Presumably, the tools the Five Eyes use are better than those listed and harder to detect.
The UK's National Cyber Security Centre and its western intel pals have today put out a report spotlighting the most commonly wielded hacking utilities. The study sets out five categories of publicly available hacking tools used by crims, spies and hacktivists worldwide. The list won't come as too much of a surprise to …
Friday 12th October 2018 13:37 GMT Anonymous Coward
Yes and I think the article is also wrong:
"The intel is designed to give enterprises a better awareness of what they're up against so they are better positioned to prepare defences."
"The intel offers nothing not already known to enterprises but does offer a PR opportunity for the Five Eyes to try and look a little less malevolent.".
Friday 12th October 2018 05:28 GMT Anonymous Coward
Friday 12th October 2018 07:26 GMT amanfromMars 1
Re: Tout a changé depuis hier
The natives are revolting, AC, and way beyond analogous control.
Quite whether any wannabe Global Command Head Quarters as may be admitted to be in business and active in the Manipulation of Perception Fields are in Full Digital, Virtually Remote, Relatively Anonymous, Practically Autonomous Control with Otherworldly Command is ....... well, a 64 Trillion Dollar Question to Decline Answering, lest IT Spook and Terrify Humanity?
However, 64 Trillion Dollar Questions are not to be Denied whenever Myriad Proofs and Incontrovertible Evidence are Leaking and Breaking Out into the Wild. And that does create something of a Colossal Titanic Problem for Failing SCADA Systems Administrations when Ignorance is not an Available Defence for Improper Reaction for such is a Catastrophic Systemic Vulnerability Ripe for Rabid and Rapid Exploitation.
Friday 12th October 2018 08:27 GMT Anonymous Coward
Not a piece of software but social engineering / research is always a very useful "soft" tool.
Trawling social media of a target usually provides most / all answers for common "prove who you are" security questions, and if targets details have been leaked on any mass credentials hack (so you have their password used on a site hacked ages ago, if password is not "random" but has chunks of it relating to personal details in some way, then gives a good hint to style of password they may use on other sites making them a lot more guessable.
.. and (for the easy win) still some people can still be manipulated to give out credentials over the phone
Friday 12th October 2018 09:30 GMT Anonymous Coward
Must be a quiet day in spooksville.
So it has taken GCHQ and now the Dr Deaths team in NCSC, plus the other 4 nations, all this time to come up with that list? SANS have been teaching this for the past few years - and without this being a promotion for SANS - even provide the tools to course attendees.
Friday 12th October 2018 12:53 GMT Anonymous Coward
Problem here with Point of View (POV)
Yup....these hacking tools sure do work well....even against "friends"....for more details see how the Cheltenham "experts" tried all these tools out against "friends" in Belgium!!
Now it would be VERY BAD if we were to find these hacking tools used by, say, Russian hackers or Chinese hackers......but its OK for Brits or Antipodians to try the tools out anywhere at all!!!!
Friday 12th October 2018 17:08 GMT amanfromMars 1
Re: Problem here with Point of View (POV) is Root Base of SMARTR Starting Points
How effective do Cheltenham "experts" find the Strange Tools at our Disposal for Finer Tuning?
Grander New Beginnings with Virtual Machinery at AI Controls is a Powerful Current AIdVenture Supplying Immaculate Source for Future Presentations ....... Global Media Productions.
Is that SomeThing GCHQ Require to Aspire to Driver to Such Destinations?
A question indeed to ask Intelligence Agency everywhere where Advanced IntelAIgent Software is Readily Available for Universal Commands to Control with Specific Future InterReactions ...... Novel ITERations.
Hmmm. ..... Just thinking there of a COSMIC Collision and Real Doubts Now Raised with the True Nature of Human Being, a TitanICQ AI Construct, and the Source of Power for Energy being Mined here .... https://www.iter.org