{"id":15101,"date":"2015-09-16T11:53:27","date_gmt":"2015-09-16T11:53:27","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4552"},"modified":"2019-11-15T07:01:57","modified_gmt":"2019-11-15T12:01:57","slug":"hacking-back-i","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacking-back-i\/15101\/","title":{"rendered":"The Four Biggest Problems with &#8220;Hacking Back&#8221;"},"content":{"rendered":"<p>Call it retribution, justice, or just plain revenge: few films are as satisfying as when the bad guy (or gal) gets what they deserve in the end. \u00a0But vigilante movies are about as close as most law abiding citizens get to meting out justice. Civilized countries like ours have convinced citizens <em>not<\/em> to take matters in their own hands: we\u2019re supposed to let the police and the FBI do that.<\/p>\n<p>The underlying assumption is that we believe law enforcement has the resources to be effective on our behalf.\u00a0 When we have such confidence, most citizens will leave their guns at home and let the cops \u201cattack back\u201d criminals as necessary.<\/p>\n<p>Enter cybercrime, where we now see more malicious software in a day than we saw in all of the year 2006. And according our best estimates, hackers are harming the US to the tune of at least $250 billion a year. Even without Internet of Things, there are <a href=\"http:\/\/blog.kaseya.com\/blog\/2015\/04\/23\/extreme-emergency-helping-america-win-cybersecurity-fight\/\" target=\"_blank\" rel=\"noopener nofollow\">over a 1 billion entry points<\/a> for malware among the internet-connected devices we use every day in the US. Does it surprise anyone that our government doesn\u2019t have the resources to deal with it? At least one commission has called for legislators to help victims by legalizing the right to hack-back because companies who \u201c<a href=\"http:\/\/www.ipcommission.org\/report\/IP_Commission_Report_052213.pdf\" target=\"_blank\" rel=\"noopener nofollow\">experience cyber theft ought to be able to retrieve their electronic files<\/a>\u201c. (An absurd concept in the world of cyber, but we\u2019ll get to that later.)<\/p>\n<p>However, before we all go out and buy a copy of <a href=\"http:\/\/www.amazon.com\/Hacking-For-Dummies-Kevin-Beaver\/dp\/1118380932\" target=\"_blank\" rel=\"noopener nofollow\">Hacking for Dummies<\/a> or hire teams of hacker hitmen <a href=\"http:\/\/www.computersciencedegreehub.com\/10-notorious-female-hackers\/\" target=\"_blank\" rel=\"noopener nofollow\">and women<\/a> to defend us, let\u2019s consider three things about cyberattack which make it special.\u00a0 In fact, these traits make the cyber domain <em>so<\/em> different that our own military cyber command are known to have <a href=\"http:\/\/www.amazon.com\/Fierce-Domain-Conflict-Cyberspace-1986\/dp\/098932740X\" target=\"_blank\" rel=\"noopener nofollow\">big blind spots <\/a>in the realm: much as we\u2019d like it to be just like the four other domains (land, sea, air, space) in which US technology dominates, cyber is actually radically different.\u00a0 This topic is the subject of <a href=\"http:\/\/www.amazon.com\/Fifth-Dimensional-Operations-Space-Time-Cyber-War-\/dp\/1491738723\/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1440543864&amp;sr=1-1&amp;keywords=fifth+dimensional+operations+space-time-cyber\" target=\"_blank\" rel=\"noopener nofollow\">whole dissertations and books<\/a>, but to be brief, here are four of the top reasons that cyberattacks are special:<\/p>\n<ol>\n<li>Attackers can remain anonymous forever<\/li>\n<li>Cyber attacks are asymmetric: a single hacker is capable of successfully destroying an entire company<\/li>\n<li>It\u2019s cheap and easy for hackers to regroup almost anywhere, anytime, even if their systems are physically destroyed<\/li>\n<li>Organized crime has enthusiastically embraced cybercrime (i.e., don\u2019t expect them to play nice)<\/li>\n<\/ol>\n<p>Let\u2019s consider a physical crime analogy: you\u2019re relaxing in your backyard alone on a lovely weekend day.\u00a0 Suddenly someone starts lobbing water balloons full of paint over the fence, splattering everything in sight.\u00a0 You\u2019re pretty sure it\u2019s the neighbor kid, since this would be a logical escalation to the feud you\u2019ve been having over parking spaces.\u00a0 Property destruction is definitely crossing the line, so you indignantly march around the corner with your cell phone camera, intent on catching him in the act.\u00a0 Only it\u2019s not him.\u00a0 It\u2019s a gang of guys in masks and SWAT gear and now they have their weapons trained on you. You\u2019re outgunned, with nowhere to run and nowhere to hide.<\/p>\n<p>This scenario plays out all the time in cybersecurity.\u00a0 Behind many attacks are nation-states trying to steal secrets, and sometimes they hire cyber-mercenaries or organized crime to do their dirty work.\u00a0 Every few years we see hacker aggression in action when <a href=\"http:\/\/krebsonsecurity.com\/2015\/08\/how-not-to-start-an-encryption-company\/\" target=\"_blank\" rel=\"noopener nofollow\">a new CEO tries to grab headlines<\/a> by saying their product can defeat hackers.\u00a0 In spite of all the history which tells us exactly what will happen next, our noob CEO will be surprised to be mercilessly hacked.\u00a0 In another example, executives at an Israeli cybersecurity company claimed they could defeat hackers.\u00a0 In addition to being cyber attacked, they received photos of their children as a warning of what they had to lose.\u00a0 The dark forces cloaked by the internet may not seem entirely \u201creal\u201d but it\u2019s not child\u2019s play to mess with them: R.I.P., companies who dare.<\/p>\n<p>Granted, hacking-back someone who attacked you is somewhat different than boasting of one\u2019s invulnerability. The motives of a victim are different \u2013 in fact there are six different motives which inspire hack-backs.\u00a0 But is it ever in the interest of a company to take this route? Is there a legitimate ROI to do so? My next blog will look at the six justifications along with eight rules to make it work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call it retribution, justice, or just plain revenge: few films are as satisfying as when the bad guy (or gal) gets what they deserve in the end. \u00a0But vigilante movies<\/p>\n","protected":false},"author":392,"featured_media":15570,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[77,282],"class_list":{"0":"post-15101","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybercrime","10":"tag-cybersecurity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-back-i\/15101\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-back-i\/9073\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-back-i\/15101\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacking-back-i\/15101\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybercrime\/","name":"cybercrime"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15101"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15101\/revisions"}],"predecessor-version":[{"id":30404,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15101\/revisions\/30404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15570"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}