"Mom, I'm a hacker": how fighters of the invisible front of the XXI century appear

29
"Mom, I'm a hacker": how fighters of the invisible front of the XXI century appear

In 2013, the world learned about the fugitive Edward Snowden, who revealed the fact of comprehensive surveillance, which caused a strong reaction around the world. The authorities of many countries expressed their intention to “do something”, but this “something” turned out to be absolutely not a trial, suppression and punishment in the execution of the ECtHR or the court of The Hague. In fact, the exposure of Edward led to wholesale automation in all the leading intelligence agencies of the world, as well as the legalization of the collection of information about people.

Today we live in a world that hasn't changed in the way that Edward imagined, and targeted advertising, the protection of "personal information" and database leaks no longer surprise anyone.



hacker competition


In 1993, the first major hacker conference was born, located in Las Vegas, Nevada. The name was chosen symbolically - DEF CON, which literally refers to the name of the readiness scale of the armed forces of the United States of America. The majority of listeners and participants of the conference are information security specialists, journalists, lawyers, civil servants, as well as hackers of various specializations.

Over time, the conference has turned from a place for the exchange of experience and employment into one of the most prestigious venues for competitions. There are many disciplines, although everything started with a banal "capture the flag" (CTF). Surely, a crowd of schoolchildren in a computer class playing a game immediately appears in my head, but this is a little different.


Initially, the teams simply competed in hacking the target (laptop, server, access) for speed, not forgetting to attack the enemy in parallel. Subsequently, the whole process was overgrown with additional disciplines, for the implementation of which participants receive points:

1. Reverse - parsing a binary code consisting of ones and zeros and searching for vulnerabilities.

2. Feat - Finding and exploiting vulnerabilities.

3. Website - web security tasks.

4. Cryptocurrency – study and search for weaknesses of cryptographic algorithms. In simple terms, breaking a cipher is akin to breaking an Enigma.

5. Stegano - extraction of often encrypted, hidden information from the source file.

6. Forensic – investigation simulation and file analysis. These are tasks related to recovering deleted files and hidden partitions. Viruses or databases are often analyzed.

7. PPC (Professional Programming and Coding) - applied programming.

8. Misc - "non-standard" tasks like competitive intelligence or entertainment.

Competitions have long become international, and smaller variations are regularly held here in Russia. Some of them become a pass to Las Vegas. At the time of this writing, teams under our flag occupy 3rd, 8th, 23rd and 40th places in the international arena from the top 50 I have watched. Unfortunately, neither the successes in this direction, nor the ongoing activities at the national level are practically covered.

By the way, in 2018, China banned its information security experts from participating in international competitions. This despite the fact that teams from China were among the strongest.


Hunt for a hacker


For the first time in the USSR, Avtovaz was subjected to a documented hacker attack with the capture of the culprit in 1983. Of course, by today's standards, this incident is more likely to be sabotage, but a computer maintenance programmer disrupted the pipeline for 3 days.

During the investigation, it turned out that this was far from the first case, but other programmers who deliberately disrupted the work themselves eliminated the problem and received bonuses, awards and allowances for this. Nevertheless, even for 3 days of downtime, damage was caused in millions of rubles, and in 1983 it was a completely different value of money.

One of the first convicted hackers in the United States was Kevin Mitnick, who exploited phone network vulnerabilities at the age of 12. Subsequently, he received several more terms, including for hacking the Pentagon network.

One of the most elusive hackers to be identified is Russian Evgeny Bogachev. A talented programmer, entrepreneur and leader, Evgeny first created the Zeus virus and then began selling it to other hackers, providing them with technical and informational support.

The end result is a real high-end product, and there is a $3 million reward for information about Yevgeny's whereabouts.


In most cases, hackers and their groups pursue the goals of banal enrichment, but there are also those who interfere in both the domestic and foreign policies of countries. The United States still accuses Russia of interfering in the 2016 elections, when the servers of the US Democratic Party and the Democratic Party Congressional Committee were attacked. During the attack, additional information surfaced about the terrorist attacks on the US consulate in Benghazi in 2012.

In 2020, hackers from the Anonymous group attacked US law enforcement and intelligence networks. The result was 269 gigabytes of classified data, as well as planning and intelligence documents over the past ten years. Including those that confirmed the existence of surveillance of Black Lives Matter activists.

In general, such attacks, even on state structures, were limited to obtaining classified information. However, 2022 has shown that the opportunities here are much wider.

How did hackers return transit to the Kaliningrad region?


Since the beginning of the special military operation, cyberattacks have been used not only to steal data, for example, the spring drain of the Yandex.Food customer base, but also to deliberately disrupt the performance of government services.


For example, due to problems with transit to the Kaliningrad region, the Killnet group disrupted the operation of the Lithuanian analogue of Gosuslug for two days, the airport of the capital and two cities, the Central State Archive, the Supreme Administrative Court, the State Tax Inspectorate, the Seimas and the government of the country, the electronic declaration system , a large network of gas stations, the telecommunications company Telia Lietuva and a number of smaller companies.

Transit, as we know, was eventually returned. Of course, this is not the sole merit of hackers, but what is the scope? To carry out an attack of this magnitude against one of the countries that are members of the EU. Against whom after such a sanction to introduce?

In addition to Lithuania, Poland also got it. Almost all law enforcement websites, the tax service portal were disabled, and the work of eight Polish airports was paralyzed.

Conclusions


Nine years have passed from the moment when everyone found out about surveillance on the Internet to hacker attacks on the social structures of countries participating in armed conflicts. Considering that the Internet appeared only 50 years ago, events are developing rapidly.

Satellite constellations like Starlink, monitoring programs like DELTA, drones of varying complexity, nuclear power plants that are required to transmit data to the IAEA, airports with reservation and logistics systems, hospitals with digitized file cabinets, schools, backbone communication networks and local Internet providers, mobile operators - all this is connected to a single network, which is no longer possible isolate. It is enough to hack into the smartphone of a fairly high-ranking military man to get a great chance to learn something extremely important.

You don’t seriously think that Comrade General understands all these complexities like viruses, vulnerabilities, encryptions and wants to use an inconvenient secure “brick” instead of a familiar device?


How difficult is such a task for an experienced specialist, given how many of our compatriots become victims of scammers who do not even need to hack anything. Hanging tongue, ingenuity, social engineering skills - and voila! The “bank specialist” is already counting the profit.

Moreover, this is a threat of such a level that the state represented by the Ministry of Telecom and Mass Communications, the FSB, Roskomnadzor, the Central Bank, as well as telecom operators and banks have to fight it. News about a similar interdepartmental group appeared in September 2020.

Evaluate the success of the venture yourself.
29 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +2
    28 November 2022 05: 58
    Mom I want a hacker
    hacker digs deep
    makes a lot of money...
    Mom, I want a hacker.
    smile
    But seriously, a hacker is more of a calling... to create and hack a virtual world and find treasures of valuable information in it... one can only envy these guys.
    I tried to delve into this area, my brains boiled ... well, to hell with them ... to each his own.
    1. +1
      28 November 2022 07: 11
      I tried to dig in this area, the brains boiled ...

      Well, in the USSR this word appeared in the 90th year, just before the collapse. Together with "Leningradka" (a sort of copy of Sir Sinclair's Spectrum 1982 home PC)
      A small pamphlet "Hacker's Guide" was released, a completely competent description of the architecture of the machine and the subroutines of a primitive "OS". And before that, they got by with the usual word "programmer". Even Jordain does not have this word in the Russian edition (on IBM-PC, XT and AT) of the 89th year.
    2. +3
      28 November 2022 08: 40
      Quote: Lech from Android.
      But seriously, being a hacker is more of a calling...

