A simple search reveals a plethora of resources, tools, and personal homepages, most claiming to “hack” for legitimate reasons, within the law. But there is also an entire underground network of hackers honing their tools and skills with malicious damage in mind.
“Ten years ago, ‘hackers’ used to mean people who tinker with computers. The definition has changed, so get over it,” Peter Tippett, founder and chief technical officer at TruSecure told BBC News Online.
The underground network is vast, with thousands of individuals and groups, ranging from lurkers who are intrigued by hacker chat to “script kiddies” who try out hacker tools for a laugh. Newsgroups, internet relay chat and increasingly, peer-to-peer chat and instant messaging, are buzzing with constant hacker chatter.
Net security companies like TruSecure in the US, have the job of keeping an eye on these groups to work out which weak net spot they are planning to attack next. It currently tracks more than 11,000 individuals in about 900 different hacking groups and gangs.
“There are 5,500 net vulnerabilities that could be used theoretically to launch an attack, but only 80 or 90 are being used,” says Mr Tippett. “Only 16 of 4,200 of vulnerabilities actually turned into attacks last year.”
A team of human and computer bots – artificial intelligence programs – count the vulnerabilities that pop up all over the web daily and measure the risk of security attacks for TruSecure’s 700 or so customers. But that is not enough for 21st century net security, says Mr Tippett.
A separate team at TruSecure has a more mysterious job. It is the elite group of hacker infiltrators, codename IS/Recon (Information Security Reconnaissance). Their daily job is to “see what the bad guys say to each other and what they claim to have done” by gaining respect and building online relationships with groups with names like Hackweiser and G-force Pakistan, Mr Tippett explains.
The hours spent gathering 200 gigabytes of information a day, are invaluable in helping to catch the small proportion of hackers who do the net severe damage. Pieces of information about groups and individuals are put together like a giant jigsaw in TruSecure’s mammoth database, nicknamed the “brain”. [Editor note this is actually a product called “The Brain”.]
More info: [url=http://www.thebrain.com/company/Press/bbc/BBC%20NEWS%20%20Technology%20%20Cracking%20the%20hacker%20underground.htm]http://www.thebrain.com/company/Press/bbc/BBC%20NEWS%20%20Technology%20%20Cracking%20the%20hacker%20underground.htm[/url]