is the minimum effort required to secure each system to the same level - on any system you could spend much more effort due to a lack of knowledge, or wrong pre-conceived ideas concerning security)
Re: (Score:2)
Re: (Score:3, Funny)
Wow...that's quite something.
So you're saying that until they have both been broken into and their car radio's removed, there's no way to prove that it's easier to lock up a tank than it is to lock up a convertible with a cotton roof?
Re: (Score:2)
I wasn't talking about an objective comparison based on common beliefs. I was simply saying that his statement is not provable for his systems unless they have been compromised. You have to be compromised before you can KNOW what is required to prevent it.
A car analogy: one takes the fastest car in the world, and let it race a mile against me, me being by foot. So you state that although the car might finish the mile in a few seconds, it is not proven to be faster UNTIL I HAVE CROSSED THE FINISH-LINE?!?
Go back to school.
Re: (Score:2, Informative)
Also from the point of view of exposed services and access requred for various functions.
OS X shares nothing by default, and allows the firewall to lock out anyone not on the local subnet.
RPC requires a whole shotgun full og holes in a firewall to allow AD login across secure zones, LDAP directories are realy simple in comparison
For Linux, I only install the software for services I want, and allows much better control of who can do what as root using sudo, (and the same with OS X too)
SSH provides a secure
Re: (Score:2)
Re: (Score:2)
it's the same people who are pretty much computer illiterate and just squeak by using Windows who are Microsoft's best customers. Keep'em dumb, keep'em taking everything shoveled in front of them. The other day, a salesman from a computer shop specializing in Windows asked me to send his wife a link to some pictures. After a few emails, he didn't know the link I emailed him was just something he could use a browser to see. WTF and how to these people get paid for so little ability to use even the simplest p
Re: (Score:2)
I would think the yearly Pwn2Own competitions is a pretty good indicator. A Windows, Mac, and Linux system are all set up with the latest security patches from their respective OSes. The first person to compromise the system gets to keep it. Every year I've read about it, the order from first to last compromised has been Windows, Mac, and Linux.
Re: (Score:2)
I think that's an important thing to mention though - see, OSX is still based on BSD. However, even the most secure OS on earth can still be compromised if the software it runs is shoddily programmed.
pwn2own says mac easier to pwn than windows (Score:3, Insightful)
> Every year I've read about it, the order from first to last compromised has been Windows, Mac, and Linux.
Which year? And which pwn2own contest are you talking about?
In 2006, there was no pwn to own cansecwest contest. ;).
In 2007, it was mac first, but only macs were prizes
In 2008, it was mac first again (out of OSX, Ubuntu and Vista) on day 2 (nobody managed to pwn anything under the day one rules), and vista only on day 3 (due to adobe flash exploit).
http://dvlabs.tippingpoint.com/blog/2008/03/27/day- [tippingpoint.com]
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
But the second, more interesting feature of this malware, the investigator said, is that it creates a direct connection between the infected Microsoft Windows system and the attackers, allowing the bad guys to log in to the victim's bank account using the victim's own Internet connection.
Actually, if you root a *nix box, this part looks kinda trivial.
The hard part is doing it without rooting. Which happens to be a lot easier in windows. If you rooted the box you could do a lot more useful things easier then what this malware did. Imagine having all the payroll information for the county and the fraud that would enable.
Re:Windows TCO (Score:5, Insightful)
I love the thought behind the comment, but I think we are arriving at a kind of plateau where it is not so much the OS as the users being stupid and uneducated while management policy is too lax when it comes to computer use.
With text-based computer usage, that was rarely if ever a problem simply because the fun things to do were rather limited and certainly didn't involve a live connection to a public internet. But the more connected we became, the more fun things there were for people to do. Suddenly with Windows + Internet access, the door flew wide open with everything from BonziBuddy to Weatherbug to all sorts of other gadgets, games and gizmos. This escalation of extra-curricular activity has never been treated as a threat or as a problem by many and has continued unabated.
