{"id":427,"date":"2012-03-07T18:20:16","date_gmt":"2012-03-08T00:20:16","guid":{"rendered":"http:\/\/hammerheadcombatsystems.org\/?p=427"},"modified":"2012-03-07T18:20:16","modified_gmt":"2012-03-08T00:20:16","slug":"malware-cyber-warfare","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2012\/03\/07\/malware-cyber-warfare\/","title":{"rendered":"Malware &amp; Cyber Warfare"},"content":{"rendered":"<div style=\"text-align:center;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-428\" title=\"cyber1\" src=\"http:\/\/hcsblogdotorg.files.wordpress.com\/2012\/03\/cyber1.jpg\" alt=\"\" width=\"128\" height=\"77\" \/><\/strong><\/div>\n<div><\/div>\n<div style=\"text-align:center;\">by<\/div>\n<div style=\"text-align:center;\">HCS Technical Staff<\/div>\n<div><\/div>\n<div><\/div>\n<div><strong>How is it done?<\/strong><\/div>\n<div><\/div>\n<div>Offensive computer attacks are usually\u00a0conducted by exploiting flaws in a computer web interface (most often a &#8220;login screen&#8221;)\u00a0or surreptitiously installing\u00a0malicious software (&#8220;malware&#8221;) on targeted computers to produce a number of effects on the computer system or devices that it controls.<\/div>\n<div><\/div>\n<div><strong>How does it happen?<\/strong><\/div>\n<div><\/div>\n<div>In the broadest sense, human error is what leads to successful\u00a0computer attacks.\u00a0A computer running an\u00a0unpatched legacy operating system, using\u00a0an unpatched\u00a0legacy web browser to view shady sites, opening the attachment on a weird email,\u00a0a poorly designed\u00a0web-facing login screen, unencrypted wireless transmissions,\u00a0or\u00a0lax enforcement of a security policy in a building are the most common examples of human error.<\/div>\n<div><\/div>\n<div><strong>How does it impact relationships between nation-states?<\/strong><\/div>\n<div><\/div>\n<div>It provides an indirect means for nation-states to wage deniable\u00a0proxy war against rival nation states. The best example of this is the Stuxnet worm attack on the Iranian government&#8217;s nuclear program. There is also the\u00a0element of &#8220;mutually assured destruction&#8221; in cyberwarfare that would impact how\u00a0major world powers like the United States, Russia, and China deploy\u00a0offensive cyberwarfare capabilities. I would not be surprised to see treaties\u00a0between major nation-states (like the United States, Russia, or China) that could\u00a0function as a sort of &#8220;Geneva Convention&#8221;<\/div>\n<div><\/div>\n<div><\/div>\n<div style=\"text-align:center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-429\" title=\"cyber4\" src=\"http:\/\/hcsblogdotorg.files.wordpress.com\/2012\/03\/cyber4.jpg\" alt=\"\" width=\"150\" height=\"81\" \/><\/div>\n<div><\/div>\n<div><\/div>\n<div><strong>What threat does it pose to me as a civilian?<\/strong><\/div>\n<div><\/div>\n<div>The biggest cyber threats to a civilian are:<\/div>\n<ul>\n<li>Loss\u00a0of water services<\/li>\n<li>Loss of electrical services<\/li>\n<li>Loss of Internet service<\/li>\n<li>Loss of Financial services<\/li>\n<li>Exposure of personal information and\/or intellectual property\/trade secrets<\/li>\n<li>Identity Theft<\/li>\n<\/ul>\n<p style=\"text-align:center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-430\" title=\"cyber3\" src=\"http:\/\/hcsblogdotorg.files.wordpress.com\/2012\/03\/cyber3.jpg\" alt=\"\" width=\"111\" height=\"106\" \/><\/p>\n<div><strong>What can I do to protect myself?<\/strong><\/div>\n<ul>\n<li>Follow basic disaster preparedness procedures<\/li>\n<li>Use a prepaid Visa or other cash card for once-off transactions online<\/li>\n<li>Keep some cash on you to do basic transactions in the event you have to get a new credit card number<\/li>\n<li>Check your online bank account regularly for suspicious transactions or transactions you don&#8217;t remember making.<\/li>\n<li>Use a\u00a0LiveCD Operating sytem for online banking and sensitive personal financial transactions<\/li>\n<li>If your machine is running Windows XP, back up your files and install Ubuntu Linux instead\n<ul>\n<li>Microsoft is no longer providing Service Pack Support to Windows XP<\/li>\n<\/ul>\n<\/li>\n<li>If you MUST use a Windows computer, keep the following in mind:\n<ul>\n<li>Make sure it is Windows 7<\/li>\n<li>Routinely run Windows Update<\/li>\n<li>Install Microsoft Security Essentials<\/li>\n<li>Install CCleaner<\/li>\n<li>Install Malwarebytes Antimalware<\/li>\n<li>Keep your web browser up to date and install multiple web browsers on your PC<\/li>\n<li>Google Chrome and FireFox are good to go.<\/li>\n<li>I know we are all good Christian Warriors and wouldn&#8217;t do such things, but be mindful that\u00a0surfing for <strong>pornography<\/strong> or <strong>pirated movies<\/strong> is not much different than going into the &#8220;bad part of town&#8221; to buy drugs. Big boy rules apply.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div><strong>How can I protect my small or medium-sized\u00a0business?<\/strong><\/div>\n<ul>\n<li>Contact Hammerhead Combat Systems Today!<\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><strong>Links:<\/strong><\/div>\n<div><a href=\"http:\/\/www.ubuntu.com\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.ubuntu.com<\/a><\/div>\n<div><a href=\"https:\/\/en.wikipedia.org\/wiki\/Code_injection\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Code_injection<\/a><\/div>\n<div><a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Stuxnet<\/a><\/div>\n<div><a href=\"http:\/\/hammerheadcombatsystems.org\/2012\/02\/27\/using-a-live-cd-operating-system\/\" target=\"_blank\" rel=\"noopener\">http:\/\/hammerheadcombatsystems.org\/2012\/02\/27\/using-a-live-cd-operating-system\/<\/a><\/div>\n<div><a href=\"http:\/\/support.microsoft.com\/lifecycle\/?ln=en-gb&amp;c2=1173\" target=\"_blank\" rel=\"noopener\">http:\/\/support.microsoft.com\/lifecycle\/?ln=en-gb&amp;c2=1173<\/a><\/div>\n<div><a href=\"http:\/\/www.piriform.com\/ccleaner\" target=\"_blank\" rel=\"noopener\">http:\/\/www.piriform.com\/ccleaner<\/a><\/div>\n<div><a href=\"http:\/\/www.malwarebytes.org\/mbam-download.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.malwarebytes.org\/mbam-download.php<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>by HCS Technical Staff How is it done? Offensive computer attacks are usually\u00a0conducted by exploiting flaws in a computer web interface (most often a &#8220;login screen&#8221;)\u00a0or surreptitiously installing\u00a0malicious software (&#8220;malware&#8221;) on targeted computers to produce a number of effects on the computer system or devices that it controls. How does it happen? In the broadest&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[65],"tags":[52,90,57,58,91,92,63,93,94,95],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/427"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=427"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/427\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}