cyber bloodbath

damage

Inactive User
Joined
Aug 9, 2001
Messages
9,419
Reaction score
2
Location
uk
PARIS (AFP) - The first commercial software to strike back at computer vandals and spammers has run into crossfire from experts, who fear it could unleash "a cyber bloodbath" that could engulf the Internet, New Scientist says.

The product, launched in March by Texas security company Symbiot, gives companies an escalating list of options to defend themselves against hackers and other sources of unwanted traffic.

The menu starts with defensive choices: blocking traffic from a certain site, limiting the amount of bandwidth that certain senders can take up, and diverting troublesome data into a "honeypot" -- a decoy server where it can do no harm.

From then on, the options are more aggressive.

Someone who tries to hack into the company's computer can be "tagged."

He is allowed to steal information that appears valuable but in fact infiltrates his own computer, stamping all further data packets from that source with a tag which identifies it to other Symbiot subscribers as a "known attacker."

As a final resort, the company can send code to the attacking computer to end the assault.

Symbiot refuses to say what the counter-offensive entails, although a spokesman admits it "could be seen by some as malicious code," New Scientist says.

That means the software enables its customers to invade other computers, and for critics, this could open the gates to an escalating conflict where innocents could end up victims, the British weekly says.

The bystanders could include ordinary people whose computers are hijacked, without their knowledge, to send out spam or email viruses, or whose Internet address is "spoofed" -- used by the hacker to mask his own whereabouts.

Spoofing means "it is even possible to envisage an elaborate plot in which an unscrupulous small operator lures two larger rivals into a shooting match by convincing each one that it is under attack by the other," the report says.

"This type of thinking comes from a small number of security professionals, ones I'd consider hotheads, who want to get back at people," Eugene Schultz, an expert at Lawrence Berkeley National Labs, said.

"It's a vigilante mentality, and it just seems so irresponsible."

Symbiot, which gives access to the counterstrike software for 10,000 dollars a month, is treading carefully.

Before releasing its product, called iSIMS, it issued a white paper on "rules of engagement," stressing that users should only counterstrike when all else fails.

The report appears in next Saturday's issue of New Scientist.

Counterstrike software is being pursued by other computer security firms, sensing the widespread frustration at the failure of law enforcement at dealing with hacking and spamming.

At present, companies and individuals have only defensive options in the commercial arena, such as software for firewalls, spam filters and detectors that block suspected viruses.

But these are invariably breached after a while and have to be continuously updated.
 
One hell of a software, would like to see it working.

Although, on second thoughts this seems like "Legalized" hacking to me, which can't be right :)
 
yeah sounds like a nice piece of kit but as soon as a warez version comes out and everyone has it we will all be getting haacked or attempted to be hacked.

i just hope it can determine genuine hack attempts than just bouncing traffic

but i agree it is just legalized hacking but i guess we will have to just wait and see as i know we will all want to try it lol
 
Hope that there never is a warez version of that, but knowing the scene for many years it won't be long until some group gets its fingers on and then it takes a couple of hours until it's distributed through all major release channels.

Once that is done, it might take a week until all those script kids that play around with SubSeven and stuff like that have their fingers on that piece of software and start torturing other people's PCs. On top of that, according to the description of that software you will be able to trace your victim whereever it goes on the net, thanks to those lovely tags the software leaves.......
 
Back
Top