Menu
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact

Brett Shavers | Ramblings

Brett's Ramblings

Subscribe to blog
Unsubscribe from blog
Settings
Sign In
If you are new here, Register
  • Forget Username
  • Reset Password
Font size: + –
Subscribe to this blog post Unsubscribe
Report
Print
1 minute reading time (226 words)

Don't become a hacker by hacking back a hacker that hacked you

Digital Forensics
Brett Shavers
Sunday, 20 May 2018
2622 Hits
1 Comment

Emotions run deep if you are victimized.  Initially, you want blood at any cost.  You also willingly accept any potential future regret, as long as you get blood today.  And unfortunately, no matter how fast justice may come, it will not be soon enough.  This rationale applies to being a victim of any crime and having your computer system hacked counts.

I’ll give a quick two cents in this post just as I did to a victim-client that was hacked.  "Don’t hack back."  Stop talking about and stop thinking about it.  To be clearer, make sure everyone in your company understands not to hack back. Better to focus on plugging the holes and implement your response plan.

Here are some bullet points I give to clients who are blinded by revenge and want blood:

  • You might spend more money than you have in a vain attempt to ID the attacker
  • You might hack an innocent party
  • You might hack a nation-state
  • You might be hacked back by the “innocent” party you hacked back (eg: a nation-state or a better hacker than you would be)
  • You might become a criminal hacker

There are more reasons, but I believe these pretty much cover it.  Going broke, victimizing an innocent party, and going to jail are strong motivators to counter the emotion to exact revenge on a hack.

 

Tweet
Share on Pinterest
0
Why does Google think this is a good idea?
Digital Forensics Tenure in Law Enforcement, and o...

About the author

Brett Shavers

Brett Shavers

 

Comments 1

Guest
Guest - Aaronreid on Monday, 05 November 2018 20:10

Hum. That almost sounds as its directed towards me. But one question mr Shavers .would u sit back.let.the.invade your basic rights as a human yo have them record and video u without.permission. to make u feel so.violated i wish i could be just like all the other sheep nnot notice the. Little glitches and how settings on phones and tablets seem to change in their favor. I wish i didnt get bitten by this facinatinating snake i see and feel and understand things and their workings way more than i should. I eant to learn this i need to know. I constantly warn my.fellow friends to the clever work of these thiefs and goverment agencies how they use our cells as a form of A.I how they track us. How they build profiles on things we buy or look at.. I am. Not a criminal i too ex canadian military i wish.to be on the good guys side. . aaron Aka Big pap bear

0 Cancel Reply
Hum. That almost sounds as its directed towards me. But one question mr Shavers .would u sit back.let.the.invade your basic rights as a human yo have them record and video u without.permission. to make u feel so.violated i wish i could be just like all the other sheep nnot notice the. Little glitches and how settings on phones and tablets seem to change in their favor. I wish i didnt get bitten by this facinatinating snake i see and feel and understand things and their workings way more than i should. I eant to learn this i need to know. I constantly warn my.fellow friends to the clever work of these thiefs and goverment agencies how they use our cells as a form of A.I how they track us. How they build profiles on things we buy or look at.. I am. Not a criminal i too ex canadian military i wish.to be on the good guys side. . aaron Aka Big pap bear
Cancel Update Comment
Guest
Saturday, 06 March 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.brettshavers.com/

direct link

DFIR Training

Be sure to check out my DFIR Training website for practically the best resources for all things Digital Forensics/Incident Response related.


© 2021 Brett Shavers