mattress inquirer
3 min readJun 13, 2022

--

Hackers and Their Methods of Operendi Don’t Always Give Them Away

Often hacker groups approaches to pin typically the crime on someone else. So, let’s claim you have 160 recognized hacking groups around the world, most are loosely affiliated. Plus, you include government and overseas military or cyber-spy commands perhaps including another 50 or even so to typically the mix, some really sophisticated. Not long ago, I actually was reading one hundred and fifty page research review on cyber safety measures, cyber warfare, hactivists, and criminal hackers. Okay so let’s take a talk for next shall we?

Among the chapters in the particular report suggested that it was easy to tell if a new hacking group was part of a state-sponsored cyber command, or perhaps just would-be Trusted Hackers for Hire hackers messing around because you could tell by way of a style and procedures. However, I would likely question this because cyber commands would likely be wise to cloak as hactivists, or even petty hacker young adults when seeking to break up into a system of a Corporation, or even government agency. In the mean time the report suggests how the hackers usually are that smart, and that they always use the same procedures of operandi, My partner and i completely disagree with this.

There might be some that do, but I actually bet most of them have many methods up their sleeve, and they can even purposely mimic the methodologies and strategies of other cracking groups to defend and hide their very own identities — in other words, mix it upward a little so they really don’t get trapped. Wouldn’t they, or even are we to be able to believe and believe hackers are stupid or something? That they aren’t, they’re certainly smart enough to be able to into nearly every single computer system on the earth, they have been busy splitting into everything in the last several years, these usually are stupid individuals instructions in fact, My partner and i wonder if anything is safe of sacred anymore?

Next, I’d like to explain that the regulators are busy selecting these hackers which have experience intended for their own safety computer needs. In the event that these hackers had been so na�ve plus stupid, then I doubt very much if the businesses, and government organizations will be hiring these people in the first place. Whereas typically the methods and tactics, as well since the tactics employed by various cyber-terrorist could at periods behave as a finger print, it may also end up being nothing more compared to a false positive or perhaps a disguise intentionally used to conceal their own hacking group.

Therefore, I actually thought it had been instead na�ve of that study paper, partially accomplished by a personal computer scientist, to also suggest such. Whether or not they were chatting in hindsight or even about how exactly things have got historically been throughout the past, I believe they might end up being missing something. Certainly some of the particular hackers that usually are perhaps wise enough to understand this strategy, or are nonetheless learning might make this sort of mistake to always use the identical methods, but My partner and i doubt that may be genuine for experienced cyber-terrorist.

Heck even chimpanzees, don’t always use typically the same methods as to not give away their intentions, so We thought humans understand this concept too. Of course, that is just my opinion after reading concerning 1000 pages last week of study reports on internet security. Indeed I am hoping you will remember to consider all this specific and think on it.

--

--