Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Sony Hack


  • Please log in to reply
28 replies to this topic

#1 toolhore

toolhore

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 18 December 2014 - 09:44 AM

Could this hack of Sony been prevented if their servers had a program or app that bomb the intruders hard drive.



BC AdBot (Login to Remove)

 


#2 Kilroy

Kilroy

  • BC Advisor
  • 3,324 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:09:43 PM

Posted 20 December 2014 - 05:22 PM

Such an app would have to know that it was being attacked and the attacking computer would have to allow a remote machine to do.  In other words, no.  Toss in virtual machines (VMs) and it wouldn't make a bit of difference.  If a VM gets blown up you just reload it, in minutes.



#3 NickAu

NickAu

    Bleepin' Fish Doctor


  • Moderator
  • 12,724 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:127.0.0.1 Australia
  • Local time:12:43 PM

Posted 20 December 2014 - 06:01 PM

There is a discussion about it here.

FBI warns of 'destructive' malware in wake of Sony attack

#4 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 20 December 2014 - 07:02 PM

This is interesting. I did not make this post. However, thanks for the input.



#5 PuReinSAniTY

PuReinSAniTY

  • Members
  • 432 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:in a basement
  • Local time:12:13 PM

Posted 29 December 2014 - 05:37 AM

Such an app would have to know that it was being attacked and the attacking computer would have to allow a remote machine to do.  In other words, no.  Toss in virtual machines (VMs) and it wouldn't make a bit of difference.  If a VM gets blown up you just reload it, in minutes.

that is true but if the VM is so messed up that it infects the MBR and the bios then you know you're pretty much stuffed because you get the bsod every few minutes

they call me te java mayster


#6 PuReinSAniTY

PuReinSAniTY

  • Members
  • 432 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:in a basement
  • Local time:12:13 PM

Posted 29 December 2014 - 05:40 AM

Could this hack of Sony been prevented if their servers had a program or app that bomb the intruders hard drive.


An app so powerful... I don't think there is anything like that correct me if I'm wrong but wouldn't such a powerful tool also damage the user's computer?

they call me te java mayster


#7 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 29 December 2014 - 06:30 AM

For me the whole idea behind such a powerful app is to damage the hackers computer. Until the tech industry comes up with a fool proof security system I see no other way to prevent such crime.



#8 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,660 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:43 AM

Posted 29 December 2014 - 01:56 PM

You're thinking of hack back?


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#9 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 29 December 2014 - 02:23 PM

Thats a good term and a good way to get back at the intruder. But I'm all for destroying the attacking computer.



#10 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,660 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:43 AM

Posted 29 December 2014 - 02:33 PM

One problem with hack back is attribution. Attackers often use proxies. This can be a compromised computer. If you attack and destroy that computer, you are committing a crime.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#11 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 29 December 2014 - 02:41 PM

Yes, I have been informed of such a crime. However, If the compromised computer had the bombing app or program then would not the attacking hacker have been bombed? Until the computer industry decides to start fighting back, even if dirty, these kinds of attacks are going to continue. There are lots of brilliant minds out there, surely someone could come up with something.



#12 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,660 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:43 AM

Posted 29 December 2014 - 02:45 PM

And what about false positives? Detecting an attack is the same problem as detecting malware: there are false positives.

 

Do you want to accept the liability for such a bomb app on your computer?


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#13 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 29 December 2014 - 02:51 PM

Yes, I would be willing to take that chance.



#14 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,660 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:43 AM

Posted 29 December 2014 - 02:54 PM

Then get a good lawyer and good insurance.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#15 toolhore

toolhore
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Northern Colorado
  • Local time:07:43 PM

Posted 29 December 2014 - 03:27 PM

OK, back to my original question. If every computer and server worldwide had such an app, wouldn't that solve, at the very least, a majority of all hacks.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users