Originally posted by Kung Wu
View Post
Here's something else for you to think about.......If the malware was installed before the digital signature, they should have been comparing the binaries as well. And that would also have caught it.
PS: your #2 is not plausible based on what is already known. What I've heard and read seems to point out that a server was compromised. That would rule out certificate forgery. It might also rule out unsigned patches as well.
PSS: Shame on FireEye for running such crappy network monitoring software. They are a pretty expensive company, and the space they play in would tend to put a gigantic target on their backs.
Comment