The sprawling reach of a malware campaign that hit government agencies and businesses using SolarWinds, and potentially other attack vectors according to recent reports, inspires new questions about appropriate response from private sector organizations.
Many enterprises, particularly those in tech and security, have tremendous insight into the workings of their own systems and the intrusions that might occur, which some believe puts them in a particularly unique position to hack back at attackers. Doing so, however, could bring a host of problems.
“Hacking back is still up to legal interpretations, but for the most part it's not legal under international law," said Joseph Neumann, director of offensive security at Coalfire. "It is the equivalent of me or you deciding to go punch a bear in the face that just stole your picnic basket. At the end of the day the bear is going to win.”
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.