Companies Should Think About Hacking Back Legally, Attorney Says

  /     /     /  
Publicated : 22/11/2024   Category : security


Companies Should Think About Hacking Back Legally, Attorney Says


Fighting back against cybercriminals can be risky, but there are legal ways to do it, says Hacker Halted speaker



MIAMI -- Hacker Halted 2012 -- If youre so frustrated with hackers that youre thinking about hitting them back, then be careful -- but it can be done.
That was the message delivered Tuesday by David Willson, an attorney from Titan Info Security Group, here at the Hacker Halted conference.
While many companies have the technical tools and knowledge they need to inflict damage on their online opponents, most of them do not pursue the idea because of concerns that the law will regard them as hackers themselves, Willson says.
The bad news is that [corporations] security sucks, he says. The good news is that the bad guys security sucks, too. There are tools, techniques, and intelligence that you can use to anticipate attacks as well as effectively stop them -- and potentially identify attackers once discovered in your network.
For example, a corporation could place code on a bot that has infected its network, Willson says. Eventually, that code might be transferred back to the attackers command-and-control server, and could be programmed to block the attackers communications path.
The trick, Willson says, is how to hack back legally. U.S. firms are governed by the federal Computer Fraud and Abuse Act, which essentially states that any unauthorized access of another organizations computers could be considered a crime. Some states have computer trespass laws, and other countries have laws that might get a company into legal trouble for cracking others computers if those others are cybercriminals, he notes.
In the above example, where code is attached to a bot, an automated tool might be seen by the courts as being similar to cookies or adware, which are not illegal, Willson says.
Companies could also use honeypots, which allow users to legally collect intelligence about their attackers, or beacons, which legally illuminate an attackers trail, Willson says.
Hacking back should never be a companys first response, but in the case of a persistent attacker, it might be the only answer. You might be spending $50,000 to $100,000 a week to battle a persistent threat he says. Youve tried all of the traditional approaches. Calling law enforcement doesnt help -- they are simply overwhelmed with other cases. What do you do?
The key is to stay within criminal law while taking your chances with civil law, Willson says. Obviously, you dont want law enforcement turning around and coming after you, he says. But if a hacker wants to sue you for unauthorized access, that might be a chance youre willing to take.
Have a comment on this story? Please click Add a Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Companies Should Think About Hacking Back Legally, Attorney Says