If a TBTF Bank Lost Its Quant Code to Chinese Hackers and No One Knew, Would We Still Have a Functioning Market?

Bloomberg has an excellent catch from the HB Gary emails, revealing that Morgan Stanley was one of the 20-200 companies targeted by the Chinese-based Aurora hack in 2009.

Morgan Stanley experienced a “very sensitive” break-in to its network by the same China-based hackers who attacked Google Inc.’s computers more than a year ago, according to e-mails stolen from a cyber-security company working for the bank.

The e-mails from the Sacramento, California-based computer security firm HBGary Inc., which identify the first financial institution targeted in the series of attacks, said the bank considered details of the intrusion a closely guarded secret.

“They were hit hard by the real Aurora attacks (not the crap in the news),” wrote Phil Wallisch, a senior security engineer at HBGary, who said he read an internal Morgan Stanley report detailing the so-called Operation Aurora attacks.

As McAfee made clear when it first announced the hack, the hackers were after the targets’ intellectual property (though note the understanding of the timing of the hack has changed).

Similar to the ATM heist of 2009, Operation Aurora looks to be a coordinated attack on many high profile companies targeting their intellectual property. Like an army of mules withdrawing funds from an ATM, this malware enabled the attackers to quietly suck the crown jewels out of many companies while people were off enjoying their December holidays.

Now, Bloomberg–with backing from an FBI officer and a reminder that Morgan Stanley is the world’s larger mergers and acquisitions adviser–seems to be most concerned about what the hackers learned about impending M&A.

FBI Deputy Assistant Director Steven Chabinsky said that hackers have increasingly targeted information related to mergers and acquisitions, data that can give companies involved an advantage in negotiations.

But the description of the targeted information as IP immediately made me think about quant code, the algorithms that banks use to conduct high frequency trading. When Sergey Aleynikov attempted to sell Goldman Sachs’ high frequency trading code, the Goldman and the government treated it like a capital offense. For good reason, because if another firm got that code, it would be able to game out Goldman’s moves. So how do we know that these hackers didn’t steal MS’ quant code?

In any case, the hack seems to raise real questions about disclosure. Should Morgan Stanley have had to reveal this to its stockholders and potential M&A clients (remember that MS led GM’s IPO last year, though hopefully long enough after this hack for the merger not to be exposed by it). Should MS have had to reveal this–with the potential implications for markets–to Congress? Did it?

I just can’t help but think that the Aurora hackers may well have gotten the same kind of information that Congressional oversight committees have requested from the Fed, but were refused.

Tweet about this on Twitter0Share on Reddit0Share on Facebook0Google+0Email to someone

0 Responses to If a TBTF Bank Lost Its Quant Code to Chinese Hackers and No One Knew, Would We Still Have a Functioning Market?

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34

Emptywheel Twitterverse
bmaz @mike_stark @AriMelber But, hey, there is nmo reason the media sou;d understand or cover that with real criminal trial experts.
6hreplyretweetfavorite
bmaz @mike_stark @AriMelber ... as ANY other GJ would get. Bet just leaves GJ w/a bunch of statute cites+says good luck. Which is NEVER done.
6hreplyretweetfavorite
bmaz @mike_stark @AriMelber ...for a vote as "draft indictment" by the GJ. This is months long+I bet McCulloch never submits a draft indictment..
6hreplyretweetfavorite
bmaz @mike_stark @AriMelber ...this would, with not much variance, be a 2-3 hr grand jury presentation, with definitive charges submitted...
6hreplyretweetfavorite
bmaz @mike_stark @AriMelber Here is what I DO know from 30 yrs crim law experience (27 trial level): in ANY other homicide under similar facts...
6hreplyretweetfavorite
bmaz @DavidSug @walterwkatz Yup on all fronts.
6hreplyretweetfavorite
bmaz @DavidSug @walterwkatz I am talking to you Sugerman! Honestly, from what I know, none of this is secure. But, still, sometimes stop+wonder
7hreplyretweetfavorite
bmaz @DavidSug @walterwkatz I separate ID's, but apparently things catching up to me.
7hreplyretweetfavorite
bmaz Whoa, just switched from the Dead Pirates game, and Law+Order SVU has an elevator video case! #SnatchedFromHeadlines
7hreplyretweetfavorite
bmaz @DavidSug @walterwkatz Yo, young, but in law school. Watched that commercial live and was mesmerized.
8hreplyretweetfavorite
bmaz @walterwkatz @DavidSug I don't use Chr or FFox
8hreplyretweetfavorite
bmaz @shenebraskan @DavidSug @walterwkatz Tried it long ago. Was too slow and worthless.
9hreplyretweetfavorite
March 2011
S M T W T F S
« Feb   Apr »
 12345
6789101112
13141516171819
20212223242526
2728293031