Return-Path: <sentto-279987-3653-1004490722-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 17:13:07 -0800 (PST) Received: (qmail 30309 invoked by uid 510); 31 Oct 2001 01:11:19 -0000 Received: from n8.groups.yahoo.com (216.115.96.58) by 204.181.12.215 with SMTP; 31 Oct 2001 01:11:19 -0000 X-eGroups-Return: sentto-279987-3653-1004490722-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n8.groups.yahoo.com with NNFMP; 31 Oct 2001 01:12:02 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 31 Oct 2001 01:12:01 -0000 Received: (qmail 78761 invoked from network); 31 Oct 2001 01:12:01 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 31 Oct 2001 01:12:01 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 31 Oct 2001 01:12:01 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9V1C7609058 for iwar@onelist.com; Tue, 30 Oct 2001 17:12:07 -0800 Message-Id: <200110310112.f9V1C7609058@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 30 Oct 2001 17:12:07 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Why.Are.There.No.Rich.Hackers?] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Why Are There No Rich Hackers? By Jay Lyman, www.NewsFactor.com, 10/30/2001 <a href="http://www.ecommercetimes.com/perl/story/14460.html">http://www.ecommercetimes.com/perl/story/14460.html> Analysts say many hackers do get paid, but usually for legitimate work, such as penetration testing for corporate clients. People make ideas happen. Smart people who innovate, working with smart people who execute. People who get it. People who get it done. To get vital information from IBM on e-business execution with 12 white papers to choose from click here. Many hackers and crackers evolve from breaking into computer systems to protecting them, working in the security industry and going legitimate to make a living at their science. But what about those who choose to join the Dark Side? So-called "bad" hackers have tried to profit from efforts like creating a spamming trojan, which combines a self-propagating computer virus with unsolicited e-mail known as spam, or by selling security exploits or using them for blackmail. But experts say that hackers are not likely to cash in from code, adding that they would be forced to work with unscrupulous partners to get paid and would face the prospect of prosecution. To compound the risk, passage of a new antiterrorism law has increased police surveillance powers as well as potential punishments for terrorists and their associates. Malware for Money? Antivirus experts say that malware -- malicious code -- exists that is capable of spreading like a computer worm and directing infected machines to specific Internet Web sites or e-mail boxes -- for a price per "hit." "You could have someone take 100,000 machines and make them all go to this site and pick up points for having all these machines go there," McAfee fellow at Network Associates Jimmy Kuo told NewsFactor Network. "It hasn't happened, but there has been code that exists in viruses that could set it up." However, Kuo and other experts say that while technically possible, the other factors involved in profiting from such a scheme -- collecting payment but avoiding detection and prosecution -- make it nearly impossible. "The chances of it actually working and the guy making money are very unlikely," Kuo said. Selling Exploits Another recent issue involves the creation of an exploitive code and an offer to sell it, which is unlikely to work because information gets out on the Internet, according to SecurityFocus incident analyst Ryan Russell. "Certainly, whoever wrote [the exploit] has a right to charge for it, but I don't think it's going to fly," Russell told NewsFactor. "I just don't think the mechanism they're trying to do it with is feasible. Ultimately, these things are fairly difficult to keep secret." Russell said blackmail of a software vendor or security firm to keep a vulnerability or exploit quiet may be more likely, but the same openness of the Web combined with criminal penalties decrease the chances of that succeeding. Welcome Or Not? Echoing other experts, Russell said many hackers do get paid, but usually for legitimate work, such as penetration testing for corporate clients. "In and amongst the security companies, the CTOs (chief technology officers) and chief hackers within that space are all from the ex-hacker community," Kuo said. "They all have pseudonyms and are known for their hacking capabilities." However, some hackers -- specifically virus writers -- are not welcome in the antivirus community, according to Kuo. "Once a virus is out there it can't be reclaimed, so we wouldn't ever hire a former virus writer because the damage from a virus is never-ending," he said. Bigger Penalties Now Kuo, who referred to cybercrime schemes that the Federal Bureau of Investigation has logged online, predicted that the antiterrorism law approved last week will have a chilling effect on hackers and malware makers. "The antiterrorism act will put defacement out there in the minds of these people," Kuo said, adding that selling an exploit to the wrong person could result in a lifelong prison term. "This law will have serious impact on these people and what they're trying to do." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST