The recent controversy over Hack Back, not to be confused with Back-Hack, was largely fueled by proposed but failed legislation in the State of Georgia. The spate of articles and opinion pieces arguing against the emotionally satisfying, but dangerous strategy largely hung their shields on the impossibility of getting “attribution right.”
It’s true that attackers are very good at hiding their tracks and stepping over stones making it near impossible to reach their actual source location. But there are methods and technologies that can help reveal these adversaries more accurately. I’ve personally been involved in determining attribution and holding hackers accountable based on decades of my own research.
Leave a reply