• Javtribution

    Forget what you know, what you think you know about attribution – I present to you Javvad’s Attribution Methodology or Javtribution(tm) for short.

    Maybe Dr. Krypt3ia will yell Javtribution Shmattribution and try to poke holes in my findings – but I assure you, my findings can be considered holy enough without any poking.

    There are two pieces of the puzzle that I put together from my armchair:

    1. Making associations that others overlook. This means analysing multiple hacks at once as opposed to in isolation. Treating a series of hacks as one is vitally important. Some may say that this is clutching at straws, but I discount the advice of haymakers who clutch worthless items like straws.
    1. Critically examining who has the most to gain and lose in every scenario in groups of interest as opposed to broadly defined ‘nations’. Just because your Prius is economical, doesn’t mean every Toyota is.

    For this case, I’m taking a look at these recent breaches:

    Harvard

    OPM

    UCLA

    Ashley Madison & Adult Friend finder

    The breakdown below is quick and dirty with information redacted to protect sources, the innocent, guilty and all those in between but these are the steps of the methodology:

    1. Compiling a list of associated hacks within a geography:

    All these five hacks listed above are for services that are predominantly provided within the USA and have no obvious direct connection with each other other than Ashley Madison and Adult Friend Finder.

    2. Identify those who have most to lose

    This is where things get a bit tricky. In isolation, it can be relatively easy to point the finger at a particular individual or group. For example, in the cases of Ashley Madison and Adult Friend Finder, one can assume that divorce lawyers were complicit in order to drum up some business. But those lawyers will have little to do with Harvard – so the Javtribution methodology will discount lawyers and move on.

    Let’s look at the demographics of all the hacks and see the predominant groupings of those targeted.

    OPM: clever young Americans who want to serve their country

    UCLA: This may seem like a list of illnesses that people have. But maybe it’s what isn’t in the data that’s more important… i.e. a way to identify healthy and fit young Americans.

    Harvard: Clever young people with bright futures ahead of them. Predominantly privileged white Americans.

    Ashley Madison and Adult friend finder: An article published in January (ironically based on Ashley Madison data) identified the types of people most likely to have an affair. Which would be young males in good jobs.

    3. Based on 2, who has the most to gain?

    Following some extremely complex calculations – we can determine that the ones with the most to gain aren’t some nations on the other side of the planet. But rather actors closer to home. In this case it would seem like the 99% who always complain about the 1% would be key culprits. Unfortunately hacking doesn’t fit the MO of the 99% as they are more likely to protest on Wall Street.

    Ultimately we are looking for someone who dislikes America and therefore anyone who wants to serve her. Someone who has expressed a dislike for white men and certainly doesn’t like affluent people who have made their wealth by virtue of a capitalistic system.

    4. Conclusion

    Based on the Javtribution methodology – the perpetrator you are seeking is…. Michael Moore.

  • Become a Hollywood Hacker in 3 simple steps

    Step 1: Setup a large screen on the wall. Play the threatbutt map on the large screen http://threatbutt.com/map/

    Step 2: Whilst dressed up in your hoodie and surrounded by empty cans of energy drinks, keep looking up at the screen and uttering some techno-babble. It doesn’t matter what you say as long as you say it with confidence. e.g. “There’s a SCADA vulnerability detected on the WP plugin that relates to CVE 7.7″

    Step 3: Have http://hackertyper.net running on full screen and start furiously banging away on the keyboard.

    Congratulations – you are now a Hollywood Hacker

    Photo: Jayson E Street