What is needed, whether running Windows, Linux or MacOSX on the desktop, is a means to EFFECTIVELY prevent the installation of unauthorized software and data. That is a complicated trick for a variety of reasons not the least of which is the face that the file system doesn't care if a file is data or executable code no matter where it is located in the file system. (This is a problem that should be fixed in ALL OSes) There are effective tools to prevent a lot of such things, but all of them require what should have been done to begin with -- careful system software planning and implementation. There are limits to which the OS itself can be blamed and that's what I am really trying to get at.
On one hand, there is the threat of running as the superuser on any OS which is unquestionably a problem. On the other, there is running as the user. Running programs as a user, from a user's writeable data space is often enough to give malicious software operators what they are looking for anyway. Many of them seek personal information, so if they can get code running on a remote user's system that will give them access to that user's data, that's enough of a threat. Getting "superuser access" merely gives them a way to infiltrate the system at a much lower level and make removal much more difficult. So merely patching or preventing superuser access from being taken, assumed or otherwise utilized is only a part of the problem and one that is increasingly realized as irrelevant to malware authors.
In the end, the TCO of Windows, in this respect, is still lower if for no other reason than the likelihood that someone has a quick and easy way to reload the system clean is pretty high up there. There are fewer quick solutions to fixing or cleaning up a compromised system under Linux or MacOSX... with good reason -- they aren't your typical targets.
But I believe we are close to reaching a plateau at which there is only so much that can be done to secure an OS without proper planning and implementation taking the lead concern as it should have always been.
Re: (Score:2, Informative)
That is a complicated trick for a variety of reasons not the least of which is the face that the file system doesn't care if a file is data or executable code no matter where it is located in the file system.
Please elaborate. You sound more intelligent than this, so I assume I misunderstand you.
Most filesystems do keep tabs on which files are executable, and which ones are not. Of course, Windows defaults to executable, and the rest of the world defaults to not-executable. On the other end, processors now recognize the no-execute bit on memory. This makes it possible (easier?) to avoid accidentally running data in an executing program (ex: some buffer overflows). Of course, for these things to work properl
Re: (Score:2)
When mounting a filesystem under OpenBSD you can specify that any file within that mount cannot be executed. I find that this is very much a valuable flag (noexec) when you are mounting /tmp and /home as it pretty much prevents execution of files outside of expected areas.
http://www.openbsd.org/cgi-bin/man.cgi?query=mount&apropos=0&sektion=0&manpath=OpenBSD+Current&arch=i386&format=html [openbsd.org]
Of course if it is a script, nothing stops the person from calling the interpreter first. e.g. perl
Re: (Score:2)
I believe Linux has a similar noexec mount option.
prevent unauthorized software (Score:2)
Run the software off a readonly USB device and you are safe from the desktop OS.
--
mode me up insightful please
Re: (Score:3)
Yeah, this isn't a Windows problem. You do know that Linux/UNIX boxes can get 0wn3d, right?
Re: (Score:3, Insightful)
In other words, is the user intelligence variable dependant upon the OS variable? if you change the OS, does the user IQ change with it?
Dispite the GPP being an AC, I think you missed his point (which was valid).
Re:Windows TCO (Score:4, Insightful)
are you implying that dumb users suddenly become intelligent...?
No. It's that a regular (not necessarily dumb, just... regular) non-priv users have less (not zero!) chance of having (actively thru stupid clicking, or passively thru a worm) something unwanted installed on Linux/BSD than they do on Windows or OSX. Especially if they don't have the root password.
IOW, Windows is a slippery pistol with a low trigger pull weight in a fragile holster. BSD & Linux "pistols" have no-slip grips, heavy trigger pull weights and sturdy leather holsters. You can shoot yourself in the foot with either, but Windows makes it a *lot* easier...
Re: (Score:2)
Again: "are you implying that dumb users suddenly become intelligent...?"
