Information Warfare: Hacking The Hackers

Archives

April 18,2008: It's now gotten out that Internet security operators have been hacking hacker tools as a way to find out who the hackers are, how they operate, and to shut them down. This shouldn't be surprising, as many hacker weapons are small programs inserted into PCs to turn those computers into zombies (secretly controlled by hackers for sending spam, storing files or whatever), or simply to steal new information the user puts on that machine. Like all software, the "hackware" often has flaws that can be exploited by a more expert programmer. It's those flaws in operating systems, browsers or other programs, that enable the hackers to gain access in the first place.

Actually, criminal hackers have been hacking each others software for some time now, usually to get control of PCs already turned into zombies. All this counter-hacking has led to changes in the way the black hats (criminal hackers) operate. More of them have been encrypting their software, or building defensive capabilities in. This doesn't prevent their stuff from getting hacked, it just makes it more difficult.

Hacking the hackers has been am Internet security tool for years, and is also used by Cyber War practitioners. For obvious reasons, it just doesn't get much publicity.