An open community 
of Macintosh users,
for Macintosh users.

FineTunedMac Dashboard widget now available! Download Here

Topic Options
#40893 - 06/13/16 03:35 AM turning the tables on cyber criminals
jchuzi Online


Registered: 08/04/09
Loc: New York State
Maybe this will work, maybe not, but it's an interesting development. A Computer Security Start-Up Turns the Tables on Hackers
_________________________
Jon

OS 10.14.6, iMac Retina 5K 27-inch, late 2014, 3.5 GHz Intel Core i5, 1 TB fusion drive, 16 GB RAM, Epson SureColor P600, Photoshop CC, Lightroom CC, MS Office 365

Top
#40897 - 06/13/16 06:38 AM Re: turning the tables on cyber criminals [Re: jchuzi]
joemikeb Online
Moderator

Registered: 08/04/09
Loc: Fort Worth, Texas
Sounds worth trying, but I am confident that if it works it won't take the bad guys long to figure out a new approach to get around it.


Edited by joemikeb (06/13/16 05:33 PM)
_________________________
joemikeb • moderator

Top
#40907 - 06/13/16 05:09 PM Re: turning the tables on cyber criminals [Re: joemikeb]
slolerner Offline


Registered: 08/25/09
Loc: New York City

Top
#40911 - 06/14/16 04:57 AM Re: turning the tables on cyber criminals [Re: joemikeb]
Virtual1 Offline


Registered: 08/04/09
Loc: Iowa
Originally Posted By: joemikeb
Sounds worth trying, but I am confident that if it works it won't take the bad guys long to figure out a new approach to get around it.

This isn't a new war, it's been going on for several years.

Researchers have been using honeypots for quite some time, trying to capture malware and figure out its behavior, including tracing its interaction with the C&C servers that some use. For that they favor using virtual machines, that allow them to observe the malware. It's been so effective, the malware authors have already reacted to it by adding sophisticated "blue pill detection" routines, to see if they are actually running in a VM. If they successfully detect the VM, they don't activate. These started showing up a few years ago

So it turns into an escalating tech war. The hackers detect the blue pill. The blue pill gets upgraded, the hackers figure out how to detect it again, the pill gets updated again, etc etc.
_________________________
I work for the Department of Redundancy Department

Top
#40915 - 06/14/16 06:02 AM Re: turning the tables on cyber criminals [Re: Virtual1]
joemikeb Online
Moderator

Registered: 08/04/09
Loc: Fort Worth, Texas
Cyber security is not a war! Wars have specific enemies, defined objectives, and eventually Is won or lost. After a war the survivors can pick up the pieces and go back to their old way of life -- sort of. Cyber security is more like fighting crime. The perpetrators are all around us and sometimes we are our own worst enemy (we get suckered in by scams, neglect security updates, fail to keep our guard up). There is no win or lose. The best we can do is to keep the level of the conflict at tolerable levels.
_________________________
joemikeb • moderator

Top

Moderator:  alternaut, cyn