In other words, is the user intelligence variable dependant upon the OS variable? if you change the OS, does the user IQ change with it?
Dispite the GPP being an AC, I think you missed his point (which was valid).
In the sense that I could not prove it, I cannot tell you about the causation. I can tell you about the correlation, however.
It's not so much that *nix users tend to be more technically knowledgable. That is true, but I don't think that's the biggest difference. It's that *nix users more strongly feel that you should not use a tool without at least trying to understand it. Among other things, that means you become a little better at it or more skillful with it the more you use it. It's not about ass
Bank hold some responsibility (Score:5, Insightful)
Re: (Score:2)
They set up a system that required multiple credentials to transfer money, but one of those credentials could be used to reset the other? Give me a break!
To be fair the article says that the malware created the direct connection. The direct connection was probably not there by default.
Re:Bank hold some responsibility (Score:5, Insightful)
No, I am being fair.
Direct connection or not, that login shouldn't have been able to reset the other one. There are several reasons why two people needed to approve transfers from that account. Being able to unilaterally reset the Judges credentials is a big fat security hole in its own right.
Sometimes an attack must rely on more than one vulnerability. This is one of those. Thus, I didn't say that the bank is 100% responsible, only that they hold some responsibility.
Re:Bank hold some responsibility (Score:5, Interesting)
My wife has long had to transfer money between various commercial accounts at her jobs. As far back as I can remember, the banks issued her RSA tokens which were required to authorize the transfers.
I can't imagine a commercial bank NOT using a secure crypto system with an air gap. If the county is concerned about two authorizations, so much the better: issue the judge his own token.
Even that could be compromised by a hacker who owned the treasurer's computer, but it would have been almost impossible to run the scam 500 times in a few days like this guy did.
Re: (Score:2)
Even that could be compromised by a hacker who owned the treasurer's computer
Basically, he did own the Treasurer's computer, and that was the whole problem. In this case, the "air gap" should have been required to reset the judge's credentials.
This is akin to a bank which cashes a check requiring 2 signatures, even if the signatures are exactly the same (or a whole bunch of checks, actually). It looks more secure on the face of it, but it is equally secure to requiring one signature only.
I do like the idea of banks issuing tokens of some kind (or a list of one-use authorization pa
We're talking about Kentucy! (Score:2)
"I can't imagine a commercial bank NOT using a secure crypto system with an air gap."
Dood, remember, this is Kentucky we're talking about here. The same place where an anonymous caller's commands to disrobe and be spanked (and perform other various sexual acts) was enough for a young adult Kentucky female to obey (recall that McDonald's episode?).
Also, isn't that the same state that moron senator McConnell is from?
Re:We're talking about Kentucky! (Score:3, Insightful)
Idiots live everywhere (and keep in mind the plural of 'anecdote' isn't 'data'.) It might be that Kentucky has less money than other states, but I wouldn't say they're correspondingly "dumber" than other states.
Also, isn't that the same state that moron senator X is from?
That pretty much describes all 50 states.
Tokens are half measures (Score:2)
Man in the middle attacks still work, they can just let you use your token to authorize their transfer rather than the one you are seeing on your screen. The calculators which give a response to a challenge suffer from the same problem, unless they use the recipients bank account as part of the challenge (mine doesn't, for large amounts it uses the amount as a challenge but a trojan could still route it to a different account).
Ideally banks would just give out a USB device which shows the bank account and a
Re: (Score:2)
SSL should prevent man in the middle attacks, except that you really can't trust the trusted certificates issued by the usual pre-approved CAs anymore. If you really want to be safe, delete all default trusts and only add those for sites you can verify yourself.
Obligatory: (Score:5, Funny)
Identity Theft [youtube.com]
enh, the criminals we get these days... (Score:5, Interesting)
All that work, and they netted less than a half million?
