By: Jillian Stella, December 07, 2017 (15:29 PM)

Hack-Back Hooligans

You know that saying “do unto others as you would have them do unto you”?

Lately, companies haven’t been following this elementary principal.

Rather than focusing on their own growth, they’ve been too busy collecting intel on their competitors.

And by “they” I mean Uber.

Specifically, the company collected a multitude of intelligence after creating fake Lyft accounts.

Such intelligence included:

  1. The number of drivers and their locations: to distinguish where to place more drivers;
  2. Transportation fees for specific routes: to have lower costs than Lyft;
  3. Wages for Lyft drivers: to poach their own employees with better pay.

However, while Uber is perpetrated as the bad guys, many firms engage in hacking their competition as well.

And some firms go to even further extents, such as hiring hackers to break into their competition and cause disruption.

Or delay their opponent’s product development in order to beat it to the market.

Such hired hooligan hackers are known as the crypto-ransomware gangs.

The only solution for Uber and these fortune-500 companies would be this new bill that will allow companies hacker revenge.

With such bill, Uber can get all the dirt on those muggers that costed them over $100,000 and their reputation!

The Active Cyber Defense Certainty Act or ACDC would legalize counter attacks for companies to hack-back.

Some are skeptical because the vengeance may lead to aggressive counter-hacks.

Tom Graves argues that, “while DOJ and the FBI do great work, the number of cyberattacks far exceeds the government’s ability to respond, identify and prosecute criminals.”

Consequently, perhaps the Battle of the Crypto Gangs will be just what we need.

Jillian Stella

Jillian Stella is a recent graduate from the University at Albany where she obtained a Bachelor’s of Science degree in Digital Forensics. Jillian is a Security Analyst and Researcher at Cursive Security where she works with and performs assessment and response services for clients. She is currently conducting research in the area of cyber threat intelligence.

Be Informed. Stay One Step Ahead.

Sign up for our newsletter and stay up to date with the latest industry news, trends, and technologies