GlobalSign Confirms Breakin

Status
Not open for further replies.

aftcomet

Distinguished
Nov 25, 2010
162
0
18,630
It's one thing to break in, it's another to not get caught. If the proper authorities want to find him, anyone for that matter, they will. Hope this idiot doesn't think he can just waltz in.
 

aaron88_7

Distinguished
Oct 4, 2010
279
0
18,930
Certificate of Authority, used for SSL connections so people can log into their bank, buy stuff online, etc. Breaking into a CA can threaten all SSL connections that use that CA which is why this is serious.

The real bad guys don't talk about their hacks, they just profit off of them. The hackers that talk about their exploits are the ones that deserve a thank you.
 

Zingam

Distinguished
Mar 17, 2009
502
0
18,930
[citation][nom]JohnnyLucky[/nom]What did the hacker do after breaching the webserver?[/citation]

When you breach into a whole you get to have an orgasm after that???
 
G

Guest

Guest
@aftcomet: Problem is, all indication are that the hacker is in Iran, doing work that supports the government there. The chance that the relevant "authorities" would even want to stop him is... Zero.
 

bin1127

Distinguished
Dec 5, 2008
380
0
18,930
Globalsign's own website posted press releases beginning from Sept 9 about the breach. They did mention that root certificates are completely kept offline, and this breach affected only the isolated web server that hosts the site. I take it that any potential problems would be more contained and not a Sony buy one get 2 free.
 

someoneelse

Distinguished
Feb 20, 2009
62
0
18,580
[citation][nom]Anonymous[/nom]@aftcomet: Problem is, all indication are that the hacker is in Iran, doing work that supports the government there. The chance that the relevant "authorities" would even want to stop him is... Zero.[/citation]

hackers are full of disinformation. don't trust what they say about their name and location. It's more often than not an effort through people off the scent. It could be anyone from a single iranian hacker to a NSA run officially denied pen testing team making sure sites important to US commerce and finace are locked down tight. I can't believe an iranian hacker with possible animosity to the west, a heavily monitored internet and relatively poor finacial outlook ( compared to what he could steal if he kept his mouth shut and went black hat ) would do this on his own. when you consider the generally poorer levels of education and the higher cost of computers to levels of income it looks unlikely. saying that they might have some use as diplomatic bargaining chip.

when it comes to hackers identity disinformation is the norm. it just makes more sense that way.

saying that if he is genuinely in iran there is little chance of getting him ( assuming it is a him ).
 
Status
Not open for further replies.