Fancy Bear Goes Phishing by Scott J. Shapiro
Author:Scott J. Shapiro
Language: eng
Format: epub
Publisher: Farrar, Straus and Giroux
Whatâs Their Game?
The Russian government denied responsibility. When asked about the attacks in September, Vladimir Putin answered with a smirk and raised eyebrow, âNo, I donât know anything about that. You know how many hackers there are today?â Putin was insinuating that the DNC hacks were a false-flag operationâdesigned by non-Russian hackers to make it appear as though Russian intelligence was responsible.
Is there any validity in Putinâs accusation? In a sense, yes. As Descartes showed, skepticism is cheap and easy. Descartes began his philosophy by doubting that the world exists. He wondered whether an evil genie was hacking his mind, making him believe that the external world exists when it does not. The modern version of this skepticism is represented by the movie The Matrix. How do we know that we are not brains in a vat being tricked into believing that a computer simulation is the real world so as to keep us docile and producing energy for alien creatures? If thatâs possible, then itâs possible that the DNC was hacked by someone other than Russian intelligence.
Cartesian skepticism is a priori, meaning that it is not based on evidence. Descartes had no data to suggest that he was dreaming or that an evil genie was hacking his mind. It was just a bare possibility. Putinâs skepticism is similarly evidence-free. All the technical indicators we have examined in this caseâthe identical Bitcoin wallets to buy domain names and rent proxy servers, the identical email addresses to rent proxy servers and shorten URLs, the matching C2 IP addresses and security certificates for the German and DNC hacks, the Russian hacker signature in source code, the Russian version of Microsoft Word used to view the documents, the Cyrillic metadata, the Russian error messagesâall point to the GRU. None point anywhere else. The sudden appearance of the Romanian Guccifer 2.0 was a laughable cover story.
Consider the nineteen thousand Bitly links found by Secureworks. There are two possibilities: (1) a mysterious group did Fancy Bearâs arduous and sensitive job for a year so that it could later hack the DNC and blame Fancy Bear for it; (2) Fancy Bear did Fancy Bearâs job. If you think that the first possibility is plausible, you have a bright future in academic philosophy.
Despite the overwhelming evidence, one party conspicuously did not make an attribution determination: the US government. For Hillary Clinton, the silence was deafening. All through the summer, she had been trying to turn the hacks to her advantage by claiming that Russia attacked the DNC to help her opponent. In the presidential debates, Clinton would go so far as accusing Donald Trump of being âPutinâs puppet.â President Putin would vastly prefer an accommodating President Trump to an implacable President Clinton. (Trump denied the allegation: âNo puppet. No puppet. Youâre the puppet.â) But Clintonâs argument was hard to make when the U.S. government was unwilling to confirm her accusations. Why wasnât the director of national intelligence holding a press conference calling out a foreign power for
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6426)
Kotlin in Action by Dmitry Jemerov(5076)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3860)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3093)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2615)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2367)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2276)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2268)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2083)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2007)
