comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
what it sounds like: two or more hackers combining their skills and<br />
resources to infiltrate a given node. It has to be a slow hack unless<br />
you want to just bust in, but it’s pretty effective. The problem with<br />
mass attacks is that once you’re inside the node, alliances tend to<br />
fall apart quickly—different hackers want different things, and they<br />
sometimes end up fighting each other and node security at the same<br />
time. Hey, you know what they say about trusting criminals …<br />
pHiSHing<br />
While hacking your way into a system is one way to gain access,<br />
it’s often loud and noisy—the Matrix equivalent of breaking<br />
the glass and reaching through the hole to unlock the door while<br />
hoping you haven’t set off any alarms. A quieter, stealthier way is<br />
to look under the mat for a key first—or in Matrix parlance, get<br />
a passcode and access a legitimate account. Getting passcodes or<br />
other personal data off of a mark is called phishing.<br />
When you go phishing you need a lure or bait—something to<br />
entice the mark or open up a line of dialogue with them. Common<br />
phishing lures include an online store or e-mailed offer. A false online<br />
store (also called a phishing trap) often acts just like a real one, displaying<br />
goods and then taking customer information—including their<br />
identities, contact numbers, and shipping addresses—so that you can<br />
deliver the product. Phishing lures can also include viruses and other<br />
malware that infect customers as they come in, a good way to snag<br />
passcodes. Trojans are particularly easy to use if you can disguise them<br />
as a “free trial offer” of a new AR software or something like that.<br />
> If you don’t mind the cost, the site can even be functional—I know<br />
one hacker that started out making an online organic jams distributor<br />
and made so much honest cred from passing traffic that she got<br />
out of hacking altogether. Of course, she had to apply for business<br />
licenses and the like.<br />
> Mr. Bonds<br />
E-mail phishing attempts (line casting) are often caught by<br />
spam filters or discarded out of hand because they don’t interest the<br />
mark. Personally, I like to combine the phishing lure and line casting<br />
by setting up a fake site geared toward the mark’s interests and<br />
then sending a coupon or introductory offer to them. Naturally, this<br />
requires some knowledge of the mark and their interests.<br />
> A phishing lure can also be used to set up a botnet; you just load a hidden<br />
bot on every “customer” that enters the node to browse or shop.<br />
> Glitch<br />
Once you have their personal and financial data (which pretty<br />
much means their SIN number and authorization on their online<br />
bank accounts), you can clean them out—which is where a lot of<br />
phishers get caught. It’s one thing to duplicate a charge for a meal and<br />
make it look like the restaurant deducted the cost twice, but it’s something<br />
else again to blow somebody’s life savings on a piece of gear and<br />
then have it mailed to you. Keep in mind that any online purchases<br />
you make can be tracked back to you. Smart phishers will siphon off<br />
some cred to a certified credstick and then disappear with it.<br />
More sophisticated phishers target megacorps and financial<br />
institutions, often using a lot of social engineering to masquerade<br />
as someone who would legitimately have access to the (usually very<br />
well protected) personal or financial data. Theoretically you could<br />
Unwired<br />
set up a bank or other financial institution as a big phishing lure,<br />
but I’ve never heard of anyone that managed it.<br />
> It’s difficult to pull off because banks, credit unions, and non-bank<br />
financial service institutions have a lot of regulations, even in the most<br />
unregulated parts of the world (I’m looking at you, Carib League). Still,<br />
more than a few venerable financial institutions began as phishing<br />
lures until the owners and operators realized they could milk ten or a<br />
hundred times more nuyen out of a steady clientele than they could<br />
ever take from a single megacorp. And then there’s the handful of<br />
orgs that were bought out by the Mafia and the Yakuza.<br />
> Mr. Bonds<br />
deniaL of Service<br />
Denial of Service (DOS) attacks are proof that ancient hacker<br />
philosophy never goes out of style (though it may fall behind the<br />
tech curve). DOS attacks are about locking a user out of their commlink<br />
or terminal, or more often preventing a node or commlink<br />
from accessing the rest of the Matrix by flooding it with incoming<br />
connections. The how and the why might change each time, but<br />
the basic goal is the same—denying someone Matrix service.<br />
The key to most DOS attacks is overloading the target with<br />
traffic, with botnets being the weapon of choice. A hacker with<br />
a big enough botnet can inundate the target with data requests,<br />
connection requests, and other forged signals, locking out other<br />
incoming traffic. Spiders and IC can try to filter out the bot traffic<br />
or spoof their node’s access ID, but sheer numbers usually swing<br />
things in the botnet’s favor.<br />
A DOS attack on a commlink is a little more difficult, because<br />
you first have to perform a successful trace on the target icon; you<br />
can also lock someone out of their commlink or node with a little<br />
judicious editing of the connection filters, cutting them off from<br />
practically the entire Matrix. If you have the time and skill to mess<br />
with the accounts, you could even change all of the passcodes to<br />
keep the legitimate information technology personnel from fixing<br />
the problem right away.<br />
Of course, anything else that prevents people from accessing<br />
the target works too—crashing the operating system on a<br />
node, physical damage to a key server or optical trunk that supports<br />
traffic in and out of the node, switching the node to hidden<br />
mode—anything your dirty, clever little minds can think of.<br />
> I had a job a couple months back where my group was hired to do a<br />
24-hour DOS attack against the node of a corp that was going to release<br />
a new product online that day, but our hacker gal got sick and couldn’t<br />
perform. Ended up having to cut the optical trunk and aim a HERF rifle<br />
at it all day. Then the punks tried to switch to a satlink, and I ended up<br />
blowing that up with a missile! So much for a nice, quiet Matrix job.<br />
> Beaker<br />
ranSoMware<br />
By itself, a DOS attack is normally a means to an end, not an end<br />
in and of itself. Script kiddies may get their jollies locking some poor<br />
bastard out of his home terminal so he can’t turn in his homework<br />
or show up in his virtual classroom, but more often than not a DOS<br />
attack is part of the growing Matrix-based extortion phenomena.<br />
The idea behind Matrix extortion is simple: individuals, corporations,<br />
even governments need access to the Matrix and certain files.<br />
Simon Wentworth (order #1132857) 9<br />
89<br />
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .