The US Cyber Command (USCYBERCOM) seems to be adapting and responding to the Russian disinformation threat in some bizarre ways.
Here’s the developing story:
— Ars Technica (@arstechnica) October 23, 2018
#USCYBERCOM Cyber National Mission Force has kicked off an initiative to upload malware samples it discovers to @virustotal. #CNMF is proud to help prevent harm by malicious cyber actors by sharing with the global cybersecurity community. https://t.co/4v4KtDx8z1
— USCYBERCOM Malware Alert (@CNMF_VirusAlert) November 5, 2018
And its assessment in a few tweets:
A surreal devolution of military thresholds. The MMORPG that cyber is now, doxing adversarial toolchains outclasses any counteraction. This is IRC-era warfare. The template here is feed-them-to-the-OSINT-wolves (weaponising information availability), invented by Wikileaks. https://t.co/XCglohWGta
— Pukhraj Singh (@RungRage) November 6, 2018
Burning 305 GRU officers via a cutout followed by leveraging crowdsourced OSINT. Welcome to Spy Games 2.0. https://t.co/5GbNUQ8cal
— 𝙰𝚕𝚎𝚡 𝙱𝚕𝚊𝚌𝚔𝚠𝚎𝚕𝚕 (@alexrblackwell) October 6, 2018
The plan: US hackers will target individual Russian hackers to deter them from spreading disinfo.
This is literally an IRC fight circa 1998. Is NSA gonna rm boxes? Cause a net split and take over #!GRU ?
(Seriously, that is their plan. I thought the US was good at this stuff) https://t.co/wp4aEWSU31
— the grugq (@thegrugq) October 23, 2018
MMORPG: Massively multiplayer online role-playing games
OSINT: Open source intelligence
Doxing: Search for and publish private or identifying information about (a particular actor/party) on the Internet, typically with malicious intent. Generally done by hackers, vigilantes, gamers, blackmailers and trolls
IRC: A chat system populated by the hacker subculture in the 80s and 90s, occasionally host to online gang-wars