zlacker

[parent] [thread] 9 comments
1. chvid+(OP)[view] [source] 2026-02-02 04:05:03
“ The incident began from June 2025. Multiple independaent security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign.”

How do they know it was a Chinese group or even a state sponsored one?

replies(5): >>cwnyth+y3 >>uhx+I3 >>tbrown+H9 >>rightb+nr >>hulitu+VK4
2. cwnyth+y3[view] [source] 2026-02-02 04:43:23
>>chvid+(OP)
They said "likely", so they don't "know." Yours is the wrong question.
replies(1): >>skeled+L01
3. uhx+I3[view] [source] 2026-02-02 04:45:03
>>chvid+(OP)
By analyzing payloads / C2 address, etc...
replies(1): >>somena+S7
◧◩
4. somena+S7[view] [source] [discussion] 2026-02-02 05:28:51
>>uhx+I3
Yeah because a state level actor would be completely incapable of false attribution.
replies(1): >>lukan+Es
5. tbrown+H9[view] [source] 2026-02-02 05:53:08
>>chvid+(OP)
Perhaps it's "...because that would explain..."?
6. rightb+nr[view] [source] 2026-02-02 09:15:25
>>chvid+(OP)
When you want to spread jingoist paranoia you can just make stuff up and claim any critique is from said actors.
◧◩◪
7. lukan+Es[view] [source] [discussion] 2026-02-02 09:29:28
>>somena+S7
With enough effort, anything can be obfuscated. But effort costs money and also state level actors have limited funds and time and want to go home to their families ar some point and if the purpose was to get a message across (don't mess with china, otherwise face the consequences) there is no need to really hide the origin.
◧◩
8. skeled+L01[view] [source] [discussion] 2026-02-02 14:05:03
>>cwnyth+y3
The "likely" does give the impression that they have a pretty good idea.
replies(1): >>cwnyth+zm2
◧◩◪
9. cwnyth+zm2[view] [source] [discussion] 2026-02-02 20:52:09
>>skeled+L01
I didn't say that to be pedantic, but to avoid that particular type of asker who isn't actually asking a genuine question here. After listing all the ways that Notepad++ (as an example here) suspects who they suspect, the asker then comes back with "Yeah, but how do you know?", as if that's some sort of gotcha. It's disingenuous. Even if the person I replied to isn't attempting this, I find it good to call out and get people to ask a better question: what's the evidence and why does that evidence point to this conclusion?
10. hulitu+VK4[view] [source] 2026-02-03 13:12:56
>>chvid+(OP)
> Chinese group

our enemy. It must be Chinese, North Korean or Russian.

> state sponsored one

"our software/our provider is so good that only a state actor can compromise us" (see Microsoft's AD keys hack for details)

[go to top]