Fourth-Party Attribution

Started by deanwebb, October 04, 2017, 09:07:59 AM

Previous topic - Next topic

deanwebb

https://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf

What happens if a threat actor hacks another threat actor and then launches attacks out of the hacked hacker? And what if the first threat actor is a national intel agency and the second threat actor is a rival nation's intel agency?

Dude, this is some wild, wild stuff.

:matrix:
Take a baseball bat and trash all the routers, shout out "IT'S A NETWORK PROBLEM NOW, SUCKERS!" and then peel out of the parking lot in your Ferrari.
"The world could perish if people only worked on things that were easy to handle." -- Vladimir Savchenko
Вопросы есть? Вопросов нет! | BCEB: Belkin Certified Expert Baffler | "Plan B is Plan A with an element of panic." -- John Clarke
Accounting is architecture, remember that!
Air gaps are high-latency Internet connections.