Any Ideas for an Anti-Virus Counter-attack Virus to Stop Hackers

AlienView

Noble
First is it possible ???

Is it possible to create a stealth mode virus that is triggered automatically when a hacker tries to gain access to a system ?

When this idea popped into mind I wasn't thinking of money, but needless to say such a 'counter hacker virus' would be worth a fortune - Assuming you could copyright or patent it.

What you would need is some type of software, like 'Malware bytes', that is supposed to protect against hackers, with an ability to attack the attacker by tracing back the source of the attack and automatically sending a super virus to attack the hackers system.

Would the hackers machine become vulnerable while in the act of hacking in?
Might a super counter attack virus solve the current problem with the ransom ware attacks plaguing
businesses in the US and elsewhere?
 

nivek

As Above So Below
A script or algorithm could be written to respond and trigger to whatever its been instructed when a hacking attempt is detected...

...
 

AlienView

Noble
A script or algorithm could be written to respond and trigger to whatever its been instructed when a hacking attempt is detected...

...
Next question - With millions, maybe billions, of dollars being lost in hacker attacks, like the pipeline attack recently, why are they not already doing this?

I'm thinking of this problem - A mistaken counter attack attacking an innocent query which was not an actual attack might trigger big law suits for damages ?
 

JahaRa

Noble
First is it possible ???

Is it possible to create a stealth mode virus that is triggered automatically when a hacker tries to gain access to a system ?

When this idea popped into mind I wasn't thinking of money, but needless to say such a 'counter hacker virus' would be worth a fortune - Assuming you could copyright or patent it.

What you would need is some type of software, like 'Malware bytes', that is supposed to protect against hackers, with an ability to attack the attacker by tracing back the source of the attack and automatically sending a super virus to attack the hackers system.

Would the hackers machine become vulnerable while in the act of hacking in?
Might a super counter attack virus solve the current problem with the ransom ware attacks plaguing
businesses in the US and elsewhere?
Isn't just shutting down the network a good cure for ransomware? Or if you are on the internet unplug your computer.

If loading a virus on another person's computer is illegal then your idea would not be a good one, but the part about tracing the hacker would be something useful.
 

AlienView

Noble
Isn't just shutting down the network a good cure for ransomware? Or if you are on the internet unplug your computer.

If loading a virus on another person's computer is illegal then your idea would not be a good one, but the part about tracing the hacker would be something useful.
On numerous occasions when streaming videos on one of those 'free' sites, I've been attacked by someone that apparently is capable of gaining control of the computer and then showing a warning letter with a notice to contact a phone number or my computer would be permanently damaged - At this point all functions are lost and you can't just turn off the computer in a normal manner - Always just killing the power by turning off the power strip worked and on the reboot, including complete computer scan there was no problem.
Apparently though, when they attack the network of a large company they have done it slowly and by degrees
- By the time the victim is aware his whole network is under control and blocked by an encryption program that is difficult if not impossible to break free of - Unless the victim pays the ransom.
To beat these devils at their own game is the trick - So its time for the next Superhero - 'Super Hacker the Avenger'
- the master hacker who can track down hackers and burn their machines !
 

JahaRa

Noble
On numerous occasions when streaming videos on one of those 'free' sites, I've been attacked by someone that apparently is capable of gaining control of the computer and then showing a warning letter with a notice to contact a phone number or my computer would be permanently damaged - At this point all functions are lost and you can't just turn off the computer in a normal manner - Always just killing the power by turning off the power strip worked and on the reboot, including complete computer scan there was no problem.
Apparently though, when they attack the network of a large company they have done it slowly and by degrees
- By the time the victim is aware his whole network is under control and blocked by an encryption program that is difficult if not impossible to break free of - Unless the victim pays the ransom.
To beat these devils at their own game is the trick - So its time for the next Superhero - 'Super Hacker the Avenger'
- the master hacker who can track down hackers and burn their machines !
I agree we need a way to that and most large companies probably do have one. The government agencies need to get up to speed.
 

pigfarmer

tall, thin, irritable
The Sarbanes-Oxley Act is related to financial institutions and geared toward accounting transparency but from the IT p.o.v it put The Clamp on a lot of stuff. It came into being at the inception of VoIP networks and absolutely closed up various vulnerabilities that would otherwise have been left alone. A real p.i.t.a sometimes but various customers regularly audited and required compliance. Even disposing of a disc drive required specific methods.

