Chinese Hackers Alleged Perpetrators of an Extensive Nortel Breach
Hackers, who planted remotely-controlled spyware onto Nortel networks, managed to steal passwords that the enterprise's high officials and executives used, thereby becoming capable of gaining admission into the company's e-mails, reports, business plans along with other valuable documents, published HUFFPOST dated February 14, 2012.
Reportedly, the intruders stole 7 passwords in all that Nortel's chief executive officer and other executives used. Moreover, these criminals seemed as operating from China from where they infiltrated Nortel's PCs ever-since 2000 to download reports on R&D, technical papers, employee e-mails, business plans and other important files, said erstwhile Nortel veteran Brian Shields and the chief of an inside probe. The Wall Street Journal published this on February 14, 2012.
Shields further said that the hackers concealed spyware right into the roots of a few employees' PCs; consequently, investigators spent a number of years just to understand the extent of the problem's existence. The crooks gained admission into virtually everything because ample time was at their disposal; only they required being sure about the content they desired stealing, Shields added.
Meanwhile according to specialists, the hackers' purpose alternatively the data they stole can't be easily determined. However, Security Analyst Akshay Sharma with Gartner Inc., a research firm warned that organizations utilizing previous editions of Nortel products were likely to be endangered. HUFFPOST published this.
It maybe noted that the spying software discovered during 2009 was an advanced combination. Investigators discovered one specially malevolent and difficult-to-spot spyware inside PCs, called "rootkit," which could facilitate a hacker in wholly maneuvering a system, while hiding his spying operation, stated 2 persons who know about the probe. The Wall Street Journal reported this.
Additionally, the hackers created one encrypted-communications medium, on one PC, which linked up with a Beijing-based IP address, while on another, software was discovered which hackers were possibly utilizing for detecting further security shortcomings inside the Nortel networks.
Nevertheless, Director of Technology and Public Policy Program James Lewis of the Center for Strategic and International Studies stated that whatever information the hackers garnered from the Nortel espionage could be utilized for acquiring future admission into the telecom grid of the country, reported HUFFPOST.