Legal Hack Back Lets You Go After Attackers In Your Network (csoonline.com) 47
itwbennett writes: Security startup Cymmetria has a new offering for customers: "legal hack back." The hack back tools have been added to the company's MazeHunter deception technology and will enable "tracking down the attack servers and wiping data originally stolen from their servers, probing the attack infrastructure for weaknesses to exploit, disabling the systems controlling malware, looking for information about the attackers to use in attribution, and launching distributed denial-of-service attacks to slow down criminal operations," but security teams are restricted to taking these actions on systems within their organizations, writes Fahmida Rashid in CSO Online. "Legal hack back via MazeHunter is more than traditional incident response because the organization can run a payload on the infected machine to engage with the attacker even before the forensics part of the investigation is complete," said Gadi Evron, founder and CEO of Cymmetria.
If it is in your network... (Score:5, Interesting)
Re: (Score:2)
but he is with 99+% chance OUTSIDE your network (Score:2, Offtopic)
Cyberpunk is coming (Score:2)
Spoof the source IP and get them to eat themselves (Score:2)
Better still, trick them into 'hacking back' at the NSA. Laughs all around.
Re: (Score:2)
http://hoaxes.org/weblog/comme... [hoaxes.org]
Re: (Score:2)
Will that ip always point to a 8/16, early 32 bit desktop computer at home in real time?
In terms of a user's home desktop 8/16/32 bit computer with, dial up modem, big HD storage, a set ip for hours and dial up isp ip range.
The interesting person uses their home ISP account to get into to a computer network and slowly move files back to their own home computer over hours.
Logs show a clear moment of files from the network to a home computer ISP account.
The skill lev
Re: (Score:2)
Indeed. The words "false", "flag" & "lawsuit" spring immediately to mind.
Legal Pre-Emptive Hack . . . (Score:4, Insightful)
Legal hack back via MazeHunter is more than traditional incident response because the organization can run a payload on the infected machine to engage with the attacker even before the forensics part of the investigation is complete
Well, that might be enough for some primitive folks, but for folks expecting American Defense Quality, I want a system that will attack the hackers before they even think about hacking.
Yeah, sure, you haven't done anything yet, and you are still innocent, but the NSA/CIA/FBI AI models say you WILL be guilty sooner or later, so we might as well take you out right now.
Re: (Score:1)
At which point, there is no law. Anyone can be manipulated to commit any crime given enough subtle changes to their environment. Do it early enough and you can be the grand master of your own conspiracy, letting others take the fall for their role in the final act, but leaving you free and clear despite your careful domino pla
Lets see how this works the other way around (Score:4, Funny)
I run a hosting company which houses tens of thousands of servers and one of my customer machines is compromised. This malware hacks another company who has this HackBack(TM) service which then hacks back into my customer machine and begins to probe my network for weakness. My IDS detects this which launches its own HackBack(TM) service into this other company. Who sees me attacking and launches another HackBack(TM) attack.
2002 called, they want their lazy worms back
And this is "legal" because... (Score:4, Insightful)
... we want it to be? ... the CEO saw it in a movie? ... the check is in the mail?
Inquiring minds want to know.
Because... (Score:1)
Because this is HACKING the HACKERS with HACKS. That's why.
You have now read the entire substance of the thing. You are up-to-date.
Re: (Score:1)
ONLY Hackers can Hack Hacky Hackings, not LUDDITE Users
Hacks!
Re: (Score:2)
... we want it to be? ... the CEO saw it in a movie? ... the check is in the mail?
Inquiring minds want to know.
It isn't and you'll probably be hacking a third party machine which has already been hacked by your attacker and when they do their forensics they'll see they got hacked twice once by the attacker (Who covered his tracks) and once by you (Who didn't cover his tracks). See you in court
Re: (Score:1)
Okay not a lawyer (Score:2)
Just sayin
Sound pretty interesting if true but.. (Score:2)
What will actually happen (Score:2)
instead of companies hiring folks who actually know what they're doing, they'll tell someone to run this. And the next thing you know, the person who doesn't actually know what's going on will "fix" it so it includes anyone attacking them, and then someone's mother or grandmother, whose machine was compromised by malware that they had no clue about, will suddenly be toast, all their emails, and writings and pictures of their kids gone. And they won't have a clue what happened.