Re:enh, the criminals we get these days... (Score:5, Funny)
Re: (Score:2)
> if they were real hackers
And if they were real criminals, they would have trousered $64.8 billion.
Re: (Score:2)
You're making me feel like I need a long disclaimer before the next time that I start talking shit...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
This is nothing novel. (Score:2)
HOW DID THE VIRUS/TROJAN get onto the PC? (Score:3, Interesting)
From the site:
http://voices.washingtonpost.com/securityfix/2009/07/an_odyssey_of_fraud_part_ii.html?hpid=sec-tech [washingtonpost.com]
one reader wrote in:
"I guess we don't know how the attackers somehow got the Zeus Trojan on the county treasurer's PC (presumably the county doesn't want to say and the FBI told them not to discuss details of the case anyway), but I'm curious whether that PC had security software installed, whether it was up to date, which security software can deal with the Zbot (ZeuS bot) Trojan, etc.
---------
Well, i have an idea, and it's TFO (Totally Frackin' Obvious)... and might be how it happened. A poor old cleanup crew member may have been elicited to put a USB device on a bank manager machine that might not have been watched by a camera. Might have trained the cleaner to surveil the PCs, determine their visibility to cameras, then trained the dupe into deftly/swiftly attaching a USB attack device while feigning scraping something sticky from the floor, or emptying waste bins that were tough to get the bag from....
Just my eye-dea... and the FBI may not want THAT to get out lest other banks suffering poor camera placement succumb to the same thing...
Or, a native of the Ukraine/U-area working at the bank might have been subjected to manipulation of some sort, but trained to be deft and not come under suspicion. Just my inflation-deprived-$0.02-cents...
How does a keylogger ever spread? (Score:5, Interesting)
I have a much more likely scenario. They simply spread their malware everywhere, and waited to see what sensitive systems they'd netted! They needed to dupe people into sending money overseas to them. I doubt they have any non-electronic influence in the states. The story indicates that the fake company name has been repeatedly tarnished... meaning it's very likely that they've done this before and will do this again. It probably got on by worm or trojan. Once there, it sat dormant while the hackers figured out which computers were of value to attack.
Re: (Score:2, Interesting)
I have a much more likely scenario. They simply spread their malware everywhere
with drive-by downloads, phony system messages, work attachments from infected friends, lovers, coworkers, etc. just like what happened to a coworker, an above-average computer user for an IT company. all of a sudden he's got (literally out of nowhere) a new, very microsoft-looking anti-virus* (and considering that ms just came out with, or is coming out with a free fully-featured AV app, (which he knows, since he's in charge of enterprise software, including microsoft EA, etc.) he almost leaves it alone,
Re: (Score:2)
You make it sound like they used security measures. If they are anything like what I've experienced just in the last few years, they allow their employee's to take home laptops. The employee's install malware on them as fast as humanly possible to get the latest roller babies video and what not then share crap with each other over internal file servers and email. Just place a bridge with tcpdump & ssldump on their connection to the web and watch. The amount of UDP high port to high port traffic, P2P
Re:HOW DID THE VIRUS/TROJAN get onto the PC? (Score:5, Insightful)
Find out if the bank manger smokes, or his/her sectary smokes. Note when they go for a smoke and where. Get a few of those USB thumb drives from trade shows and lace them with trojans and place them near the smokers outside break area and wait for them to pick it up and place them back in their machines when they get back inside. Because usually they will just to see what was on the drive.
Re: (Score:2)
No that isn't as reliable as sending them a "scam" email infected with a Trojan Horse program using an exploit in JPG or GIF picture rendering to execute code that installs the Trojan Horse by simply viewing the picture file.
No doubt they made the email look like a bank customer or another employee by faking the email address and using social engineering to fool them into thinking it is legit and click on it to read it.
If they left a USB thum drive, Police could get fingerprints off of that and then they wo
who modded this garbage up INSIGHTFULL (Score:3, Informative)
- The attackers somehow got the Zeus Trojan [washingtonpost.com] on the county treasurer's PC, and used it to steal the username and password the treasurer needed to access e-mail and the county's bank account.
