Home > All, Security Issues > Worse still it was through trading faggot office toys and chargers with no wall sockets

Worse still it was through trading faggot office toys and chargers with no wall sockets

Jester is a celebrity hacker. He’s got 56,000 followers on Twitter – not quite a Lady Gaga, but 55,000 more than me. He describes himself as a ‘hacktivist for good’. Who’s good he doesn’t specify. But he also describes himself as a ‘proud infidel’ – and that immediately provocative description probably says a lot.

Some time ago (in relation to the FBI takedown of the UGNAZI hacking group, and in which Jester hinted he was involved) I asked a member of the alternative hacktivist group, Anonymous, what he thought of this proud infidel (Did Jester take down UGNazi?). “Through his twitter and blog, with, sleight of his hand, he pretends he has the power to take down a hacking group such as UGNAZI, releasing a combination of verifiable but less descriptive pieces of info mixed in with unknown but more descriptive pieces.” That is, not much.

On Friday Jester published a new blog describing a new attack vector. “First thing I want to stress here is this is a theoretical scenario, theoretical but entirely possible, if not probable.” In other words, this is new and groundbreaking. And what he describes is gadgets that power up via USB sockets in the PC.

These are less gadgets and more trojan horses, plugging into PCs and stealing the users’ data. “This shit has already been done,” he warns, “why we never learned from the greeks trojan horse, I’ll never know. That’s what is getting into US. Not over the wire ‘hacks’ – They don’t need to waste thousands of man-hours of Unit 61398, while we buy their trinkets. Everything else is a fucking distraction. They already ‘got’ us. Through trade. Worse still it was through trading faggot office toys and chargers with no wall sockets.”

You have to wonder about the originality of the man, single-handedly discovering a new and major threat vector that no-one has seen before. Where does he get this stuff… Oh, I know – Wikipedia…

It started when a USB flash drive infected by a foreign intelligence agency was left in the parking lot of a Department of Defense facility at a base in the Middle East. It contained malicious code and was put into a USB port from a laptop computer that was attached to United States Central Command.
2008 cyberattack on United States

This one was most likely a Russian attack, but Jester has worked out that the Chinese may by now have heard about it, and might, theoretically but entirely possibly, have thought they could do something similar.

I checked with FireEye. “The author’s main point is that the Chinese could (and likely do) manufacture malicious USB devices that people don’t think are infection vectors (they are). US DOD/IC and allied governments all have policies to prevent plugging any sort of removable USB device into any sort of system, so this vector is certainly not new.”

So, “Through his twitter and blog, with, sleight of his hand, he pretends…” Like so many other celebrities, the real skill is in self-promotion.

Categories: All, Security Issues
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s