Hackers Often Accidentally Send Code to Microsoft

Page 4 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
So there are up to 9000 attacks at
microsoft.com
a second?!?!?! Wow!
Really it isn't that hard to find a
trojan program and make a "zombie legion" that is

able to ddos a website or someone.
nobody really actually
does the coding, script kiddies just

want to feel cool and think that
igniting a ddos on microsoft.com and
to other people is a cool
thing to do when in reality they didn't really do anything at all.
y
 
[citation][nom]eastcoaster[/nom]I wonder what the attack stats are on Google?[/citation]
Not as many. After the first attempt, hackers of google are never heard from again.
 
[citation][nom]tat2demon[/nom]The title should be changed to "Hackers Use To Send Code to Microsoft". What kind of idiot lets this info out. Its like cops telling drug dealers that their phone is tapped.[/citation]
Hackers fool enough to send code to Redmond are probably not reading this.
 
haha maybe its their mannerism before sending error reports on microsoft, and they cant remove it when they lined up in hackin haha
 
I know most common journalists seems to think a hacker is the definition of a criminal computer guy, but tomshardware too?

@$%%%!!!!

 
[citation][nom]Zingam[/nom]Prove your claims. Is that the reason why MS Windows has just over 50 quadrillion viruses?All what is obvious is that Microsoft.com has some descent firewall and nothing else.[/citation]


If we're talking viruses, here's something to marinate on. Mac and Linux, both of which I use and like, have about 1/10th the market share of windows. Why would I as a hypthetical hacker/virus writer, want to put time and energy into attacking or infecting a system that has minimal market share????? That's like saying, "I want to cause a lot of damage, I'll use a firecracker instead of this nuclear bomb". Windows is by far the top OS in terms of number of users. Therefore it's the number 1 target.

If you'd like more evidence, look up the pwn2own results. Both Mac and PC go down very quickly. Also read the reports that the security analysts put out. Most agree right now that either Win 7 is the most secure OS, or at best, Snow Leopard and 7 are tied. The biggest vulnerability being Safari and IE (depending on OS of couse). Don't act like a fanboy.
 
[citation][nom]bebangs[/nom]8000 per second480,000 per minute28,000,000 per hour691,200,000 per dayWow. they dont have a life...[/citation]

Well, they've got one helluva tough website/security system/whatever... I'll give them that much...
 
It isn't that hard to block the 7000-9000 hits per second by the script kiddies. Those attacks are all the same and have been seen and blocked by all major institutions around the world.

As a member of the security at the local university we were getting hit with the mass attacks all the time. We just block the obvious attacks from zombies and use our time to try and track the elusive hidden attacks. Repeat offenders to the attack list get blocked for longer and longer intervals. Eventually they get blocked for forever. Enough attacks from a Class A,B,C network and we just block the whole thing.

With Microsoft.com being a much bigger name than the University I worked at, I'm sure it got a lot more hits than we were getting. But it's still the same principle. They block all the obvious attacks easily hopefully allowing them time to trace the elusive attacks.
 
Those are "noob" hackers. A "leet" hacker wont do such a thing. Or maybe they send it intentionally? I guess now that the cat is out of the bag. I think those virus codes will start to decrease. It would be nice if they map out and see where the virus code is coming from. Then make a map for Hot Spot in the country/region to look out for.
 
[citation]Why would I as a hypthetical hacker/virus writer, want to put time and energy into attacking or infecting a system that has minimal market share????? That's like saying, "I want to cause a lot of damage, I'll use a firecracker instead of this nuclear bomb". Windows is by far the top OS in terms of number of users. [/citation]

Though, you have to consider the worth of that market share. The code that creates botnets is ideal for the huge glut of vaguely secured windows machines in homes and offices, but there is a huge incentive to crack the multitude of unix-based servers run by major corporations/governments, where the actually valuable information is. That is, of course, you're doing it for gain rather than some online cred that you are the 'l33t3st ha>
 
Ooops I broke it with my leet-speek. I would like to add,

Also, [citation][nom]tat2demon[/nom]The title should be changed to "Hackers Use To Send Code to Microsoft". What kind of idiot lets this info out. Its like cops telling drug dealers that their phone is tapped.[/citation]

It would be like that, if at the end of every conversation a big box popped up and said "would you like to send a recording of this to the police?" and they clicked yes every time. It's not like it's some hidden secret.. they are literally choosing to do this when they crash their own computers.

That's what makes it so funny.
 
@volt-aire

the kind of mercenary hacking your talking about, which aims to exploit corporate secrets and sell it for a lucrative amount of money doesn't discriminate the kind of OS your running, that kind of attack uses a whole bunch of techniques include personalized phishing attack aimed at a specific person, at which point dont matter what OS your running unless you got all your bases covered your toast and they not going roll out a botnet for that kind of attack in fact a successful attack would slip in get what they looking for and get out without even a whisper on the network, but the kind of people who can actually pull that off are few and far between and prefer to stay well under the radar, nothing like corporate espionage to get the FEDs not to mention Interpol amongst other people interested in you

alot easier just to herd a botnet....
 
[citation][nom]calmstateofmind[/nom]MS is too old a cat to be scratched by a kitten.[/citation]

Couldn't have said it any better!! Working in the IT industry, they are a powerhouse... a sloppy, overly huge powerhouse, but regardless no-one can touch or attack them to be of any real effect.
 
[citation][nom]stifle[/nom]What they don't tell you is that this is also how Microsoft hires their security professionals. Hackers prolly get spam email from Microsoft HR departments asking them to come work for them. If you want to hire the best, you go to the source.[/citation]
I have met one of the people Microsoft hired to head up security, his name is Ed Gibson. He was at a symposium on IT Security at UMIST in Manchester, UK. Funny thing is he isn't an IT person, he is former FBI.
http://www.infosecurity-magazine.com/view/6069/ed-gibson-chief-cybersecurity-adviser-at-microsoft-uk-is-moving-on/
A lot of people forget that behind every complex attack is the mind of a person, you do not want to piss this guy off or he WILL bust your ass.

Fact is, attacks happen, wether its Windows, Linux, OSX, Unix, Solaris, etc - the best form of antivirus is not to download the latest defenitions - it is to inoculate the users in best practice.
 
""People have sent us their virus code when they're trying to develop their virus and they keep crashing their systems,"
hahaha epic, thats pretty sad you think they would know better.
 
This has got to be the best proof ever that the average user just clicks the button that will remove a window they feel isn't needed the fastest. This is also how hackers and virus authors are so successful.
 
Status
Not open for further replies.