- The attackers then logged into the county's bank account by tunneling through the treasurer's Internet connection.
- Once logged in, the criminals changed the judge's password, as well as e-mail address tied to the judge'
Re: (Score:2)
Maybe because the point I was getting across was that the criminals likely used social engineering of some type to get access to the data. Doesn't matter if it's the bank manger or a civil service employee. Could be use email as the technical means. A lot of IT admins focus entirely on things like firewalls, anti-virus software, spam filters, and outside threats attacking the network that they often times fail to take into consideration what might happen if someone manages to get physical access to a ma
Re: (Score:3, Funny)
Then they click on either hotsexygal.jpg.exe or hotmanlystud.jpg.exe, depending.
Some people think they can outsmart me... (Score:2)
But I've yet to meet the man that can outsmart Bullitt.
Re: (Score:2)
Nobody remembers Steve McQueen anymore...
So impressed by basic tech (Score:3, Insightful)
I find it hilarious that basic TCP/IP networking stuff gets labeled as "interesting". Any idiot can initiate a connection to a host on the internet.
What's "interesting" is that the victim's machine was not firewalled to prevent this sort of thing from happening in the first place. Properly controlling outgoing traffic is of crucial importance, particularly when dealing with such sensitive information. A locked down network should be able to contain unknown connections from within, just as well as those from the great wide internet.
In my opinion, it's not the invader that cost Kentucky $415,000. The fault rests entirely on their network administrator(s).
Re: (Score:2)
I don't know anyone who would be competent in that job who could be persuaded to relocate to Kentucky.
I know plenty of people who are out of work (through no fault of their own) and would relocate just about anywhere for a paycheck. When you've got a steadily growing pile of bills to pay and a kid to feed, you become less choosy.
TCO (Score:2)
is this included in M$'s total cost of ownership?
Re: (Score:2)
User Stupidity is not limited to what operating system a person uses and hence is not a MS specific TCO.
But some OSs (and browsers) are more amenable to stupidity than others.
Lets fix the story: (Score:4, Funny)
When will they learn.
This is my Unix. There are many like it, but this one is mine. My Unix is my best friend.
It is my life. I must master it as I master my life. My Unix, without me, is useless.
Without my Unix, I am useless. I must run my Unix true.
I must admin smarter than any hacker who is trying to own me. I must block them before they hack me. I will....
My Unix and myself know that what counts on this net is not the scripts we code, the size of our pipe, nor the data we send.
We know that it is the uptime that counts.
We will stay up...
My Unix is human, even as I, because it is my only life.
Thus, I will learn it as a brother.
I will report its bugs, share its strengths, upgrade parts, buy its accessories, open its ports and lobby for more bandwidth.
I will keep my Unix clean and ready, even as I am clean and ready.
We will become part of each other. We will...
Before Darl McBride I swear this creed. My Unix and myself are the defenders of the company I work for.
We are the masters of your script kids.
We are the saviors of your profit.
So be it, until victory is America's and there is no competition, but Profit.
Re: (Score:2, Insightful)
You are so wrong, it's not even funny
Re: (Score:2)
Security audits are important! (Score:2)
If I'm not mistaken, most keylogging programs can be kept out fairly easily with decent firewall rules and a good anti-spyware/anti-malware agent. The article does not report that this county's IT department (which I'll guess and say is non-existent or illusory) took preventative measures against these attacks.
Basically, they had it coming.
Re: (Score:2)
Anti-spyware/malware maybe. Firewall rules however, useless. What do you do if the software simply does an HTTP Post to a web service with default proxy settings, or if the sysadmin is clever and uses a setup where the default proxy settings are not being used, its not too hard to sniff/autodetect them. Not much to do when the malwares use the same outbound as another important piece of software...
