Hackers and Their Methods of Operendi Don't Always Give them away

Often hacker groups methods to pin the crime on someone else. So, let's say you have 160 known hacking groups world-wide, nearly all are loosely associated. Plus, you have government and foreign military or cyber-spy requires perhaps adding another 50 or so to the mix, some quite sophisticated. Until recently, I was reading a hundred and fifty page research report on cyber security, cyber rivalry, hactivists, and criminal cyber-terrorist. Okay so let's talk for second will we?

One of the chapters in the report suggested that it was easy to tell if a hacking group was part of a state-sponsored cyber command, or just would-be cyber-terrorist playing around because you could tell by their style and methods. However, I would question this because cyber requires would be wise to cloak as hactivists, or petty hacker teenagers when trying to break into a system of a Corporation, or government agency. Meanwhile the report suggests that the cyber-terrorist aren't that smart, and that they always use the same methods of operandi, I completely disagree with this.

There may be some that do, but I bet most of them have many tricks up their sleeve, and they may even on purpose simulate the methodologies and tactics of other hacking groups to shield and hide their own identities -- in other words, mix it up a little so they really do not get caught. 


Hire a hacker to recover lost crypto Wouldn't they, or are we to think and think cyber-terrorist are stupid or something? They aren't, they're obviously smart enough to break into virtually every single computer system on the planet, they've been busy breaking into everything within the last few years, these aren't stupid individuals -- in fact, I wonder if anything is safe of holy anymore?

Next, I'd like to point out that the authorities are busy hiring these cyber-terrorist who have experience for their own security computer needs. If these cyber-terrorist were so naïve and stupid, then i doubt very much if the firms, and government agencies would be hiring them in the first place. Whereas the methods and strategies, as well as the tactics employed by various cyber-terrorist could at times act as a fingerprint, it might also be activities like a false positive or a cover on purpose used to obscure their own hacking group.

Therefore, I thought it was rather naïve of these research paper, somewhat completed by a computer scientist, to even suggest such. Even if these were talking in hindsight or about how things have in times past been in the past, I think they are often missing something. Sure some of the cyber-terrorist that aren't perhaps wise enough to understand this concept, or are still learning might make such a mistake to always use the same methods, but I doubt that is true for experienced cyber-terrorist.

Bejesus even chimpanzees, don't always use the same methods as to not hand out their motives, so i thought humans see why concept too. Of course, that's just my opinion after reading about 1000 pages a week ago of research reports on cyber security. Indeed I hope you will please consider all this and think on it.

Views: 2

Comment

You need to be a member of Wee Battle .com to add comments!

Join Wee Battle .com

© 2024   Created by Jeremiah MARSHALL Founder/ C CEO.   Powered by

Badges  |  Report an Issue  |  Terms of Service