Phishing Out The Goldman Code Fishers

Tyler Durden's picture

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
savara's picture

Keep up the good work !

Eduardo's picture

LOLLLLLLLL I searched the pirate bay to see if I got lucky ... nothing yet LOL



FischerBlack's picture

LOL, Fort Belvoir is the home of several spooky Department of Defense agencies.

Project Mayhem's picture

I'm just waiting for Booz Allen Hamilton to show up in the logs

Anonymous's picture

I was also searching for this code *grin*! BTW: I beleieve it is an ugly piece terribly intermingled C++. Typically only one or two poeple know, what is really going on in this code. Frequently also these two guy's have false imaginations, what their own code really does. Moreover I think that program trading is largely overestimated. Of course there are tricks to manipulate the stock prices. But a simple code which sells and buys due to signals of a random generator may generate a positive payoff too ;). And there exists superstition concerning computers. Nevertheless this GS code plot is a delightful story. Thanks for your reports.

Anonymous's picture

That is brilliant...although people are unlikely to d/l torrents at work.

Anonymous's picture

If GS was as on top of this as they'd like to believe they are, they'd be posting some phony code on Pirate Bay as we speak to redirect everybody's attention.

dark pools of soros's picture

they would post code to get everyone to buy Citi

Anonymous's picture

hiiiiiiilarious stuff. Thanks Cryptogon! And ZH!

Sergey's defense should be "I did it for teh LULZ."

Ben_the_Bald's picture

Fun and games but this doesn't prove anything. In fact, I'm sure the ZH access logs have visits from the same servers all the time. Fact is you don't know why the Google search was made.

When someone finds the code and puts it on a warez server with open access then we are talking.

As for what's in the code, I'd take the government's word for it, a scheme for the "fair" manipulation of the market by GS. It will not be easy to port to your pc environment at home though. But GS's competitors certainly have similar in-house developed tools. Just ask the middleware providers like TIBCO. (Of course they wouldn't answer, but it's fun to ask).

Project Mayhem's picture

As for what's in the code, I'd take the government's word for it, a scheme for the "fair" manipulation of the market by GS


If you believe this, I have a bridge to sell you in Brooklyn.

Anonymous's picture

I guess you miss the point of the word "fair" so I seriously doubt you do have a bridge to sell.

GILLERAN's picture

Yeah, as in 'fair, if you've got friends at Treasury'.

E Thomas St.'s picture

I think the funny thing is that such a silly honey pot attracted people from those places in the first place.

Anonymous's picture

They could be bots also.

E Thomas St.'s picture

Which could indicate that the amount of malarky they could potentially pick up by using bots might interfere with the ability to devine anything of value.

carpentersr's picture

Ah yes, Warez. When I first heard about this story, that is where I thought the code would be.

Anonymous's picture

brilliant... gotta love the army, DHS and NYPD on there... love it!

Anonymous's picture

while TD is away 'phishing', might I suggest a visit to the great Michael Pettis' China blog and his current post:

RMB 1.5 trillion in new Chinese lending — can we turn this thing off?

asdf's picture

that's really insane, but the IMF doesn't seem to read Michael Pettis. "Recovery in Asia, full speed ahead!"

Project Mayhem's picture

all aboard the fail whale!

Anonymous's picture

Have been thinking this over a bit, and come up with this conclusion. The program itself is of marginal value to you or I or really any small operator. So what is scaring GS so badly that they had the FBI do one of the quickest IT investigations and arrests in history? The code is only as good as the data inputs. Since GS sits on the boiard of the group tht oversees program trading and thus has inside knowledge, not to mention its direct ties into all major exchanges, the actual URLS and identities of the instantaneous data sources have to be a part of the program. Also in a previous article last night part of the nano-second trading involved in-house communications of data and so those links would be known as well from the code. Several 'houses' within GS are strictly forbidden to communicate as that constitute insider trading etc. Those links could well be enough for competitors to force a guv investigation which would close the golden dorrs of GS forever.

yellow submariner's picture

IMHO: Good point! Moreover it would be really strange, if the code would still be on a site in germany, while Aleynikov is set free for a bail.

dark pools of soros's picture

we all should hope so..  we will have enough problems dealing with all the emerging markets as they mature than have to also deal with these blood suckers from the inside

Cue Ball's picture

My question & request is : how do I get that html program to search for hits on a public Company I like....seems like it would tell me who that Company is talking to.

PenGun's picture

 I really doubt it's a torrent. It's just some files somewhere. Now whoever finds it should torrent it immeadiataly.

Anonymous's picture

Matt Taibbi delivers a follow-up bitch slap to the fools who criticize his Rolling Stone article on GS:

Anonymous's picture

July 14th, 2009 DealZone

Goldman Sachs breaks silence on alleged code theft

After more than a week of silence, Goldman Sachs finally commented publicly on the alleged theft of computer codes by former programmer Sergey Aleynikov calling losses sustained as a result would be “very, very immaterial.”

Anonymous's picture

The Real Story of Trading Software Espionage

While none of us knows the ingredients of Goldman's "secret sauce," we can say that any algorithmic code in and of itself is precious but has limited value until placed in the right circumstances. Those circumstances are not available to just any Tom, Dick or Sergey, but represent the core strategy of the fast-rising high frequency trading firms.

First, strategies that optimize the value of high frequency algorithmic trading are highly dependent on ultra-low latency. The right decisions are based on flowing information into your algorithm microseconds sooner than your competitors. To realize any real benefit from implementing these strategies, a trading firm must have a real-time, colocated, high-frequency trading platform—one where data is collected, and orders are created and routed to execution venues in sub-millisecond times.

Next, since many of these strategies require transacting in more than one asset class and across multiple exchanges often located hundreds of miles apart, i.e., NY to Chicago, that infrastructure will often require roundtrip long haul connectivity between the data centers.

Lastly and most importantly, this code has a limited shelf life, whose competitive advantage is diluted with each second it is outstanding. While a prop desk's high level trading strategy may be consistent over time, the micro-level strategies are constantly altered—growing stale after a few days if not sooner—for two important reasons. Firstly, because high frequency trading depends on ridiculously precise interaction of markets and mathematical correlations between securities, traders need to regularly adjust code—sometimes slightly, sometimes more—to reflect the subtle changes in the dynamic market. The speed and volatility of today's markets is such that the relationships forming the core of our algorithm strategies often change within seconds of our ability to implement the very strategies that exploit them. Secondly, competitive intelligence is so good across all rival trading firms that each is exposed to the increasing susceptibility of their strategies being reverse engineered, turning their most profitable ideas into their most risky. As a result, any firm acquiring the "stolen" code would gain benefit from it for no more than a few days before that firm would need to adjust the code to the dynamic conditions. Since these changes build on themselves, in a matter of weeks that code would look quite different from that which was originally "stolen."

Advanced Trader