The Cowra guy’s ego got him in trouble. What of all the crims and state sponsored guys who quietly remain?

earthwave team is a guest blogger
earthwave team is a guest blogger is a guest blogger.

If you suddenly open a drawer in your kitchen at night, and see and kill a small cockroach, you would never go back to bed and sleep easy. You would now know you have a major problem.

That little guy was simply not as agile and stealthy as the other thousand that were hiding under the cutlery tray, and on the underside of the cabinet.

So David Cecil the ‘self-taught’ ‘ego driven’ hacker from Cowra was not agile and certainly not stealthy, his internet bragging got him caught. 

State sponsored actors and those driven by money are highly skilled and don’t brag online. They do their work quietly and undetected. This notoriety thing is passé and over-rated.

The excitement of this arrest is misplaced, it should simply serve to alert Platform Networks, and any other potential targets that they have a major problem.

It is easy to get in and hard to be found.

If we had the ability to simply look under the tray and underside of the cabinet how many stealthier, more focused roaches would we find in our systems?

Perhaps we know the real truth and simply want to go back to bed and not confront it.
Protection with detection and response will help.
 

Tags: platform networks, detection, protection, hacker

Comments

Post new comment

Users posting comments agree to the CSO comments policy.

Login or register to link comments to your user profile, or you may also post a comment without being logged in.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.