Any Ideas for an Anti-Virus Counter-attack Virus to Stop Hackers

Discussion in 'Science, Tech, & Space Exploration' started by AlienView, Jul 20, 2021 at 6:01 AM.

  1. AlienView

    AlienView Noble

    Messages:
    601
    First is it possible ???

    Is it possible to create a stealth mode virus that is triggered automatically when a hacker tries to gain access to a system ?

    When this idea popped into mind I wasn't thinking of money, but needless to say such a 'counter hacker virus' would be worth a fortune - Assuming you could copyright or patent it.

    What you would need is some type of software, like 'Malware bytes', that is supposed to protect against hackers, with an ability to attack the attacker by tracing back the source of the attack and automatically sending a super virus to attack the hackers system.

    Would the hackers machine become vulnerable while in the act of hacking in?
    Might a super counter attack virus solve the current problem with the ransom ware attacks plaguing
    businesses in the US and elsewhere?
     
    • Like Like x 1
  2. nivek

    nivek As Above So Below

    Messages:
    24,957
    A script or algorithm could be written to respond and trigger to whatever its been instructed when a hacking attempt is detected...

    ...
     
    • Thanks Thanks x 1
  3. AlienView

    AlienView Noble

    Messages:
    601
    Next question - With millions, maybe billions, of dollars being lost in hacker attacks, like the pipeline attack recently, why are they not already doing this?

    I'm thinking of this problem - A mistaken counter attack attacking an innocent query which was not an actual attack might trigger big law suits for damages ?
     
    • Like Like x 1
  4. JahaRa

    JahaRa Noble

    Messages:
    703
    Isn't just shutting down the network a good cure for ransomware? Or if you are on the internet unplug your computer.

    If loading a virus on another person's computer is illegal then your idea would not be a good one, but the part about tracing the hacker would be something useful.
     
    • Like Like x 2
  5. AlienView

    AlienView Noble

    Messages:
    601
    On numerous occasions when streaming videos on one of those 'free' sites, I've been attacked by someone that apparently is capable of gaining control of the computer and then showing a warning letter with a notice to contact a phone number or my computer would be permanently damaged - At this point all functions are lost and you can't just turn off the computer in a normal manner - Always just killing the power by turning off the power strip worked and on the reboot, including complete computer scan there was no problem.
    Apparently though, when they attack the network of a large company they have done it slowly and by degrees
    - By the time the victim is aware his whole network is under control and blocked by an encryption program that is difficult if not impossible to break free of - Unless the victim pays the ransom.
    To beat these devils at their own game is the trick - So its time for the next Superhero - 'Super Hacker the Avenger'
    - the master hacker who can track down hackers and burn their machines !
     
    • Like Like x 1
  6. JahaRa

    JahaRa Noble

    Messages:
    703
    I agree we need a way to that and most large companies probably do have one. The government agencies need to get up to speed.
     
    • Like Like x 1
    • Agree Agree x 1
  7. pigfarmer

    pigfarmer tall, thin, irritable

    Messages:
    5,666
    The Sarbanes-Oxley Act is related to financial institutions and geared toward accounting transparency but from the IT p.o.v it put The Clamp on a lot of stuff. It came into being at the inception of VoIP networks and absolutely closed up various vulnerabilities that would otherwise have been left alone. A real p.i.t.a sometimes but various customers regularly audited and required compliance. Even disposing of a disc drive required specific methods.

    So yes, some similar sort sort of 'Critical Infrastructure' requirement would be nice and there are probably exactly such things in place but I'm guessing at organizational levels. They want to to blow trillions on infrastructure it might be nice to involve various federal agencies and come up with some sort of coordinated plan. Been out of it too long so I am probably talking out my *** but lately it certainly seems like some additional thinking on that topic might be required.
     
    • Like Like x 1
    • Thanks Thanks x 1
  8. pigfarmer

    pigfarmer tall, thin, irritable

    Messages:
    5,666
    Most common way for hackers to 'get in' is for you to let them, one way or another. More to it than just virus scans.
     
    • Agree Agree x 1
  9. dr wu

    dr wu Noble

    Messages:
    743
    As talented as those are who work for the intel groups like the NSA...I find it a bit hard to believe they couldn't respond to those who are doing this....with a counter push of some kind. :unsure8:
     
    • Agree Agree x 2
    • Thanks Thanks x 1
  10. pigfarmer

    pigfarmer tall, thin, irritable

    Messages:
    5,666
    What we hear about and what's really going on are two different things. Lots of very capable people on the job.

    Gee - sounds like UAPs, right?
     
    • Agree Agree x 3
  11. AlienView

    AlienView Noble

    Messages:
    601
    All we keep hearing is it is 'probably' Russian hackers, and that the Russian gov is not doing enough to stop them.

    You see I'm not sure that 'we' even know for sure who is responsible - And the use of crypto currency makes it even harder to trace the source - But supposedly they did it at least once and some money was recovered.

    As far as UAPs and aliens - If 'they' decide to takeover it will not be a sci-fi movie type of war - They'll infiltrate the entire web and one day every one will see a message on your computer screens and cell phones dictating what their intentions are and what is your next step while they are in control!
     

Share This Page