[Dailydave] What is happening?
ivanhec at gmail.com
Thu Dec 18 17:30:49 EST 2014
What about the cost to Belgacom from the nsa regin hack? What if they need
a bailout due to the loss of confidence after such a public breach one
wonders. Or are they just collateral damage.
Some of the investigators point to malware written in Korean, but Monsegur
said that doesn't necessarily mean the hackers are Korean.
"Well, it doesn't tell me much. I've seen Russian hackers pretending to be
Indian. I've seen Ukrainian hackers pretending to be Peruvian.There's
hackers that pretend they're little girls. They do this for misinformation,
disinformation, covering their tracks," he said. "Do you really think a
bunch of nerds from North Korea are going to fly to New York and start
blowing up movie theaters? No. It's not realistic. It's not about 'The
interview.' It's about money. It's a professional job."
Monsegur thinks it's also possible this was an inside job, that an employee
or consultant downloaded all the information from Sony's servers and then
sold it to someone else
On 18/12/2014 2:51 PM, "Dave Aitel" <dave at immunityinc.com> wrote:
> The Sony Hack is not just fun and games (if it was, The Interview would
> have dropped as a .torrent long ago). It's not about a movie or even Sony,
> at all. When you build a nuclear program, you have to explode at least one
> warhead so that other countries see that you can do it. The same is true
> with Cyber.
> Iran did this exact same near-mortal blow to Saudi Aramco, as a way of
> demonstrating that they could and would. That's what just happened to Sony,
> but they didn't see it in time, and didn't realize they were going to have
> to fold. If you recognize the signature of this kind of nation-state
> attack, it is not hard to see ahead of time what is going to happen, and we
> at Immunity have gone on the record
> weeks ago saying that this was North Korea, and Sony was going to have to
> pull the movie to survive.
> Kim Zetter wrote a Wired article
> <http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/> in
> which she called out our Business Insider
> piece as fantasy. She's since edited us out of the article, but it is
> ironic that she calls on the "Cutting Sword of Justice" as another hacker
> group, when in fact they are, like #opisrael, directly Iranian state-based
> efforts (to be specific, MOIS) - the very exact kind of operation people
> are failing to see here.
> Clearly, not all hacking (even very impactful hacking) by random hacker
> groups is war/terrorism, but when a nation state decides to take out a
> business in another country, it's hard for our policy team to find another
> word for it. You do not see the United States using cyber efforts to do
> this to businesses in other countries, and when Iran or North Korea, or
> even China, does it, that's stepping over the line. The United State's
> initial message was that they'd rather have the FBI handle it than the USAF
> or even JSOC...
> I guess what I'm saying is, you can learn more about cyber war at the bar
> at Infiltrate <http://infiltratecon.org>than in Wired so far. ;>
> Dailydave mailing list
> Dailydave at lists.immunityinc.com
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Dailydave