      Hacking is a certain mindset. The ability to look at a problem from a non-standard angle and find a solution not described in any of the textbooks. In this sense, in terms of mindset, he is no different, for example, from brilliant physicists of the level of Newton, Kurchatov, Oppenheimer ... or chemists ... or mathematicians ..., in general, creators who can leave a mark on history.
      1. +1
        28 November 2022 10: 43
        Well, you will say now, there is nothing special in “hacking” that would be an obstacle for a more or less good programmer, the only question is ethical standards and interest. Especially when you consider that most attacks are associated with the incompetence of users and "lazy" or equally incompetent administrators.
        1. 0
          28 November 2022 11: 53
          Quote from: filibuster
          there is nothing special about "hacking"

          Depends on what you mean by "hacker". What I described refers to the word "hacker", and what most people understand by this term is called a "cracker" (cracker).

          Here is an example of a HACKER too laughing laughing laughing

          1. 0
            28 November 2022 22: 22
            Quote: Cube123
            Here is an example of a HACKER too
            Rather: "Packer / Unpacker" (live). I unpacked it myself, I packed it myself. In general, the specializations are a bit related, the same cryptography, for example, is the same for everyone, it’s just that the tool is often called differently. For example: cryptors / decryptors, but the essence is approximately the same - opened, did its job and closed it so that programmers would not stick their nose in there.
        2. +1
          28 November 2022 22: 05
          Quote from: filibuster
          there is nothing special in “hacking” that would be an obstacle for a more or less good programmer
          Everything is exactly the opposite, they have a motto:
          "Every hacker is a programmer, but not every programmer is a hacker." Of course, it's not about the motto, and even more so not about "ethical norms." Kubik123 absolutely correctly wrote: "Hacking is a certain mindset." That's right, there are many options for solving any problem, and a "trained" person will beat his head against the wall: brute force attacks (brute force), dictionary selection, etc. in short, "what they taught", and the hacker will simply apply "social engineering" (the same mindset).
          Z.Y. and here is another motto-saying very popular both in anchitata and in the crack club: "you can teach a fool to do anything, but you cannot teach him to be smart." That's why hackers don't do it. lol
          1. 0
            29 November 2022 12: 40
            and the hacker will simply apply "social engineering" (the same mindset).


            Everything is so, only this is a completely different kind of activity, deep knowledge of, say, network protocols, OS architecture, hardware is not needed here. The most “professional” hackers are in prisons and, it seems, still in Ukraine, and they present themselves either as the bank’s security service or as police officers and “hack into” systems.
            1. 0
              29 November 2022 15: 47
              Quote from: filibuster
              only this is a completely different kind of activity, deep knowledge of, say, network protocols, OS architecture, hardware is not needed here.
              This is a typical view of the problem from the side of a programmer, who sometimes needs 5-10 programs in which he sits all his life and looks at everything around him through the prism of "visual studio".
              And now a look from my bell tower (program localization). The teapot Vasya decided to do "Russification": he opened the .ini file in the notepad and wow, then off we go - resource editors - restaurateur, reshaker, pe-explorer, then passolo templates and multilizer. Then it was necessary to get into the source code and hexadecimal hex editors were already used, not all lines climbed, so the disassembler ida pro goes further, there are problems with crc-integrity and the debugger Olga has already been used. Of course, unpackers, packers, patchers, installers, etc. etc. The result is that you know several hundred tools inside and out and use them perfectly. And then - assembler and a direct road to WASM. And note: all this without the help of crackers from the crack-lab. Of course, they already own a large number of tools for working with software. We called them "senior comrades" or "ask for help from the club" (in especially difficult situations).
              In turn, for them, "senior comrades" are just hackers (not to be confused with coolhackers). These are already fluent in thousands of tools and different programming languages. Here is such a "pyramid" from my bell tower is seen.
              And yes, the same "social engineering" is just 1 tool among many thousands of others, which does not go separately. A typical example from my practice: the author of the program asks to protect it to the maximum. The simplest solution is to hang a fresh protector for a few thousand dollars, but ... this will not save him for a long time. Of course, I hang it, but at the same time I am conducting an advertising "PR presentation" of his creation ... pouring it into all the warezniks. Well, supposedly broken. In fact, I stupidly delete the nag-screen from it that it is trial and is blocked in a week. At the same time we change the version from v6.047 to v7.321. What for? according to the rules of all wareses, old versions cannot be uploaded to them. So they defended the program by the method of social engineering and at the same time sent everyone to the off-site to buy, and you: "another type of activity." It's all good when a complete package, and all individually - about nothing.
              1. 0
                29 November 2022 17: 17
                These are already fluent in thousands of tools and different programming languages.


