Beyond Bond and Holmes

by James C
Summary:

Working in partnership with the FBI, Scotland Yard had arrested two men charged with cybercrime. The two were thought to be members of Anonymous and LulzSec, hacktivist groups. The cybercrime arrests included charges of performing and/or engaging in denial-of-service attacks and computer intrusion. The arrests came about from a trace of packets that led authorities to the source of the sender. The flaw of the intruder’s tool Low Orbit Ion Cannon, LOIC, has led the hacktivist group to create a new tool for intrusion called RefRef. This new tool is built on the JavaScript scripting language. It is designed to utilize the resources of the target destination by first penetrating its system and exploiting a known vulnerability through SQL injection. This type of intrusion has already been used as a personal vendetta towards the popular Wikileaks website.

Reflections:

The use of SQL injection attacks to penetrate and exploit company systems is second to denial-of-service attacks, but much more damaging to companies due to the loss or damage of vital data. The inception of hacktivist groups are no surprise to the world of cybercrime. The old saying “There’s power in number” completely applies in this instance. The minds of old and new have combined to keep many companies and law enforcements continuously for new methods of attacks.

In some aspects this new is good for incoming CIS students, knowing that the field is continuous in need of up-to-date personnel. So students coming out of college can expect to be tested from day one. On the flip side, this news also lends to idea that to be competitive in this field students must also continuously update themselves of new and upcoming technology changes.

Citations:

Schwartz, M. (2011). Scotland yard arrests LulzSec, anonymous suspects.

Informationweek – Online, (19383371), n/a. Retrieved from

http://search.proquest.com/docview/887137202?accountid=10357

 

1 thought on “Beyond Bond and Holmes”

  1. its good to know that there will be a need for us after we graduate since creativity is limitless in the huan mind. SQL injection is interesting and im curious to know more about how it really works and if there is anything you can do to minimize the damage after an attack.

Comments are closed.