News

Published on December 18th, 2019 📆 | 3353 Views ⚑

0

Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers


Text to Speech Voices

When I arrive, he takes me to his workshop in the back of the house, a room with one wall covered in printed pictures of inventors, mathematicians, and scientists who inspire him: Felix Klein, Alan Turing, Emmy Noether. Then he flips up his desk on a hinge to reveal a door in the wall beneath it.

Inside is a small, homemade forklift robot, which lives in the crawlspace beneath his house. Using a remote control and watching several screens that show a feed from the robot's cameras, he wheels his little bot across the cramped storage space under his home, its walls lined with cardboard boxes, to delicately retrieve a crate full of beautifully crafted klein bottles wrapped in paper.

Stoll is still curious about hacking too. A couple of months earlier, he mentions, he decided on a lark to reverse-engineer some hackersā€™ malware-laced Excel file to see where it hid its malicious code. ā€œI said to myself ā€˜Oh, hereā€™s how theyā€™re hiding it.ā€™ It was very sweet and a useful lesson,ā€ Stoll says, sitting on the floor of his workshop next to his forklift bot. ā€œHaving said that, Iā€™m not very interested in cybersecurity today. I wish I was more interested. I wish I could help people defend their systems. Instead, I went back to figuring out how to make a klein bottle that can sit without wobbling.ā€

Royalties from The Cuckoo's Egg paid off Stollā€™s mortgage years ago. Today, klein bottles sales provide him anotherā€”very modestā€”income stream. As for cybersecurity, beyond a few conference talks, he hasnā€™t worked in the industry for decades. The same omnivorous curiosity that drove him to chase his hacker for a year eventually led him to devote the next 30 to his other interests like mathematics, electronic music, and physicsā€”none of which he claims to be an expert in. ā€œTo a mathematician, Iā€™m a pretty good physicist,ā€ Stoll deadpans. ā€œTo a physicist, Iā€™m a fairly good computer maven. To real computer jocks, they know me as somebody whoā€™s a good writer. To people who know how to write ā€¦ Iā€™m a really good mathematician!ā€


ā€œTo a mathematician, Iā€™m a pretty good physicist,ā€ Stoll says.

Photograph: Cayce Clifford





"To people who know how to write," he says, "Iā€™m a really good mathematician!ā€

Photograph: Cayce Clifford

But if Stoll is a cybersecurity amateur, few experts have had as much influence on the field. Stollā€™s fans in the industry point out how, in hunting his hacker 30 years ago, he pioneered techniques out of necessity that would later become standard practice. Consider how, since he was sleeping under his desk at the lab, Stoll programmed his pager to alert him when the hacker logged into the network in the middle of the night. He also set up dozens of printers to transcribe every keystroke the hacker typed in real time, enacting something like the first intrusion detection system.

When Stoll traced the hackerā€™s intrusions to the Department of Defenseā€™s MILNET systems, an Alabama army base, the White Sands Missile Range, Navy shipyards, Air Force bases, NASAā€™s Jet Propulsion Laboratory, defense contractors, and the CIA, Stoll was mapping out an intrusion campaign just as threat intelligence analysts do today.

When he planted hundreds of fake secret military documents on his network that tricked his hacker into staying logged into the Lawrence Berkeley system long enough for a German telecom employee to trace the intrusion to the hackerā€™s location in Hanover, he was building a ā€œhoneypotā€ā€”the same sort of decoy regularly used to track and analyze modern hackers and botnets.

ā€œThe Cuckoo's Egg documented so many of the methods we now use to deal with high-end intruders,ā€ says Richard Bejtlich, a well-known security guru and author of The Tao of Network Security Monitoring: Beyond Intrusion Detection, who has worked on incident response and network monitoring at companies like Corelight and FireEye. ā€œYou can see in the book almost everything you need to do in an incident. The mindset, the thoroughness, the commitment to it. Itā€™s all there.ā€

Source link

Tagged with: ā€¢ ā€¢ ā€¢ ā€¢ ā€¢



Comments are closed.