Sabotage, espionage, theft of clients and other military actions with competitors

in #btc7 years ago

I'll tell you on a real example of how sabotage works, how professionals work their business. This story was led to me by one of the information security specialists,so to speak, the beginning of his career ...

The story will be from the first person. All events in history are fictitious, similarities are random.

Not so long ago, the news came to me with a proposal to earn extra money. The essence of the work was very simple: to disable the main computers of a competing firm, but before that, take away the base of all employees, as well as the company's clients, and other interesting information. Ultimately, after this task was completed, an untested employer paid me only a portion of my fee and then, after promising the leftovers, stupidly went into ignore.

It is for this reason, without any remorse, I tell the story of the work done, after which, until now, crypto containers are lying around in the clouds with information merged from the main components of the "goal" to which the order was placed:

  • questionnaires of employees,

  • addresses,

  • trainings,

  • "appearance-passwords" and other

Sidev and tupiv to the screen of his beech, which has been trying for some time to replace something cooler and newer, I picked up and asked the new industrial Panasonic for myself - nda, not the weak prices they still have ... (On that day I dreamed of "Panasonic Toughbook CF-19 mk7"). I do not have so many weaknesses, but an irresistible passion for this kind of technique is clearly present ... Straight to the shakes)))

Well, everything, the beech is selected, postponed, the decision is made. After the first order made, the grandmothers will fly to the Panasonic. And then, by chance, after a few minutes, I get an offer to merge the base from company A (the name of the company will not be specified, but this is one of the largest real estate companies, Kevin) and cause the main computers to fail in any way. This company operates in the field of real estate "From A to Z", as well as conducts a variety of training in its business school agents and brokers. Zombied by an irresistible desire to feel his brand new panasonic and the stated amount for the task, I agreed, as I had a premonition of the surrender after buying beech. Having determined the approximate timeframe in 6-7 days, I began to analyze all the information that could help me to realize everything. Here I really needed the art of social engineering, which is now used in absolutely any topics.

First of all, everything that was given by the old person about the type of the victim's activity was shredded in the network, then the isolation of the addresses of the offices, which turned out to be very many, but still the main central one was found. It was the one who interested me the most and I would not be particularly stressful to visit him. I also had to study a kilometer of offers for the sale of apartments, rentals and other garbage associated with them. I myself was completely zero in this, but the role that I need to play I realized: I had to be a small man with good money, ready to pay a solid commission for a solid apartment. All this I had to present flawlessly, because I realized that I 100% would have to go to the office and vchuhivat their trojan-softik, otherwise luck can not be seen:

punching through the sending of a file by a trailer to letters to the address of different managers can cause a lot of unnecessary reactions to me, as well as to connect additional protection on failure. All this fell away by itself. Besides, it is not known where this Warrior sent in letters will be launched, possibly also stupidly on the employee's home computer, which is very often - it is checked (I can say with certainty that in 90% of cases the information was drained when spying for competitors it happens locally, both the leakage and the control - all this happens only after a local contact with any machine in the company's network, each computer must train its employees to know about the security of their computer, or even better, that every worker knows not Only methods of protection, but also as well as attacks, only then, after increasing their knowledge, information leakage to competitors will be significantly reduced).

Having drawn for myself a maximum of information in the role of a buyer of real estate, I reviewed and studied the list and procedure for processing documents when registering a transaction. Well, everything, I'm ready to conduct a conversation and I just need to make a trip to the office to study the person who will serve me.

In the office, a very nice girl listened to the reason for my arrival, and, having led me to some not very balanced clean-shaven asshole, left him to talk with him (and I was so hoping for luck and continuing communication with her yyyyyyyyy ...). He immediately enraged me! And I realized that this scarecrow does not suit me here! But still having competently conducted a conversation with him and expressed his wishes, wishes and other crap, I kindly asked for a consultation with a person who deals with financial issues, and not just with the selection, search and evaluation of real estate. Picking up different information in the internet, I was able to download it in a matter of minutes with questions about the commission, taxes and soil labudu ... and safely got into the office on the other floor of the office where I was met by a nice woman.

Looking around I realized: "These are the computers that I need." I was just sure of it, driving in my head: "Some of the main employees in this office. They are exactly full of neo