{"id":14676,"date":"2014-12-19T12:33:39","date_gmt":"2014-12-19T18:33:39","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=14676"},"modified":"2014-12-20T01:25:48","modified_gmt":"2014-12-20T07:25:48","slug":"the-evidence-that-north-korea-hacked-sony-is-flimsy","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=14676","title":{"rendered":"The Evidence That North Korea Hacked Sony Is Flimsy"},"content":{"rendered":"<blockquote>\n<h1>Attribution Is Difficult If Not Impossible<\/h1>\n<p>First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers <em>are<\/em> identified and apprehended, it\u2019s generally because they\u2019ve made mistakes or because a cohort got arrested and turned informant.<\/p>\n<p>Nation-state attacks often can be distinguished by their level of sophistication and modus operandi, but attribution is no less difficult. It\u2019s easy for attackers to plant false flags that point to North Korea or another nation as the culprit.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.wired.com\/2014\/12\/evidence-of-north-korea-hack-is-thin\/\">The Evidence That North Korea Hacked Sony Is Flimsy | WIRED<\/a>.<\/p>\n<p>A list of previous <a href=\"http:\/\/attrition.org\/security\/rant\/sony_aka_sownage.html\">Sony Hacks here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attribution Is Difficult If Not Impossible First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=14676\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1121],"tags":[718,102,528],"class_list":["post-14676","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-data-security","tag-hacking","tag-sony"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14676"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14676\/revisions"}],"predecessor-version":[{"id":14686,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14676\/revisions\/14686"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14676"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}