Re: (Score:2)
Simple: you set up a list of only 20 or so permitted websites, and if someone needs to look up regulatory information on some obscure county website somewhere they can file form 128-A in triplicate and submit this to their manager, who submits it and F-39 to their manager, who (if they have not exceeded their department-wide quarterly quota on variances) sends it to the head of the IT department across the hall, whose secretary shreds all three copies of 128-A individually then types F-39 into a web form th
Linux is not the holly grail (Score:5, Insightful)
Re: (Score:2, Interesting)
Re: (Score:2)
He didn't say security software. He talked about security measures in general. That means making users have strong passwords and change them regularly, not running every application they see, etc.
You can spout how Linux is more secure by design all day, but usually the current user context is MORE than enough to do damage, no matter how restricted you make it (if a user can read their own email and type in their own browser and read their own instant messages, so can a software, and its all whats needed). T
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Things have changed, at least for ordinary commercial accounts. Money transfers are done via web browser. And nobody except a couple of imaginative slashdotters said anything about USB drives -- TFA says only that it was a "zbot Trojan" but doesn't identify the infection path.
The auditors and security people obviously approved the "two people requirement" but failed to identify the weaknesses in the implementation. Yes, that's certainly a failing, but unless you have a CISSP on staff you probably don'
Re: (Score:2)
we need to get tough on the criminals.
They're in Kiev, you jackass, or Moscow, and surely kicking back to the police. And I'm not even sure that those countries have extradition treaties with the US. If they can even be identified and located...
Re: (Score:2)
There is Interpol office in Kiev. Ukraine is a member of UN.
It is easy to say "Kiev" and do nothing.
Re: (Score:3, Insightful)
Some fat law enforcement officer should lift from a chair, buy an air ticket for 500 bucks and go to Kiev.
You really think it's that easy to get a foreign national into your court system????
Especially if they are clever enough to hide their digital tracks.
There is Interpol office in Kiev.
There are also lots of easily-bribed cops in Kiev.
Ukraine is a member of UN.
It is easy to say "Kiev" and do nothing.
Like it's easy to invoke the holy name "UN", and believe that Ban Ki-moon will swoop down and smite the ene
Re: (Score:2)
Yes, there are a lot of easily bribed cops in Kiev. And it can be well used. If one offers to a Kiev law enforcement general, say, a training program for his digital crime division, he will in return have
Re: (Score:2)
root cause of malware infestation. (Score:2)
Where does it say that 'everyone' is claiming and it isn't the 'stupid MS users' it's the click and get infected OS known as Microsoft Windows that's the root cause of the malware infestation.
the second, more interesting feature of this malware... is that it creates a direct connection between the infected Microsoft Windows system and the attackers
irresponsible "victims" carry some responsibility (Score:2)
I take it you leave your keys in your car, and you never lock your doors at night?
Give me a break.
When your boss won't let you implement real network security, and then your up-to-date Windows Vista Premium server gets cracked with a 0-day exploit, throw it back in his face. Or else, find a
Lame story. (Score:2)
That malware is not interesting at all. I remember playing with SubSeven when I was in 7th grade (long long time ago) and it had ICQ notification and reverse bind options.
Re: (Score:2, Funny)
Convenient how governments and businesses continue to spend other people's money on insecure systems which allow even more money to vanish.
Microsoft Windows --because plausible deniability can come in mighty handy!
In other news, Governor Arnold Schwarzenegger (R) of California told all his debtors, that were expecting over $6 billion by the end of July, that California did have the money after all, the money was on the way, but currently stuck in Outlook. "I press da send key and it says "Netvurk Error" so as soon as that gets sorted out by the boys in the netvurk, da checks vill be on their vay. No need to lower the state's credit score. The money's just stuck in the outbox! Promise!"
Wow, blaming Microsoft CAN
Re: (Score:2)
What the fuck kind of accent are you attempting to mock?
Re:your tax money at work (Score:4, Funny)
Governatorese.
