To Catch A Hacker
Facebook is good for something after all:
To be totally safe, a Chinese hacker would log out of the servers used for cyber-espionage (and allegedly sponsored by the Chinese military) before logging into a separate, more low-key VPN that he or she could use to access U.S.-based social media sites such as Facebook and Twitter.Sometimes the bad guys are too smart for their own good...
Instead of following that procedure, according to Mandiant, some of the hackers got lazy. “The easiest way for them to log into Facebook and Twitter is directly from their attack infrastructure,” the company’s report explains. “Once noticed, this is an effective way to discover their real identities.” When the hacker uses the “attack” servers to log in to Twitter or Facebook, he or she unintentionally links the espionage servers with specific Facebook and Twitter accounts — in other words, with specific human beings.
Mandiant traced two hackers, who used the handles DOTA and UglyGorilla, all across the Web using data points like this. The investigation also looked at, among other things, a cellphone number that one of the hackers used to register a Google e-mail account (yes, he used two-step verification for extra security) and that provided data on the hacker’s location.
National Journal’s Brian Fung makes a great point. He writes, “It’s no small irony the everyday shortcuts users take, and which subsequently open them up to hackers like DOTA and UglyGorilla, are the same traps that the two hackers fell into.”