DanielPharos (talk | contribs) Added no-footnotes-template |
Rich Farmbrough (talk | contribs) m Metadata and general fixes using AWB |
||
Line 3: | Line 3: | ||
'''Wicked Rose''' is the [[pseudonym]] of a Chinese hacker responsible for developing the [[GinWui]] [[rootkit]] used in internet attacks during the summer of 2006. It has been suggested that he works for the [[People's Liberation Army|Chinese Army]]. {{Citation needed|date=April 2010}} |
'''Wicked Rose''' is the [[pseudonym]] of a Chinese hacker responsible for developing the [[GinWui]] [[rootkit]] used in internet attacks during the summer of 2006. It has been suggested that he works for the [[People's Liberation Army|Chinese Army]]. {{Citation needed|date=April 2010}} |
||
Tan Dailin was a graduate student at Sichuan University when he was noticed (for attacking a Japanese site) by the People’s Liberation Army (PLA) in the summer of 2005. He was invited to participate in a PLA-sponsored hacking contest and won. He subsequently participated in a one-month, 16-hour-per-day training program where he and the other students simulated various cyber invasion methods, built dozens of hacking exploits, and developed various hacking tactics and strategies. He was chosen for the Sichuan regional team to compete against teams from Yunnan, Guizhou, Tibet, and Chongqing Military Districts. His team again ranked number one and he won a cash prize of 20,000 RMB. |
Tan Dailin was a graduate student at Sichuan University when he was noticed (for attacking a Japanese site) by the People’s Liberation Army (PLA) in the summer of 2005. He was invited to participate in a PLA-sponsored hacking contest and won. He subsequently participated in a one-month, 16-hour-per-day training program where he and the other students simulated various cyber invasion methods, built dozens of hacking exploits, and developed various hacking tactics and strategies. He was chosen for the Sichuan regional team to compete against teams from Yunnan, Guizhou, Tibet, and Chongqing Military Districts. His team again ranked number one and he won a cash prize of 20,000 RMB. |
||
Then, under the pseudonym Wicked Rose, he formed the [[Network Crack Program Hacker (NCPH) Group]] and recruited other talented hackers from his school. He found a funding source (an unknown benefactor) and started attacking US sites. After an initial round of successful attacks, his funding was tripled. All through 2006, NCPH built sophisticated rootkits and launched a barrage of attacks against multiple US government agencies. By the end of July, 2006, NCPH had created some 35 different attack variants for one MS Office vulnerability. During the testing phase, NCPH used Word document vulnerabilities. They switched to Excel and later to PowerPoint vulnerabilities. The result of all of this activity is that the NCPH group siphoned thousands, if not millions, of unclassified US government documents back to China. |
Then, under the pseudonym Wicked Rose, he formed the [[Network Crack Program Hacker (NCPH) Group]] and recruited other talented hackers from his school. He found a funding source (an unknown benefactor) and started attacking US sites. After an initial round of successful attacks, his funding was tripled. All through 2006, NCPH built sophisticated rootkits and launched a barrage of attacks against multiple US government agencies. By the end of July, 2006, NCPH had created some 35 different attack variants for one MS Office vulnerability. During the testing phase, NCPH used Word document vulnerabilities. They switched to Excel and later to PowerPoint vulnerabilities. The result of all of this activity is that the NCPH group siphoned thousands, if not millions, of unclassified US government documents back to China. |
||
== External links == |
== External links == |
||
Line 13: | Line 12: | ||
* [http://hsgac.senate.gov/public/_files/042809Paller.pdf U.S. Senate Committee on Homeland Security and Governmental Affairs Hearing: Cyber Security: Developing a National Strategy, Testimony of Alan Paller] |
* [http://hsgac.senate.gov/public/_files/042809Paller.pdf U.S. Senate Committee on Homeland Security and Governmental Affairs Hearing: Cyber Security: Developing a National Strategy, Testimony of Alan Paller] |
||
{{Persondata |
|||
| name = Rose, Wicked |
|||
| alternative names = |
|||
| short description = |
|||
| date of birth = |
|||
| place of birth = |
|||
| date of death = |
|||
| place of death = |
|||
}} |
|||
{{DEFAULTSORT:Rose, Wicked}} |
|||
[[Category:People associated with computer security]] |
[[Category:People associated with computer security]] |
||
[[Category:Living people]] |
[[Category:Living people]] |
Revision as of 01:43, 23 January 2012
Wicked Rose is the pseudonym of a Chinese hacker responsible for developing the GinWui rootkit used in internet attacks during the summer of 2006. It has been suggested that he works for the Chinese Army. [citation needed]
Tan Dailin was a graduate student at Sichuan University when he was noticed (for attacking a Japanese site) by the People’s Liberation Army (PLA) in the summer of 2005. He was invited to participate in a PLA-sponsored hacking contest and won. He subsequently participated in a one-month, 16-hour-per-day training program where he and the other students simulated various cyber invasion methods, built dozens of hacking exploits, and developed various hacking tactics and strategies. He was chosen for the Sichuan regional team to compete against teams from Yunnan, Guizhou, Tibet, and Chongqing Military Districts. His team again ranked number one and he won a cash prize of 20,000 RMB.
Then, under the pseudonym Wicked Rose, he formed the Network Crack Program Hacker (NCPH) Group and recruited other talented hackers from his school. He found a funding source (an unknown benefactor) and started attacking US sites. After an initial round of successful attacks, his funding was tripled. All through 2006, NCPH built sophisticated rootkits and launched a barrage of attacks against multiple US government agencies. By the end of July, 2006, NCPH had created some 35 different attack variants for one MS Office vulnerability. During the testing phase, NCPH used Word document vulnerabilities. They switched to Excel and later to PowerPoint vulnerabilities. The result of all of this activity is that the NCPH group siphoned thousands, if not millions, of unclassified US government documents back to China.