Cymmetria shows us a new type of deception at DEF CON using MazeRunner
Published in Shows and Events

DEF CON 24 - Las Vegas, NV
The term Honey Pot is one that most people are very aware of. It is a form of detection that is designed to lure an attacker into targeting a simulated system so that you can identify their techniques and tools. Honey pots have been used to gather intelligence about bot nets, malware in the wild and many other forms of malicious activity. The problem now is that these simulated systems are very easy to identify and avoid by today’s advanced attackers.

In the late-90s the world was shocked when a single collection of code was able to destroy a number of computers through malicious instructions. Named Chernobyl (or CIH and Spacefilter) this virus was able to overwrite data and even the BIOS on systems. It infected around 60 million computers and cuase upwards of $1 billion in damages around the world. Although there were other viruses before this nasty bug hit the scene, CIH was the start of the anti-malware commercial machine. It was not until after CIH that we really saw companies spring from the ground offering protection from future events like CIH.


Israeli company Extreme Reality, owner of a solution called Extreme Motion, which is used to identify the movement of users in games and other applications, has announced that their technology will soon be adjusted for use in security applications.


Today I read some very interesting news. According to a few news outlets the Australian Federal Police have arrested another “leader” of the group formerly known as LulzSec. This would make the 2nd top dog of the Anonymous splinter group to have been taken in by authorities. So the question is; who is the real LulzSec leader? Is it Hector Monsegur (Sabu) who was caught in New York and turned informant for the FBI to avoid a lot of jail time or is it 24 year old Mathew Trevor Flannery who went by the name Aush0k?