Opinion

To hack or not to hack

We’ve received an inquiry from some of our readers regarding the usage of the term “hacker” on our website. Here, at Viruslist.com we rely on this term to denote any malicious activity related to gaining unauthorized access to a computer system.

Some of our readers have noted that in the early days of computing the term was used with a different meaning, denoting a person skilled at optimizing computer systems, patching kernels to them it work more efficiently or reset the administrator password when lost.

Over time however, the original meaning was lost, as not all “hackers” limited themselves to patching kernels and resetting passwords when asked. Some started to break into poorly secured systems to prove “it’s possible” and eventually, crossed the border into breaking into systems specifically to steal information and/or services.

So, the term “hacking” became a gray border definition. To cope with that, new terms such as “black hat”/”white hat” were invented.

More about these and other parts of the history of “hacking” in an upcoming article, on Viruslist.com.

To hack or not to hack

Your email address will not be published. Required fields are marked *

 

Reports

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox