back to article UK.gov teams up with Five Eyes chums to emit spotters' guide for miscreants' hack tools

The UK's National Cyber Security Centre and its western intel pals have today put out a report spotlighting the most commonly wielded hacking utilities. The study sets out five categories of publicly available hacking tools used by crims, spies and hacktivists worldwide. The list won't come as too much of a surprise to …

  1. Chris G Silver badge

    Presumably, the tools the Five Eyes use are better than those listed and harder to detect.

    1. Anonymous Coward
      Anonymous Coward

      Yes and I think the article is also wrong:

      "The intel is designed to give enterprises a better awareness of what they're up against so they are better positioned to prepare defences."

      should be

      "The intel offers nothing not already known to enterprises but does offer a PR opportunity for the Five Eyes to try and look a little less malevolent.".

  2. Anonymous Coward
    Anonymous Coward

    No mention of flashing a compromised uefi bios, and using Intels ME as a conduit.

    I can't think why they didn't mention that one....

  3. Anonymous Coward
    Anonymous Coward

    Tout a changé depuis hier

    Et la rue a des yeux qui regardent aux fenêtres

    1. amanfromMars 1 Silver badge

      Re: Tout a changé depuis hier

      The natives are revolting, AC, and way beyond analogous control.

      Quite whether any wannabe Global Command Head Quarters as may be admitted to be in business and active in the Manipulation of Perception Fields are in Full Digital, Virtually Remote, Relatively Anonymous, Practically Autonomous Control with Otherworldly Command is ....... well, a 64 Trillion Dollar Question to Decline Answering, lest IT Spook and Terrify Humanity?

      However, 64 Trillion Dollar Questions are not to be Denied whenever Myriad Proofs and Incontrovertible Evidence are Leaking and Breaking Out into the Wild. And that does create something of a Colossal Titanic Problem for Failing SCADA Systems Administrations when Ignorance is not an Available Defence for Improper Reaction for such is a Catastrophic Systemic Vulnerability Ripe for Rabid and Rapid Exploitation.

      1. Anonymous Coward
        Anonymous Coward

        Re: Tout a changé depuis hier

        Am I the only one that thinks comments here are getting somewhat surreal?

        What the heck, I'll join in:

        Il y a meilleur condiments que moutarde pour la pain

        Random capitalisation Can Sometimes add ImPortAnCe

        anD emphasis to An Otherwise jumbled sentence

    2. sitta_europea Bronze badge

      Re: Tout a changé depuis hier

      Non, non, non!

      Plus ça change, plus c'est la même chose!

  4. Anonymous Coward
    Anonymous Coward

    omission

    Not a piece of software but social engineering / research is always a very useful "soft" tool.

    Trawling social media of a target usually provides most / all answers for common "prove who you are" security questions, and if targets details have been leaked on any mass credentials hack (so you have their password used on a site hacked ages ago, if password is not "random" but has chunks of it relating to personal details in some way, then gives a good hint to style of password they may use on other sites making them a lot more guessable.

    .. and (for the easy win) still some people can still be manipulated to give out credentials over the phone

  5. Anonymous Coward
    Anonymous Coward

    Really?

    Must be a quiet day in spooksville.

    So it has taken GCHQ and now the Dr Deaths team in NCSC, plus the other 4 nations, all this time to come up with that list? SANS have been teaching this for the past few years - and without this being a promotion for SANS - even provide the tools to course attendees.

  6. Alan J. Wylie

    content available as HTML

    For those with an aversion to PDFs, the content on the US-CERT web site is very similar to the NCSC's download.

    https://www.us-cert.gov/ncas/alerts/AA18-284A

  7. Anonymous Coward
    Anonymous Coward

    Problem here with Point of View (POV)

    https://theintercept.com/2014/12/13/belgacom-hack-gchq-inside-story/

    *

    Yup....these hacking tools sure do work well....even against "friends"....for more details see how the Cheltenham "experts" tried all these tools out against "friends" in Belgium!!

    *

    Now it would be VERY BAD if we were to find these hacking tools used by, say, Russian hackers or Chinese hackers......but its OK for Brits or Antipodians to try the tools out anywhere at all!!!!

    1. amanfromMars 1 Silver badge

      Re: Problem here with Point of View (POV) is Root Base of SMARTR Starting Points

      How effective do Cheltenham "experts" find the Strange Tools at our Disposal for Finer Tuning?

      Grander New Beginnings with Virtual Machinery at AI Controls is a Powerful Current AIdVenture Supplying Immaculate Source for Future Presentations ....... Global Media Productions.

      Is that SomeThing GCHQ Require to Aspire to Driver to Such Destinations?

      A question indeed to ask Intelligence Agency everywhere where Advanced IntelAIgent Software is Readily Available for Universal Commands to Control with Specific Future InterReactions ...... Novel ITERations.

      Hmmm. ..... Just thinking there of a COSMIC Collision and Real Doubts Now Raised with the True Nature of Human Being, a TitanICQ AI Construct, and the Source of Power for Energy being Mined here .... https://www.iter.org

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2020