On 03/20/2013 01:59 PM, Amitai Franklin wrote:
> is this a true threat?

> http://www.thehackerspost.com/2013/03/opisrael-hacktivists-starting-cyber.html

Well, given that a high number of devices run *very* outdated and insecure
software, it is a threat to home-users and poorly maintained web-servers.

Expect servers running very outdated software (or very bad software, like IIS on
Windows Server) to be unavailable every once in a while.
This is annoying, but won't really hurt anyone. If the modern Jihadist puts his
focus on attacking through telecommunication networks -- that's GREAT!
- it will expose those individuals to the free internet and give them the chance
to educate themselves in something actually useful
- it will break the information monopoly inside terrorist organizations
- it is very unlikely to cause any real harm or damage to people (while it still
might cause economic damage)

DON'T BELIEVE MYTHS OF HACKERS MANAGING TO BLOW UP NUCLEAR FACILITIES REMOTELY!

These are very naive and stupid fantasies of the yellow-press -- fear sells.
Facilities which are that relevant for public safety are well guarded (i.e. not
connected to any public networks, workers are not allowed to bring their own
digital devices such as pen-drives, cameras, phones, ... anywhere close to it)
Remember, even for stuxnet, *actual physical access* was needed in order to
infect the control systems which were part of the Iranian nuclear program. (i.e.
social engineering is also very relevant here)

In terms of *real* security risks, i.e. damage besides just annoyance by DDoS, I
would not expect this to get very far for several reasons:
* nobody with a real clue is participating in it (the group names called here
are all rather new and probably mostly not very experienced windows kiddos)
* hate and aggression makes people act stupid and blunt -- not very helpful
character traits in these kind of activities
* this appears to be a political protest rather than an actual *intentional*
threat (this assumption might not hold to be true for all participants though).
they are fishing for attention and the global media provides it (and
unfortunately, we also do, right now...)
* despite the fact that anonymous-symbols are used (probably in order to win new
participants in the scene and look more important/impressive), there is no hint
of a wide backing for this campaign inside any community. don't forget that
there is no trademark/copyright/what-so-ever preventing me and you from using
the anonymous-mediakit today for our purposes :)
* there is not sufficient bandwidth and infrastructure in the likely-to-be-
originating networks. and even if they use botnets (maybe even inside Israel),
it will be easy to block the command&control centers.


> how do you think arig will coup with such attempts in the future?

Arig will not have to coup with such things :) They won't get there.
Why?
- we use up-to-date free open source software
- there is almost no attack surface -- we don't expose any services on any
public internet (apart from the Arig website)
- arig nodes are not centrally managed -- breaking into a single point will
never give administrative access to other points.
- arig users are likely to be more educated and therefore more aware of the
potential vulnerability of the systems they use (i.e. we don't use
InternetExplorer; many of us don't even run Windows at all; we all know a bit of
TCP/IP; ...)


I mainly see two real dangers here:

1. The media campaign can be abused to create a campaign for more "national
network security" inside Israel, i.e. the Ministry of Truth wants to make a
"national firewall" in order to "protect" you... This reaction is likely (i.e.
preparations are already ongoing for a while) and could impact the privacy of
Israeli surfers as well as limit free speech and/or access to information inside
Israel. I dislike the thought that the public attention to this childish game
could be abused to justify national NetNanny deployments (instead of running
more education programs for system administrators and refraining from using
obsoleted and closed-source systems, which could actually reduce the "threat")

2. There is indeed a high number of insecure and outdated devices on the ARPA
internet -- mostly in small businesses and private houses (but also in executive
offices of billion-$ companies). Self-updating devices which are also in the
focus of administrators and users are less likely to be targetted. But expect
home-routers, office-printers, IP-phones, NAS-systems, ... to be *very*
vulnerable and easy to target (especially if they run a never-updated
vendor-supplied proprietary firmware)
This could also affect administration and government offices, but again, those
networks are shielded from the outside by proper firewalls (hopefully), so
mainly small businesses and home users are the expected victims.

Some links to get the picture of the current "threat-level":

http://internetcensus2012.github.com/InternetCensus2012/paper.html

http://www.h-online.com/security/news/item/Professional-videoconferencing-system-as-a-spy-1824707.html

http://www.kb.cert.org/vuls/id/782451

http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html


And interesting side-node is that the expected DDoS attacks can be used to
generate some statistics and collect data about the participants in such an
attack :) For me, this sounds like the most interesting thing about it -- but in
a way, this data most probably also won't contain any major surprises.


_______________________________________________
arig-discuss mailing list
arig-discuss@lists.subsignal.org
https://lists.subsignal.org/mailman/listinfo/arig-discuss

Reply via email to