top | item 4732310

How Georgia doxed a Russian hacker (and why it matters)

86 points| shawndumas | 13 years ago |arstechnica.com | reply

18 comments

order
[+] atamyrat|13 years ago|reply
It's quite funny and genius. Article says that malware used by Georgia is not specified, but from original PDF report it's clear that they have used his own exploit to attack him!

From PDF: "then gave Cyber Attacker Fake ZIP Archive with his own virus inside and the name “Georgian-Nato Agreement”."

It was possible because they already had an access to his C&C servers.

[+] kylemaxwell|13 years ago|reply
For me, this matters less because of "what chance do the rest of us have?" and more about implications for so-called "hack back" initiatives and the thorny problem of attribution. I don't have access to the evidence that the Georgia CERT does, of course, but their analysis goes far beyond using a webcam and geolocating an IP address.

It's interesting that somebody that isn't a military organization or law enforcement (strictly speaking) comes out and admits that they infiltrated the exfiltration with their own malware. The idea has been around a long time but they had pretty good results, apparently!

[+] vizzah|13 years ago|reply
Well, to anyone who can comprehend that .pdf research in full, it will be crystal clear that this hacker CAN NOT be working for Russian government.. he must had his personal, likely scouting for classified info reasons, but it all can be hardly defined as a "government attack" based on his (below average) skill level, his surroundings and a physical location.
[+] JagMicker|13 years ago|reply
I don't think a judgement can be made at this point as to whether he was or was not working in collaboration with some form of Russian gov.

I picture a somewhat disorganized system of Russian gov. employees sometimes working together and other times in opposition.

The Wikipedia article about the Russian FSB mentions certain internal groups spying on one another. It wasn't that long ago when federal agencies like the CIA and FBI were at odds and spying on each other.

[+] tomrod|13 years ago|reply
So, what's next? Will the world start buying computers and phones without webcams? Seems like stories concerning malevolent webcam usage comes up about every six months.
[+] kristofferR|13 years ago|reply
Why stop buying laptops with webcams when applying a $0,01 piece of tape over it is all that is required if you're worried about it?
[+] FiddlerClamp|13 years ago|reply
Older Web cams (and a few modern ones built into laptops) used to come with a physical privacy shield -- a shutter you could move to block the camera when it wasn't in use. I like the idea.
[+] greedo|13 years ago|reply
Webcams are a very small part of this hack.
[+] qbrass|13 years ago|reply
Tape something over the lens so you can flip it up when you want to use the camera.