Dailydave mailing list archives

Re: What is happening?


From: "Ivan .Heca" <ivanhec () gmail com>
Date: Fri, 19 Dec 2014 09:30:49 +1100

What about the cost to Belgacom from the nsa regin hack? What if they need
a bailout due to the loss of confidence after such a public breach one
wonders. Or are they just collateral damage.

Some of the investigators point to malware written in Korean, but Monsegur
said that doesn't necessarily mean the hackers are Korean.

"Well, it doesn't tell me much. I've seen Russian hackers pretending to be
Indian. I've seen Ukrainian hackers pretending to be Peruvian.There's
hackers that pretend they're little girls. They do this for misinformation,
disinformation, covering their tracks," he said. "Do you really think a
bunch of nerds from North Korea are going to fly to New York and start
blowing up movie theaters? No. It's not realistic. It's not about 'The
interview.' It's about money. It's a professional job."

Monsegur thinks it's also possible this was an inside job, that an employee
or consultant downloaded all the information from Sony's servers and then
sold it to someone else

http://www.cbsnews.com/news/sony-hack-former-anonymous-hacker-not-convinced-north-korea-is-responsible/?google_editors_picks=true
On 18/12/2014 2:51 PM, "Dave Aitel" <dave () immunityinc com> wrote:

 The Sony Hack is not just fun and games (if it was, The Interview would
have dropped as a .torrent long ago). It's not about a movie or even Sony,
at all. When you build a nuclear program, you have to explode at least one
warhead so that other countries see that you can do it. The same is true
with Cyber.

Iran did this exact same near-mortal blow to Saudi Aramco, as a way of
demonstrating that they could and would. That's what just happened to Sony,
but they didn't see it in time, and didn't realize they were going to have
to fold. If you recognize the signature of this kind of nation-state
attack, it is not hard to see ahead of time what is going to happen, and we
at Immunity have gone on the record
<http://www.aol.com/article/2014/12/05/sony-pictures-hack-included-celebrity-social-security-numbers/21003381/>
weeks ago saying that this was North Korea, and Sony was going to have to
pull the movie to survive.

Kim Zetter wrote a Wired article
<http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/> in
which she called out our Business Insider
<http://www.businessinsider.com/sony-hack-should-be-considered-an-act-of-war-2014-12#comments>
piece as fantasy. She's since edited us out of the article, but it is
ironic that she calls on the "Cutting Sword of Justice" as another hacker
group, when in fact they are, like #opisrael, directly Iranian state-based
efforts (to be specific, MOIS) - the very exact kind of operation people
are failing to see here.

Clearly, not all hacking (even very impactful hacking) by random hacker
groups is war/terrorism, but when a nation state decides to take out a
business in another country, it's hard for our policy team to find another
word for it. You do not see the United States using cyber efforts to do
this to businesses in other countries, and when Iran or North Korea, or
even China, does it, that's stepping over the line. The United State's
initial message was that they'd rather have the FBI handle it than the USAF
or even JSOC...

I guess what I'm saying is, you can learn more about cyber war at the bar
at Infiltrate <http://infiltratecon.org>than in Wired so far. ;>

-dave


_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave


_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave

Current thread: