{"id":2393,"date":"2014-08-18T18:18:49","date_gmt":"2014-08-18T18:18:49","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2393"},"modified":"2020-02-26T10:54:42","modified_gmt":"2020-02-26T15:54:42","slug":"high-tech-crimes-not-too-high-after-all","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/high-tech-crimes-not-too-high-after-all\/2393\/","title":{"rendered":"High-tech crimes: not too &#8220;high&#8221; after all"},"content":{"rendered":"<p>High-tech crime. A popular term used in mass media, by law enforcement agencies, and occasionally elsewhere to describe crimes committed via electronic devices \u2013 computers, Web, etc. However, the only thing that makes most of these crimes \u201chi-tech,\u201d is the tool used to commit them. Sometimes the level of sophistication renders these crimes high-tech as well. However, the goals are almost never high-tech, but are mostly the same \u2013 to steal something and get away with it, preferably undetected.<\/p>\n<p>A few weeks ago The Verge <a href=\"http:\/\/www.theverge.com\/2014\/8\/4\/5968243\/mit-turns-recorded-vibrations-back-into-speech-and-music\" target=\"_blank\" rel=\"noopener nofollow\">ran an article<\/a> on how MIT researchers were able to reconstruct speech through soundproof glass by watching plants. Since sound waves propagate with air, they incite minuscule wobbles on the plants\u2019 leaves; by using a highly sensitive camera, scientists could \u201ceavesdrop\u201d on people behind the soundproof barrier, without actually seeing or hearing the people themselves.<\/p>\n<p>That definitely makes plants in a sound-insulated room <em>an information security problem<\/em>. Sort of.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#High-tech crimes: not too \u201chigh\u201d after all #security, #protectmybiz, #enterprisesec, #cybercrime<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F46Ss&amp;text=%23High-tech+crimes%3A+not+too+%26%238220%3Bhigh%26%238221%3B+after+all+%23security%2C+%23protectmybiz%2C+%23enterprisesec%2C+%23cybercrime+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Well, isn\u2019t it a balderdash \u2013 a chatty geranium giving out your secrets? You bet. But in fact, someone with highly sensitive hardware can truly read what you speak, watching the flowers on your windowsill. The question is only how difficult would it be to exploit this \u201cvulnerability\u201d and is there not any other, more mundane, and simple-to-execute way to eavesdrop on you? For example, wire tapping.<\/p>\n<p>Interestingly, \u201cwatching the flowers\u201d would be really hi-tech (of sorts, again), while wiretapping is considered \u201cnot so high-tech.\u201d So, what is the difference? The answer is, wiretapping is just not exotic enough.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020130\/wide2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2395\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020130\/wide2.png\" alt=\"wide2\" width=\"1000\" height=\"725\"><\/a><\/p>\n<p>Let us recall <a href=\"https:\/\/securelist.com\/blog\/research\/65367\/the-echo-of-stuxnet-surprising-findings-in-the-windows-exploits-landscape\/\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a>, <a href=\"https:\/\/securelist.com\/blog\/incidents\/34344\/the-flame-questions-and-answers-51\/\" target=\"_blank\" rel=\"noopener\">Flame<\/a> and other high-tech \u201cweapons.\u201d High-tech? Definitely. The people that wrote Stuxnet were <em>almost<\/em> geniuses; almost, because they made a mistake that eventually exposed Stuxnet to the world. Had they not made that mistake, this worm would have stayed \u201cbehind the scenes\u201d for good and the Pandora\u2019s box that Stuxnet opened would have stayed closed for a short while more.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Stuxnet authors were geniuses. Well, almost. #cybersecurity, #protectmybiz, #stuxnet<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F46Ss&amp;text=Stuxnet+authors+were+geniuses.+Well%2C+almost.+%23cybersecurity%2C+%23protectmybiz%2C+%23stuxnet\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Then there was Flame, Miniflame, Duqu, Miniduke, and \u2013 well, you name them. Kaspersky Lab and other security vendors discover new APT campaigns on a disturbingly ad<\/p>\n<p>regular basis. Some of them even appear to precede Stuxnet by a few years.<\/p>\n<p>Their initial authors are <em>really good<\/em> at what they do, even though <em>what <\/em>they do is plain <em>evil<\/em>. More and more often, researchers detect modules, which have already been used by someone else, in the \u201cnewer\u201d APT malware. Therefore, these new cyber-espionage tools prove to be not built from scratch at all, but rather, largely assembled from pre-existing parts.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-2396\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06042219\/wide11.png\" alt=\"wide1\" width=\"1000\" height=\"667\"><\/p>\n<p>Should we call the crimes committed with that malware \u201chigh-tech\u201d then? Probably yes, but only because these tools require some intellectual effort to be used, as opposed to purely running off of malice, greed, and pathologic cunning (and the knowledge of where to download your next Miniduke-like Trojan).<\/p>\n<p>Ultimately, criminals using high-tech tools usually pursue extremely \u201cnon-high-tech\u201d goals: to steal. To rob. To eavesdrop. In rare occasions \u2013 to kill someone or sabotage something. Though the Earth spins in the same way for millennia, crime does not change much. It\u2019s all about picking locks, sneaking in, stealing troves, and getting away unseen and unheard. How mundane.<\/p>\n<p>The picklock used may be neutron-magnetic, with exchangeable multidimensional heads \u2013 utterly sophisticated. But let\u2019s face it: the locks it is used against are, in most cases, <em>not<\/em> five-dimensional cross-phasing labyrinths, therefore, hardly presenting much of a challenge. Even today\u2019s most mature software is riddledwith vulnerabilities, even if it is built from the ground up on a security-in-mind paradigm; its defenses are mostly very penetrable. Furthermore, there are errors in <a href=\"https:\/\/business.kaspersky.com\/can-we-beat-social-engineering\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201chuman hardware\u201d<\/a> too: a cybercriminal doesn\u2019t actually need to be much of a \u201ccyber\u201d to \u201csocial-engineer\u201d some average user into releasing sensitive information. <a href=\"http:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\" target=\"_blank\" rel=\"noopener nofollow\">Kevin Mitnick\u2019s old \u201cachievements\u201d prove it.<\/a><\/p>\n<p>Even if the tools are very sophisticated, you should not overestimate their operators. Thieves may show a huge prowess in using sci-fi-like picklocks, but ultimately, they are still mere thieves, and their goals are as ordinary as they have been throughout human history.<\/p>\n<p>A good example here is a derogatory term, \u201cscript-kiddie,\u201d which became popular a few years ago, most likely because it is exceedingly accurate\u2014think of a \u2018kid\u2019 that uses a downloaded malware written by someone else in order to wreak havoc at some weak, vulnerable server. The server\u2019s owners then may complain of \u201ccyber-terrorism,\u201d but actually that \u201cterrorist\u201d has merely picked up a stone and thrown it through a glass window. \u00a0Later, though, that \u201cstone\u201d may grow its own thin spidery legs and hop behind the lockers. However, it is not the \u2018kid\u2019 who has constructed it that way. He merely picked it up somewhere.<\/p>\n<p>The moral of the story? Businesses, watch out. The first thing your cybersecurity should start with is the following questions:<\/p>\n<ul>\n<li>What might criminals be interested in? (hint: money and any sensitive data).<\/li>\n<li>How can they access it? (hint: via digital software and \u201chuman hardware\u201d vulnerabilities).<\/li>\n<li>The way to kick them off? \u2013 Use data protection tools that would close the vulnerabilities and make all picklocks useless\u2014even the most \u201cmultidimensional\u201d ones.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>High-tech crime sounds impressive, but actually the tools are the only somewhat high-tech part, the goals almost never are.<\/p>\n","protected":false},"author":209,"featured_media":15903,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[94,321],"class_list":{"0":"post-2393","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-crime","10":"tag-technology"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/high-tech-crimes-not-too-high-after-all\/2393\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/high-tech-crimes-not-too-high-after-all\/2393\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/high-tech-crimes-not-too-high-after-all\/2393\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/crime\/","name":"crime"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2393"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2393\/revisions"}],"predecessor-version":[{"id":33286,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2393\/revisions\/33286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15903"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}