[Fed-Talk] Understanding Strategic Malcode Attacks
[Fed-Talk] Understanding Strategic Malcode Attacks
- Subject: [Fed-Talk] Understanding Strategic Malcode Attacks
- From: Todd Heberlein <email@hidden>
- Date: Wed, 26 Sep 2012 15:35:04 -0700
With the recent penetration of Energy company Telvent (seemingly ripped from the first few pages of Mark Russinovich's new book "Trojan Horse"), Stuxnet damaging hardware, etc., I thought I'd mention this 10-year-old paper I wrote for some email discussions. It is less than 5 pages, but it hits on a lot of topics being discussed today (electrical grids, exfiltration, physical damage).
Understanding Strategic Malicious Code Attacks: Some Initial Thoughts
This paper provides some of our initial thoughts on strategic malicious code attacks. We examine three primary areas. First, we consider what makes an attack a strategic one. Next, we look at what damage can be done to computers, their operational capabilities, and our willingness to use them. Finally, we examine how such attacks can be delivered.
(Note: I mangled the text in the pre-amble about releasing this publicly, but I left the bad grammar since I thought it gave me "hacker cred" :-P)
Todd
|
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden