Analytics
11/1/2012
07:45 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Companies Should Think About Hacking Back Legally, Attorney Says

Fighting back against cybercriminals can be risky, but there are legal ways to do it, says Hacker Halted speaker

MIAMI -- Hacker Halted 2012 -- If you're so frustrated with hackers that you're thinking about hitting them back, then be careful -- but it can be done.

That was the message delivered Tuesday by David Willson, an attorney from Titan Info Security Group, here at the Hacker Halted conference.

While many companies have the technical tools and knowledge they need to inflict damage on their online opponents, most of them do not pursue the idea because of concerns that the law will regard them as hackers themselves, Willson says.

"The bad news is that [corporations'] security sucks," he says. "The good news is that the bad guys' security sucks, too. There are tools, techniques, and intelligence that you can use to anticipate attacks as well as effectively stop them -- and potentially identify attackers once discovered in your network."

For example, a corporation could place code on a bot that has infected its network, Willson says. Eventually, that code might be transferred back to the attacker's command-and-control server, and could be programmed to block the attacker's communications path.

The trick, Willson says, is how to hack back legally. U.S. firms are governed by the federal Computer Fraud and Abuse Act, which essentially states that any unauthorized access of another organization's computers could be considered a crime. Some states have computer trespass laws, and other countries have laws that might get a company into legal trouble for cracking others' computers if those others are cybercriminals, he notes.

In the above example, where code is attached to a bot, an automated tool might be seen by the courts as being similar to cookies or adware, which are not illegal, Willson says.

Companies could also use honeypots, which allow users to legally collect intelligence about their attackers, or beacons, which legally illuminate an attacker's trail, Willson says.

Hacking back should never be a company's first response, but in the case of a persistent attacker, it might be the only answer. "You might be spending $50,000 to $100,000 a week to battle a persistent threat" he says. "You've tried all of the traditional approaches. Calling law enforcement doesn't help -- they are simply overwhelmed with other cases. What do you do?"

The key is to stay within criminal law while taking your chances with civil law, Willson says. "Obviously, you don't want law enforcement turning around and coming after you," he says. "But if a hacker wants to sue you for unauthorized access, that might be a chance you're willing to take."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

CVE-2014-9197
Published: 2015-01-27
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

CVE-2014-9198
Published: 2015-01-27
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

CVE-2014-9646
Published: 2015-01-27
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.