So yes, some similar sort sort of 'Critical Infrastructure' requirement would be nice and there are probably exactly such things in place but I'm guessing at organizational levels. They want to to blow trillions on infrastructure it might be nice to involve various federal agencies and come up with some sort of coordinated plan. Been out of it too long so I am probably talking out my *** but lately it certainly seems like some additional thinking on that topic might be required.
 

pigfarmer

tall, thin, irritable
On numerous occasions when streaming videos on one of those 'free' sites, I've been attacked by someone that apparently is capable of gaining control of the computer and then showing a warning letter with a notice to contact a phone number or my computer would be permanently damaged - At this point all functions are lost and you can't just turn off the computer in a normal manner - Always just killing the power by turning off the power strip worked and on the reboot, including complete computer scan there was no problem.
Apparently though, when they attack the network of a large company they have done it slowly and by degrees
- By the time the victim is aware his whole network is under control and blocked by an encryption program that is difficult if not impossible to break free of - Unless the victim pays the ransom.
To beat these devils at their own game is the trick - So its time for the next Superhero - 'Super Hacker the Avenger'
- the master hacker who can track down hackers and burn their machines !

Most common way for hackers to 'get in' is for you to let them, one way or another. More to it than just virus scans.
 

dr wu

Noble
As talented as those are who work for the intel groups like the NSA...I find it a bit hard to believe they couldn't respond to those who are doing this....with a counter push of some kind. :unsure8:
 

pigfarmer

tall, thin, irritable
As talented as those are who work for the intel groups like the NSA...I find it a bit hard to believe they couldn't respond to those who are doing this....with a counter push of some kind. :unsure8:

What we hear about and what's really going on are two different things. Lots of very capable people on the job.

Gee - sounds like UAPs, right?
 

AlienView

Noble
What we hear about and what's really going on are two different things. Lots of very capable people on the job.

Gee - sounds like UAPs, right?
All we keep hearing is it is 'probably' Russian hackers, and that the Russian gov is not doing enough to stop them.

You see I'm not sure that 'we' even know for sure who is responsible - And the use of crypto currency makes it even harder to trace the source - But supposedly they did it at least once and some money was recovered.

As far as UAPs and aliens - If 'they' decide to takeover it will not be a sci-fi movie type of war - They'll infiltrate the entire web and one day every one will see a message on your computer screens and cell phones dictating what their intentions are and what is your next step while they are in control!
 

pigfarmer

tall, thin, irritable
This is just the somewhat new arena to do the same thing we've been doing to one another for a long time. This sort of thing fills the gaps between economics and diplomacy, and endless test.

We give Russia far more credit than it deserves for many things. I heard the phrase 'economy the size of Texas' and it wouldn't surprise me. They produce some very interesting hardware and are very capable but I think the way they are being portrayed is in the old USSR sense. They just don't have the capability they used to but they still make for a great monster under the bed.

Asymmetric warfare; you get a lot of bang for your buck in this arena and it's one with a much more level playing field. Of course the Russian government - and we know what that sausage is made of - will deny it. We'll do the same thing and so will everyone else. Look what we and the Israelis did with that famous Stuxnet attack against Iran - and that's the one we know about. I suppose we may never know, or not for a long time, what attacks may have actually been thwarted and maybe even the perpetrators paid a visit of some kind. In the US we always seem to need a Pearl Harbor or 9/11 to provide the ten pounds of cure rather than the ounce of preventions.
 
Top