Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.cyberspace    |    Part of that weird surfin-the-net thing    |    331 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 291 of 331    |
|    Allah's All-Seeing Anus to All    |
|    It's September 27, 2012 -- DO YOU KNOW W    |
|    27 Sep 12 07:16:49    |
      c55b1a0c       XPost: alt.privacy, alt.computers, alt.politics.bush       XPost: alt.politics.democrats.d       From: jismquiff@yahoo.com              "It would seem the cyberattack merry-go-round has become an insoluble       problem.              Like, who's to say the Chertoff Group is not complicit in some or many       of the attacks this piece describes?              If there are profits to be made or properties to be stolen, hackers of       every stripe would be foolish not to 'get in the game.' "              +++++              "Recall it wasn't many years ago when hackers, mostly young people,       were being eagerly hired by private industry -- and possibly       governments -- to troubleshoot and ferret out -- hacking and       hackers!              And we laughed and marveled at these seemingly innocent       prankster-"geniuses," who generally did no jail time and gleefully       collected generous paychecks. "              =========================       "In cyberattacks, hacking humans is highly effective way to access       systems"                     By Robert O’Harrow Jr.       September 26, 2012                     THE E-MAILS arrived like poison darts from cyberspace.              Some went to the Chertoff Group, a national security consulting firm       in Washington. Others targeted intelligence contractors, gas pipeline       executives and industrial-control security specialists. Each note came       with the personal touches of a friend or colleague.              “Attach[ed] is a quote for the Social Media training we discussed,”       said one message sent on July 3 to the vice president of EnergySec, a       federally funded group in Oregon that focuses on the cybersecurity of       the nation’s power grid.              But like much of the digital universe, the e-mails were not what they       seemed. They were cyberweapons, part of a devastating kind of attack       known as “social engineering.”              Emerging details about the e-mails show how social engineering — long       favored by con artists, identity thieves and spammers — has become one       of the leading threats to government and corporate networks in       cyberspace.              The technique involves tricking people to subvert a network’s       security. It often relies on well-known scams involving e-mail, known       as “spear phishing,” or phony Web pages. But such ploys now serve as       the pointed tips of far more sophisticated efforts by cyberwarriors to       penetrate networks and steal military and trade secrets.              The e-mails this spring and summer appear to be part of a long-running       espionage campaign by a hacker group in China, according to interviews       with security researchers and documents obtained by The Washington       Post. Some of the e-mails, including those sent to the Chertoff Group       and EnergySec, were caught by suspicious employees. Others hit home.              “Multiple natural gas pipeline sector organizations have reported       either attempted or successful network intrusions related to this       campaign,” officials at the Department of Homeland Security said in a       confidential alert obtained by The Post.              The May 15 alert, by the department’s specialists in industrial       control systems, said “the number of persons targeted appears to be       tightly focused. In addition, the email messages have been       convincingly crafted to appear as though they were sent from a trusted       member internal to the organization.”              Social-engineering attacks revolve around an instant when a computer       user decides whether to click on a link, open a document or visit a       Web page. But the preparation can take weeks or longer.              Serious hackers investigate their targets online and draw on troves of       personal information people share about themselves, their friends and       their social networks. Facebook, Twitter and other social media have       become prime sources for the hackers, specialists said.              “Everybody has their trigger,” said Bruce M. Snell, director of       technical marketing at McAfee Security Systems. “A good social       engineer will find that trigger.”              Once malicious software code is delivered, it burrows in and hides in       a targeted network. That code, known as malware, can lurk for years in       intelligence or attack schemes that are sometimes known as “advanced       persistent threats.” Eventually, the code reaches back out to the       hackers for instructions, often cloaking the communication through       encryption or masking it to seem like innocuous Web browsing by an       employee.              Over the past three years, most major cyberattacks on U.S.       corporations have included social engineering, specialists said. That       includes hacks of Google and security giant RSA. Researchers think       that scores of attacks were designed by the same Chinese hackers who       appear to be involved in the current e-mail campaign. Some U.S.       officials think the hackers may have links to the Chinese military.              The Chinese are not the only ones using the technique. Cyberwarriors       at the Pentagon receive social-engineering training for offensive and       defensive missions, knowledgeable specialists said.              David Kennedy, a security consultant and former National Security       Agency analyst, said he is amazed at the effectiveness of the       techniques.              “I have done hundreds of these, and I have never been stopped,” said       Kennedy, who teaches social engineering to other security specialists.       “It sounds horrible, but it works every single time.”              The human factor                     Social engineering works because it targets a vulnerable part of       cyberspace that cannot be patched with technical fixes: human beings.       People want to believe that their communication is safe.              “Because it goes at the human level, not at the technological level,       we’re all vulnerable,” said Joseph Nye Jr., a distinguished service       professor at Harvard University who is on the board of advisers to the       Chertoff Group. Nye said he has received at least six spear-phishing e-       mails purporting to be from the Chertoff Group. He said he deleted       them all, but he added, “Every once in awhile, one of these will get       by you.”              The explosive growth of cyberspace has created a fertile environment       for hackers. Facing the flood of e-mail, instant messages and other       digital communication, many people have a hard time judging whether       notes or messages from friends, family or colleagues are real. Many       don’t even try. Hackers are so confident about such permissiveness       that they sometimes begin their attacks in social media three or four       steps removed from their actual targets. The hackers count on the       malicious code spreading to the proper company or government agency —       passed along in photos, documents or Web pages.              “This is the next evolution of social engineering, where victims are       researched in advance and specifically targeted,” said a recent       Internet threat report by Symantec, a computer security firm. “The       very nature of social networks makes users feel that they are amongst              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca