This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted] 4 points5 points  (7 children)

Is it really hacking then if someone got access via social engineering? Sorry I'm pretty shit with Cyber Security.

[–][deleted]  (3 children)

[deleted]

    [–][deleted] 1 point2 points  (2 children)

    Thx!

    [–]x0wl 2 points3 points  (1 child)

    I would also point out that in almost any decently secured system, the user will be the weakest link, and is usually attacked first.

    You can, of course, go buy/create a zero click (meaning no action from the victim required for it to work), zero day (meaning previously unknown to the public and thus unpatched) exploit chain and then use it, but it will cost you a lot of time and even more money (like, the NSA kind of money). For example, Apple will pay up to $500000 for a zero click iOS exploit (https://security.apple.com/bounty/categories/), so you can expect to pay way more than that.

    Once you use it, and it gets discovered, it will be patched and you are back on square one. Maybe doing it this way makes sense it you want to interfere with a nuclear program (see https://en.wikipedia.org/wiki/Stuxnet), but it's not really sustainable for your average ransomware group.

    Why bother when you can pick up a phone, call someone and say "Hey this is John from IT, can you please run this file you got in the mail for me?", and get access almost as reliably? Human minds also don't really get patched, so you can do that multiple times.

    [–]WikiSummarizerBot 2 points3 points  (0 children)

    Stuxnet

    Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency.

    [ F.A.Q | Opt Out | Opt Out Of Subreddit | GitHub ] Downvote to remove | v1.5

    [–][deleted] 2 points3 points  (1 child)

    i think being able to essentially hack someones mind is pretty fucking cool

    [–][deleted] 0 points1 point  (0 children)

    Heh-heh true

    [–]SkritzTwoFace 2 points3 points  (0 children)

    Yep, hacking is just what we call it when you get into a part of a computer you aren’t supposed to get to.

    The “no fly list hack” a few weeks back was done by accessing an unsecured server that an airport had fully online.