Saturday, September 24, 2022

1.5.7 Cyber Warfare

Cyber Warfare. Hundreds of Cyber Security Industry Professionals say the next World War would be 1 of 2 possible wars, either Nuclear War or more likely Cyber War, the goal of Cyber Warfare is to cripple an opposing nation's Computer Networks and or Electrical Grid. Cyber Warfare is not always necessarily a term just for nation to nation war but also any ordinary Joe if they have programming experience and Penetration Testing experience they could easily get into a nation's or Industry Company's files for either black mail or to bring a country to a complete stand still. The most common way Cyber Warfare happens is a Distributed Denial of Service Attacks also commonly known as (DDoS). It is a process where a hacker sends hundreds of thousands of bot requests which floods the webpage to the point the website crashes. (Personal recollection and tandofline.com source)

A famous modern Cyber Warfare attack was a STUXNET worm which disrupted Iran's nuclear enrichment in 2010. Industry professionals after this stated, "The Era of Cyber Warfare has now really begun". In 2010. (ieeexplore.ieee.org source) STUXNET has become so sophisticated to the point it searches its targets only by looking for PLCs made by Siemens. PLCs are like the BIOs in computers. PLCs (Programmable Logic Controller) They are the interface between a program and machines such as a robotic arm which tells it what to do on an automated level. STUXNET Particularly looks for Seimens' WinCC/PCS 7 SCADA (Supervisory Control And Data Acquisitions) Software that runs on the PLC. STUXNET main goal is to take over control physical critical infrastructure. It waits for a specific command line from the PLC when it sees this command line it strikes to attempt to take control.

A few days ago, a 17-year-old kid not even graduated yet hacked into Rockstar Games and leaked Grand Theft Auto 6 and spoiled parts of the game that Rockstar has spent nearly 4 years in development. They found who hacked them and had them arrested. He also might be responsible for the recent Uber Hacks. Allegedly, he is part of a hacking group called "Laspus$". They allegedly target high profile digital intrusions in giant companies. The Grand Theft Auto 6 Leak is the largest video game leak in history. It contained 90 Video Files of early development footage. (For a pre-alpha build of a game in 2019 it looks way better than Grand Theft Auto 5 pre-alpha build). (kotaku.com source)

Hacker GIFs - Get the best GIF on GIPHY The Incredible Hack: Five of the worst on-screen hacking scenes | by  John-Paul Power | Threat Intel | MediumNcis Hacker GIF - NCIS Hacker Hacked - Discover & Share GIFs

Sources:

https://ieeexplore.ieee.org/abstract/document/5634434

https://www.tandfonline.com/doi/abs/10.1080/09636412.2013.816122

https://kotaku.com/gta-6-vi-hack-leaker-arrested-teenager-london-laspsus-1849573250

20 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. The 17-year old kid got some skills!

    I remember reading about Stuxnet years ago :-)

    Thank you for including your references, Connor ^_^

    ReplyDelete
  3. Your topic is very interesting. The clips you included go well with your topic. I wouldn’t want to mess with that 17-year-old.

    ReplyDelete
  4. Reminds of the movie The Core. The kid playing rat hacking into the governments Nuclear bombs. Great videos with the information.

    ReplyDelete
  5. Its crazy cause the movies that comes to my mind is HACKERS and WAR GAMES great movie. This is how I kind got curious/scared of computers. Those 2 movies was playing in my head reading your blog.

    ReplyDelete
  6. Thank you for sharing this Connor. I find this information so interesting. The story about STUXNET just blows my mind. And I think the government needs to give that 17 yr old a job - if he can do all that, we might as well put his expertise to use.

    ReplyDelete
  7. I really like the topic of your article. Cyberwar is everywhere, and cyber security and cyber hacking have never stopped!

    ReplyDelete
  8. Your topic definitely interesting. It's crazy that a 17 year old could hack into a big company and leak a part of a game that they have ben working on for four years.

    ReplyDelete
  9. Where is that 17 year old kid now? I want to hire him for my school work. Just kidding!

    ReplyDelete
  10. The first movie I remember watching regarding your topic is the 1983 movie "War Games", where Matthew Broderick (David Lightman) stars as a young computer genius. He unknowingly hacked into a military supercomputer and starts a war simulation and gets into all kinds of trouble. I highly recommend this movie.

    ReplyDelete
  11. Thank you for sharing, I just got hit with a knowledge bomb and am all the better for it.

    ReplyDelete
  12. The GTA 6 leak was the talk of the town with my friends. It was hard to believe at first, but the functions surely proved to be the real deal. Hackers are too smart.

    ReplyDelete
  13. Definitely gave me something to do more research on. Would be hilarious if Rockstar turns around and offers the teen a job.

    ReplyDelete
  14. Woah, that was a lot to process. 17 year old was able to do that? That is insane, I barely even know how to work a spreadsheet.

    ReplyDelete
  15. Its amazing what can be done when your young and have unlimited time to figure stuff out. Hacking a a major video game developer was the least of my worries at that age.

    ReplyDelete
  16. Crazy to think of how dangerous it really would be for countries to engage in large scale cyberwars.

    ReplyDelete
  17. Just imagining the harm that cyber warfare could do to one's nation demonstrates how egotistical our society has become.

    ReplyDelete
  18. America will go to war any time any place. Even if that place is the World Wide Web.

    ReplyDelete
  19. Wow, a 17-year old kid, these hackers are getting tough.

    ReplyDelete
  20. It's interesting you chose a clip from Independence Day, because one of the questions that some people had (those that understood how computers and operating systems work) was how were they able to interact with the alien systems with a laptop that obviously didn't have an interface compatible with alien technology.

    ReplyDelete