Re: (Score:2)
Except that's not how Arnold speaks at all. WTF with the "v"s everywhere?
Re:your tax money at work (Score:5, Insightful)
If you go with the normal route, and the normal route gets hacked, you won't be blamed.
If you setup a server on a system that your boss hasn't heard of, and you get hacked, you're fired.
The chances of the former are much greater in a lot of ways. But the risk to your job is basically zero. Whereas in the second way, you're fired because you decided to use that silly deamon thing instead of proper, professional, Enterprise-Ready (tm) Windows 7.
Re: (Score:2)
Re: (Score:2)
Clara Furse, the CEO of the London Stock Exchange got.
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
They're a multinational. They don't care if anybody notices. Once they have the money, they're practically untraceable, untouchable. It sounds like they've done this before, and will do this again.
Re: (Score:2)
So if they were foreign locals, they would be deeply concerned?
Re: (Score:2)
Maybe they did do it to LA. And nobody noticed.
Re: (Score:2)
They stole from someone who had a commercial account who installed their Trojan. It probably didn't matter to the thief if it was a county in Kentucky, a business in Miami, or a police department in New York. It was someone who had a bank balance of at least half a million dollars. And that someone had a crappy authentication scheme.
It seems like a crime of opportunity, like robbing the first armored car that drives by instead of waiting for one that just came from the Federal Reserve Bank with a load
Re: (Score:2, Funny)
Yes, I am a pedantic Grammar Nazi, and I anticipate a great modding down of this comment, but my need to say this is worse than any addict's craving for his next fix. There are few things I hate more than redundant words. "Co-conspirator" is about as redundant as it gets. A conspiracy is a group of people. People conspire to do something like this, and you call those people conspirators. What happens in a hundred years when we forget that "co-conspirator" was being used this way? Do we start saying "co-co-conspirator"?
Of course! It should be co-nspirator, referring to multiple nspirators working together...
Re: (Score:2)
Re: (Score:3, Insightful)
No, your grammar nazi-ing is not even correct. Co-conspirator and conspirator indicate different things, like specificity. If I am involved in a computer conspiracy, and another person is involved in a highway tax conspiracy, we are both conspirators. We are not, however, co-conspirators. We are not partners, we are not involved in the same conspiracy.
Also, it is possible for a conspirator to have a partner who is not part of the conspiracy. If a conspirator goes to someone and is able to get them to do a j
Re: (Score:2)
No, your grammar nazi-ing is not even correct. Co-conspirator and conspirator indicate different things, like specificity. If I am involved in a computer conspiracy, and another person is involved in a highway tax conspiracy, we are both conspirators. We are not, however, co-conspirators. We are not partners, we are not involved in the same conspiracy.
Also, it is possible for a conspirator to have a partner who is not part of the conspiracy. If a conspirator goes to someone and is able to get them to do a job with them, but withhold information regarding the conspiracy or its goals, then the conspirators new partner is not a co-conspirator.
The use of co-conspirator is used to denote the relation of one conspirator to another. It would actually be improper grammar to remove the "co", as it would imply ownership of one to the other. "His conspirator" and "his co-conspirator" have obviously different meanings. The use of co-conspirator removes ownership from the previous statement, and is therefore not redundant.
The first rule of the grammar nazi is only to make corrections when they are themselves correct. You, sir, and an epic fail.
P.S. Feel free to correct the poor grammar in that last sentence as if it were English, so I can call you wrong again. It's fun.
Wait, you mentioned the word "conspiracy" or one of its derivatives. That means that whatever you said is automatically invalid and will be dismissed without examination, particularly if it involved or could involve the government!
Really though, thanks for providing the first real explanation of "co-conspirator" I have ever heard. I admit I did wonder why people used this term, probably because I only ever hear it on the news.
Re: (Score:2)
Yes, or at least require an acknowledgment or signature page that is sent over a different network; e.g. fax, phone, sms.