Visible to the public Biblio

Filters: Keyword is hackers  [Clear All Filters]
2019-09-25
Andy Greenberg.  2018.  Russian Hacker False Flags Work - Even After They're Exposed. Wired.

Hackers often perform deception through the use of false flag operations. False flags allow nation-state actors to pose as others in order to further complicate attribution. Russian hackers planted destructive malware, called the "Olympic Destroyer", which contained code deriving from other well-known attacks launched by different hacking groups. This discovery highlights the evolution of deceptive tactics used by hackers.  

Austin Whipple.  2016.  Hacker Psychology: Understanding the 4 Emotions of Social Engineering. Better Cloud.

The underlying psychological elements of social engineering attacks must be further explored by security researchers to help develop better strategies for protecting end user from such attacks. Hackers often try to evoke emotions or behavioral behaviors such as fear, obedience, greed, and helpfulness, in the launch of social engineering attacks. 

2019-09-24
M Mitchell Waldrop.  2016.  How to hack the hackers: The human side of cybercrime. Nature.

Psychologists, economists, and human-factors people in addition to computer scientists need to be working on improving cybersecurity as the frequency and sophistication of cyberattacks grows. Cybersecurity professionals call for the exploration of behavioral science and economics in regard to cybercriminals and victims. The discovery of weakness in user behavior could leaked to the discovery of vulnerabilities among cybercriminals. 

[Anonymous].  2017.  HADES misleads hackers by creating an alternate reality. Homeland Security News Wire.

Cyber researchers at Sandia National Laboratories are applying deceptive strategies in defending systems against hackers. Deception strategies are being applied through the use of a recently patented alternative reality by the name of HADES (High-fidelity Adaptive Deception & Emulation System). Instead of obstructing or removing a hacker upon infiltration into a system, HADES leads them to a simulated reality in which cloned virtual hard drives, data sets, and memory that have been inconspicuously altered, are presented. The goal is to introduce doubt to adversaries. 

2019-09-11
Chris Bing.  2018.  Winter Olympics hack shows how advanced groups can fake attribution. Cyber Scoop.

A malware attack that disrupted the opening ceremony of the 2018 Winter Olympics highlights false flag operations. The malware called the "Olympic Destroyer" contained code deriving from other well-known attacks launched by different hacking groups. This lead different cybersecurity companies to accuse Russia, North Korea, Iran, or China.