                In one well-known anti-virus company, everyone who cannot write high-quality code in production or students are driven through virus analysts, so they sit and tinker with hex editors, disassemblers, study protectors, crackers, viruses, because I repeat for a good qualified system programmer there is no problems to write a ransomware, a virus, a program that exploits a vulnerability in a system, protocol, etc. But writing a product that will work for millions of users with different configurations, environments, etc. and bring money to the company is a completely different skill level.
                A separate type of “hackers” are specialists in cryptography, but this is closer to mathematics, we had a person who did not know how to program at all, with the exception of simple scripts in python and Fortran, but at the same time one of the strongest mathematicians in Russia in the field of number theory, discrete mathematics, combinatorics and was engaged in the analysis/development of crypto algorithms and crypto protocols.

                Of course, I hang it, but at the same time I am conducting an advertising "PR presentation" of his creation ... pouring it into all the varezniks. Well, supposedly broken


                This technique is a hundred years old in the afternoon and game publishers began to use it back in the distant 90s, clogging search indexers, forums, etc. with supposedly “cracked” games.
                1. 0
                  29 November 2022 18: 32
                  Quote from: filibuster
                  And write a product that will work for millions of users with different configurations, environments, etc.
                  In our area, those who paint in "Microsoft Visual Studio" were called "artistnicknames" (from the word bad) lol
                  All these configurations, updates of hardware, protocols, etc. go there automatically, and the results of work in various visuals have almost reached a logical dead end:
                  https://habr.com/ru/post/423889/
                  when I used to hammer the simplest html with a teapot, I dreamed about Adobe Dreamweaver, and when I got it, I looked at what it was doing inside and oh, horror! I still work only in text editors. And what do various document converters do, for example, which from 10kb are capable of creating 10mb of nonsense, which seems to be displayed on the screen, but ... I don’t need it for nothing.
  2. -4
    28 November 2022 06: 05
    There should be only one punishment for this brethren—separation of the head from the body. Otherwise, planes will start to fall, trains will hit each other in the forehead, etc. And someday one will launch combat missiles, deciding that he does not need such a world.
    1. +2
      28 November 2022 06: 38
      Quote: fiberboard
      There should be only one punishment for this brethren—separation of the head from the body.

      Slaughter the goose that lays the golden eggs
      ... belay by no means ... this is a waste of talent.
      On the contrary, these heads should be attracted in various ways for the benefit of the state.
      Take them all on a pencil ... create teams and give responsible and well-paid ambitious tasks to hack the servers of unfriendly countries, the Pentagon, Israel, Brussels, etc., etc.
      1. +3
        28 November 2022 07: 36
        Pencil them all... create teams

        There have been more fairy tales and myths inflated by the press lately. In fact, the level of such specialists is not at all "school" and not even "institute". This is a huge experience, for which a person pays with years of frantic work day and night. And for the labor costs that serious companies tumble in, even a thousand such specialists will not do a damn thing. Is that "from the inside" crawl through, and not at all with knowledge of programming.
        1. 0
          28 November 2022 10: 47
          In fact, the level of such specialists is not at all "school" and not even "institute".


          You continue to spread myths, in fact, the average level of hackers from a technical point of view is not the highest, the problem is that the technical level of users and administrators is low, here is a typical example of “hacking” Sapsan
          https://habr.com/ru/post/476034/
          This is what hackers exploit.
          1. +2
            28 November 2022 11: 35
            the problem is that the technical level of users and administrators is low,

            Well, then you really need a precise definition of who is meant by "hacker". A criminal who lured the card details from an old woman over the phone. Or scammers with a site clone. Or just a man behind his back, peeping the pin code .... wink Well, or a "higher" level, using ready-made tools and programs. They are scammers, not hackers. But the small one who can write a "trap" into the same disk interrupt vector, and through it the "claves" and take control from the working program - is another thing.
            1. 0
              28 November 2022 12: 09
              here is the little one who can write a "trap" into the same disk interrupt vector, and through it the "claves" and take control from the working program - that's another thing.


