LulzSec, Anonymous, & The End of The Internet

So it seems that LulzSec, the notorious hacking group, is not so altruistic and politically bent as they first appeared.

They apparently like to play computer games, and can’t resist showing off to the world just how kewl their new found skillz are.

They are looking more and more to me as an opportunistic bunch of parasites that have gotten drunk on their own intoxicating brew of exploits and media hype.  What used to sound like the kind of claims and warnings issued by supposed “whitehat hackers” and self proclaimed whilstle blowers is now sounding more and more like “look at me, I am the coolest kid on the block!  I wear my hat backwards, and I can spit real far!”

.

First, check out the Sony incidents timeline at attrition.org.  Then peruse the recent headlines gathered regarding LulzSec.

So what is going on with these daily attacks?  To catch a hacker, you have to think like one.  Generally in my experience, an attack team wants to penetrate a network quietly, get whatever it is they are after, and get out undetected so that they can return at a later date for something else, springboard into connected or partner networks, or sell the access off to someone not as risk averse as themselves.  These guys do not fit the typical profile.

If an attacker publicly and loudly advertises his or her success penetrating a particular target, it may be a diversionary tactic intended to create an immediate reaction to close the obvious holes made in the networks’ fabric while leaving back channels available.  This keeps the victim busy while the attacker sets in motion its real objective, and manages the intell or data that was stolen.  I would look very closely at the behavior of other systems in these networks over a sustained and coninuous period of time.  I have a feeling that something else is afoot, other than propaganda building, self promotion, and tattle-taling on naughty business practices.

It would appear that the attacks being launched are not the work of a close and organized group, but rather a bunch of groups or individuals using the LulzSec moniker to cover their tracks, complicate investigations, and thwart clear targeting of the responsible perpetrators.  Anyone with a copy of MetaSploit or other exploitation tools, a few hours of leisure time, and a computer can compromise a few zombie PCs to act as attack launch points, identify weaknesses in a web site, formulate an attack plan, and exploit the found vulenrabilities.  The information for doing so is freely available, and the cover of LulzSec is really handy.

I am hoping that some of the recent arrests made globally starts to chip away at the cloak of invisibility that these groups seem to have lately.  This nonsense has got to stop.  The silver lining to all of this is that it just might be the red hot flame that is ususally required to be applied to the seat of businesses to inspire and spur the adoption of SECURE communications protocols and transports.  The Internet is Dead.  Long live the Internet!!  Bring on the authenticated, reliable, and access controled Internet…

Advertisements