← Back to context Comment by ethbr1 19 hours ago What satisfiable criteria would you like in a source? 3 comments ethbr1 Reply bjourne 12 hours ago Read the sources carefully. It all boils down to "US officials says so". It's different from the Podesta hack as forensic evidence were published linking Russian hackers to the attack. ethbr1 5 hours ago The Podesta "hack" was a spear phishing link, no? With the emails then published by Wikileaks?What forensic evidence was published?Afaicr, it was attributed on the basis of methods. Gmail didn't publicly disclose any internal logging.And the email chain of custody is unreliable, so post-leak analysis has the can't-spot-a-perfect-forgery problem. bjourne 4 hours ago Fancy Bear and their software was analyzed by FireEye and Secureworks. You can judge for yourself whether you find the evidence persuasive:https://cloud.google.com/blog/topics/threat-intelligence/apt... https://www.secureworks.com/research/threat-group-4127-targe...No such evidence has been published implicating the Chinese government.
bjourne 12 hours ago Read the sources carefully. It all boils down to "US officials says so". It's different from the Podesta hack as forensic evidence were published linking Russian hackers to the attack. ethbr1 5 hours ago The Podesta "hack" was a spear phishing link, no? With the emails then published by Wikileaks?What forensic evidence was published?Afaicr, it was attributed on the basis of methods. Gmail didn't publicly disclose any internal logging.And the email chain of custody is unreliable, so post-leak analysis has the can't-spot-a-perfect-forgery problem. bjourne 4 hours ago Fancy Bear and their software was analyzed by FireEye and Secureworks. You can judge for yourself whether you find the evidence persuasive:https://cloud.google.com/blog/topics/threat-intelligence/apt... https://www.secureworks.com/research/threat-group-4127-targe...No such evidence has been published implicating the Chinese government.
ethbr1 5 hours ago The Podesta "hack" was a spear phishing link, no? With the emails then published by Wikileaks?What forensic evidence was published?Afaicr, it was attributed on the basis of methods. Gmail didn't publicly disclose any internal logging.And the email chain of custody is unreliable, so post-leak analysis has the can't-spot-a-perfect-forgery problem. bjourne 4 hours ago Fancy Bear and their software was analyzed by FireEye and Secureworks. You can judge for yourself whether you find the evidence persuasive:https://cloud.google.com/blog/topics/threat-intelligence/apt... https://www.secureworks.com/research/threat-group-4127-targe...No such evidence has been published implicating the Chinese government.
bjourne 4 hours ago Fancy Bear and their software was analyzed by FireEye and Secureworks. You can judge for yourself whether you find the evidence persuasive:https://cloud.google.com/blog/topics/threat-intelligence/apt... https://www.secureworks.com/research/threat-group-4127-targe...No such evidence has been published implicating the Chinese government.
Read the sources carefully. It all boils down to "US officials says so". It's different from the Podesta hack as forensic evidence were published linking Russian hackers to the attack.
The Podesta "hack" was a spear phishing link, no? With the emails then published by Wikileaks?
What forensic evidence was published?
Afaicr, it was attributed on the basis of methods. Gmail didn't publicly disclose any internal logging.
And the email chain of custody is unreliable, so post-leak analysis has the can't-spot-a-perfect-forgery problem.
Fancy Bear and their software was analyzed by FireEye and Secureworks. You can judge for yourself whether you find the evidence persuasive:
https://cloud.google.com/blog/topics/threat-intelligence/apt... https://www.secureworks.com/research/threat-group-4127-targe...
No such evidence has been published implicating the Chinese government.