              What's so special about it? The task is not even for the average level of a system programmer, but rather for a student project. Even in Russia, there are thousands of programmers (at least until February 24) who write various drivers for Linux/Windows/Solaris/QNX CO, there are teams who develop OS and hypervisors (Kaspersky, Yandex, Fastwel, etc.).
      2. 0
        28 November 2022 10: 56
        Take them all on a pencil ... create teams and give responsible and well-paid ambitious tasks to hack the servers of unfriendly countries, the Pentagon, Israel, Brussels, etc., etc.


        And it is better to provide conditions for the development of the IT industry, so that startups would arise, companies that would create products that would be used on their servers by the Pentagon, Israel, etc. Look at whose products: databases, OS, mail servers, backup and replication systems, virtualization, etc. are used in our industry, the banking sector, the military-industrial complex, then it will immediately become clear exactly where this goose is laying the golden eggs.
  3. +2
    28 November 2022 06: 08
    It's better to be a hacker in Russia than an LGBTor in Europe. laughing
  4. 0
    28 November 2022 06: 40
    And William Gibson warned 40 years ago...
    1. -1
      28 November 2022 06: 58
      So the unforgettable Nostradamus warned hundreds of years ago... wake up... come to your senses, you damned ones... you will be punished in sin and blasphemy. smile
      1. +4
        28 November 2022 07: 19
        Do you know why Nostradamus is not very popular in Russia? Because "wang" is much easier than "nostradamus". For, as the Russian national hero said: "Long words upset me."
  5. +4
    28 November 2022 07: 13
    In a word, a hacker can be considered a kind of intellectual "tool". And on what hands this "instrument" will fall into and what tasks it will perform will depend on its further fate - either on a bunk for an indefinite period, or work for the benefit of the Fatherland.
  6. -1
    28 November 2022 07: 17
    Quote: rotmistr60
    And on what hands this "tool" will fall into and what tasks it will perform will depend on its further fate -

    Exactly and just like that. good
  7. +1
    28 November 2022 08: 21
    If you can't handle a threat, lead it.
  8. 0
    28 November 2022 10: 59
    Mr. General can be ordered, and he will carry KAMAZ behind him for communication, he will not go anywhere. here is another. You need to know who and what to order in order for computer security to become real. To do this, you need to understand at the same time the cunning twists of the mind of politicians and other big bosses, and on the other hand, you need to understand what to order from the inhabitants of the processor.
    And then translate to bosses and computer scientists. And make sure that neither one nor the other is carried away, relying on knowledge of both one part of the interactions and the other. Yes, and how to arrange for this person to be listened to. I personally can’t imagine who could carry out such communication at the heights of our unique power) Mr. Volodin is definitely not good)
  9. -1
    28 November 2022 11: 58
    Quote: dauria
    here is the little one who can write a "trap" into the same disk interrupt vector, and through it the "claves" and take control from the working program - that's another thing.

    what But....
  10. 0
    29 November 2022 11: 20
    - "And the beast that was, and which is not, is the eighth .." It looks like a number system, indicating the base. And if the Internet + hardware is the beast? Then there must be a more efficient and correct way of transmitting information and the prophet is false, because he knows about it, but hackers?
  11. 0
    29 November 2022 11: 59
    how many of our compatriots become victims of scammers

    Telephone scammers "work" on an industrial basis, hundreds and hundreds of call centers from Ukraine, call the population of the Russian Federation, take away apartments, savings, force them to take loans. It has become big business.
    I personally have already called 3 times, but I recognized them.
    Whoever has not been called yet, I advise you to type the request "phone scammers" on YouTube and listen to the videos so that you are not taken by surprise and have an idea about the scammers, since they have the same "scripts".