Wednesday, June 16, 2021

The new tools are making hackers and counter-hackers more dangerous than ever before.




The new quantum systems and hybrid quantum-0/1 systems are making new challenges for data security. The thing that makes this kind of system very dangerous is its ability to handle data. If we are thinking of things like brute force attacks, the new quantum-based systems can collect billions of words, and change them to forms, what are the most common versions of the passwords like replacing letters by using numbers or special marks. The attacking system can collect those words from the internet, and then test them to the targeted system.

The system can also type the letters and marks to the targeted system, and then compile the echo-time, and the longer echo time means that the character, what is given to the target is part of the right password. The problem with the new systems is that the advantages in computing are coming faster than nobody expected. And the new artificial intelligence-based systems can hack people by using tools, that are more sophisticated and diverse than ever before. The attackers can use many types of methods for making phishing attacks. One of the ways, what social hackers can use is the virtual actors.

In those cases, the system can use virtual characters, what are looking like real bosses of the company. The system can make those characters by using laser scanners, or simply photographs, which are taken from different angles. Then the system can show those characters in the virtual meeting, and those virtual bosses can ask for passwords or some other important data. The workers can cheat on the meeting, and then the virtual boss can make many things like asking the passwords or project plans or documentation, that is not meant for outsiders.

Artificial intelligence makes many things automatically, and that means the AI-based systems can make multiple attacks 24/7 even years. That means the hacker can simply activate the attack software in the server, and then start to make other things by using some other computer. Then the attack server will give information if the target system lets it come in, and that thing makes artificial intelligence a powerful tool. The automatized artificial intelligence can attack the targeted systems even for years.

The artificial intelligence program might have multiple tables, that are around the same body. Each of the tables can involve code, what allows the different type of attacks. The complicated artificial intelligence-based hacking tool might have the ability to infect multiple computers, and those infections can load the tables, what are involves the attacking code in the RAM-memory, which makes those tables very hard to detect.

The hacking tool would also deny the target computer send the tracking application into it. The hacker must realize that the targeted system can be the "honey pot", whose mission is to track hackers. The "honey pot" servers are sending tracking applications to the hacking computers. So the "honey pot" would use similar systems with hackers. And the difference between those systems is that the "honey pot" is used as the counter-hacking tool, which mission is to track hackers and their employers.

The two-stage hacking means that the attackers are attacking the target through the other computer. That thing makes tracking the hacker more difficult than the hacking that happens straight between the attacking and targeted system.

The system uses those infected computers as the medium, whose mission is to deny the ability to track the attacker. If the system uses artificial intelligence what purpose is to search and deny the tracking and then the hacking tool will just close those computers and that thing will cut the tracking signal. In this case, the system uses the application, what it slips in the targeted systems, and then the system can scan the data from the computer. The use of two-stage hacking methodology and RAM-based software that thing would make tracking the hacker hard. But the same systems can be used to track hackers.

Image:()Pinterest

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Every object in orbit could be an ASAT weapon.

   Every object in orbit could be an ASAT weapon.  Researchers are worried. That China’s space-debris catcher can turn into an ASAT, an Anti...