Security Guru Gives Hackers a Taste of Their Own Medicine
April 11, 2008 – 5:53 PMMalicious hackers beware: Computer security expert Joel Eriksson might already own your box.
Eriksson, a researcher at the Swedish security firm Bitsec, uses reverse-engineering tools to find remotely exploitable security holes in hacking software. In particular, he targets the client-side applications intruders use to control Trojan horses from afar, finding vulnerabilities that would let him upload his own rogue software to intruders’ machines.
He demoed the technique publicly for the first time at the RSA conference Friday.
“Most malware authors are not the most careful programmers,” Eriksson said. “They may be good, but they are not the most careful about security.”
Eriksson’s research on cyber counterattack comes as the government and security firms are raising alarms about targeted intrusions by hackers in China, who are evidently using Trojan horse software to spy on political groups, defense contractors and government agencies around the globe.
The researcher suggests that the best defense might be a good offense, more effective than installing a better intrusion-detection system. Hacking the hacker may be legally dubious, but it is hard to imagine any intruder-turned-victim picking up the phone to report that he had been hacked.