this post was submitted on 20 Aug 2024
311 points (99.1% liked)

Technology

59665 readers
2570 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] tux0r 9 points 3 months ago (1 children)

A Windows zero-day vulnerability recently patched by Microsoft was exploited by hackers working on behalf of the North Korean government so they could install custom malware that’s exceptionally stealthy and advanced, researchers reported Monday.

I am always amazed at how easy it is for ‘security researchers’ to speculate about which government is solely responsible for exploiting security vulnerabilities.

[–] einkorn 44 points 3 months ago (2 children)

Specific groups of hackers often have various markers that appear throughout their various malware.

Reused code fragments are the most obvious one. Others are specific code styles such as variable naming, even formatting. It's basically the same stuff that is used to determine whether a specific text was most likely written by a specific person.

[–] booly@sh.itjust.works 12 points 3 months ago

During World War II, the telegraph interception guys would figure out which enemy units were where, even without having broken the codes, because each telegraph operators each had their own "fist," or distinct patterns in how they punched in the Morse code, and people listening to the signals day in and day out could learn to distinguish them even when dealing entirely in encrypted text.

In modern times, attribution of hacker groups include other indicators include what time zones certain people seem to be active in, what their targets are (and aren't), hints about installed language support or keyboard layouts or preferred punctuation or localized representations of numbers. For example, you can tell here on Lemmy when someone uses different types of quotation marks a decent indication of what country that person might be from, even in a totally English language thread.

[–] Kecessa@sh.itjust.works 10 points 3 months ago

For more on that, go listen to Darknet Diaries, episodes where they talk about major hacks are great