Wed, 22 Jun 2011

Black ops: how HBGary wrote backdoors for the government

Your tax dollars at work - writing rootkits! I'm sure the targets will always be "bad guys" ... with whatever working definition of "bad" happens to be currently in vogue with the government.

And slipping this stuff in via USB ports or Firewire (as mentioned in the article) is not the easiest way to get malware onto a system. The easiest way is to get the user to install it themselves, or better yet, sell them the system with the vuln built in. I wonder if anybody out there in the wide world might think of us as "bad guys"?

In 2009, HBGary had partnered with the Advanced Information Systems group of defense contractor General Dynamics to work on a project euphemistically known as "Task B." The team had a simple mission: slip a piece of stealth software onto a target laptop without the owner's knowledge.

(link) [Ars Technica]

/Politics | 0 writebacks | permanent link


comment...

 
Notes: If you put a <mailto:> link in the URL field your address will not be mangled: this could be a bad idea as your email address could be easily harvested by bots designed for SPAM. The comments field should now format correctly for line feeds and carriage returns: when you hit the 'Enter' or 'Return' keys in your comment it should break to a new line. The text should wrap cleanly. Please let me know if it doesn't. No HTML tags will pass through - entering links seems to be the main cause of comment SPAM. Also, please be sure that Javascript is enabled in your browser before attempting to post a writeback. Sorry for any inconvenience, but this really helps cut down on the amount of comment SPAM I have to deal with.
 
 Name:
 URL:(optional)
 Title: (optional)
 Comments:  
Save my Name and URL/Email for next time