Threat Intelligence

2/9/2017
10:30 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

When Hackers Hack Hackers

Notable cases of internecine cyber squabbles.
Previous
1 of 9
Next

Image Source: Adobe Stock

Image Source: Adobe Stock

While most cybercriminals tend to set their sights on siphoning valuable data from poorly protected enterprises, there's no limit to the kinds of targets they'll seek out. There's no honor among thieves, so it shouldn't be a surprise that with the right kind of motivation, malicious hackers will happily attack other black hat and grey hat hackers.

Sometimes the attacks are purely mercenary: rivals know they can hit pay dirt very quickly if they find an easy way to tap into data stores of already vetted stolen identities or financial information. Similarly, certain kinds of cyber skirmishes are initiated to take competitors out. And then there are the attacks that are a little more personal: to show someone up, settle a score, or otherwise make a philosophical stand.

Regardless of the motives, these kind of squabbles offer up a satisfying dose of schadenfreude for cybersecurity pros beleaguered by the bad guys. It's nice to watch them fight amongst themselves every once in a while. So, pull up a chair, grab some popcorn and read on. 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mikeroch
100%
0%
mikeroch,
User Rank: Apprentice
2/15/2017 | 8:13:56 AM
Re: More Interesting than a Standard Exploit 192.168.1.1
Hello sir, I am absolutely agree with your saying, it is the stuff that shows human tendency, the rivalry between hackers and a piece of show off can also lead to such happenings, where hackers hack hackers.
alphaa10
100%
0%
alphaa10,
User Rank: Strategist
2/11/2017 | 6:48:41 AM
More Interesting than a Standard Exploit Story
As expected, hacker warfare demonstrates only the human tendency for turf-building and defense. What should be great consolation to civilians already hit by hackers is realization even the worst criminal operators are vulnerable, at some point, to some degree. All it takes is a persistent probe, and the rest is literally to worm through the defense perimenter.

The security story of the decade is the massive array of national resources around the world now devoted to state actor exploits-- both leading them and defending against them. By no accident, the NSA just expanded facilities with an architectural antitheis to its inscrutably dark monolith of a building in DC. The new NSA complex, located in the Utah desert, and entirely reflective white, is a virtual black hole for the world's data.

This article is a fresh perspective, but its tedious slide show format should be outlawed. When we readers see the tell-tale slide navigation controls, we already have been negatively conditioned by other slide shows. The fact we read the story, anyway, means your actual reader interest might double with a normal, single "page" article. (Yes, of course, we promise to read and click each ad-- just set them aside for us in a corner.)

Appreciate the links-- that saves us rediscovery, and a lot of time. Besides, DR sometimes offers a unique, gem of a link to richer material-- which is actually likely, since there is simply too much of the stuff to read with the same depth of attention.
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15504
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
CVE-2018-15505
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 a...
CVE-2018-15492
PUBLISHED: 2018-08-18
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2018-15494
PUBLISHED: 2018-08-18
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
CVE-2018-15495
PUBLISHED: 2018-08-18
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.