• Info@aganoconsulting.com
  • Call Us: +254 (20) 267-0743

Information Security – Hacker Motivation

Jan 26 2015

Reports indicate that Deputy President (DP) William Ruto’s twitter account has been compromised. This comes hardly two days after twitter accounts of the Kenya Defense Force (KDF) and that of its spokesman, Major Emmanuel Chirchir we compromised.

 

It appears that it is the same group of hackers involved in both cases and clearly targeting the government. Indeed, using the DP’s twitter handle, the hackers posted a series of government sites that they had hacked. While we may not know the extent of damage inflicted, the embarrassment factor is big enough to require immediate and urgent action on the part of government.

In social media, some people have expressed glee that these unlawful acts and are happy that the Jubilee government is being subjected to shame. As a “digital government”, some said, Jubilee should be better prepared to deal with such risks, adding that the government’s rhetoric doesn’t match reality.

Whatever anyone thinks, all of us Kenyans should feel bad that such high-level exposure is happening to key national offices in the country.  This is especially so when the country faces the monumental task in securing the country. The least we should do as citizens (whether allied to the government or opposition) is empathize and hope that the government would put in rapid measures to restore normalcy and trust that it can forestall further cyber challenges of the kind we have seen.

If there is anything to learn from these incidents it is that time is nigh for rapid implementation of information protection measures! Information security needs to be prioritized as a matter of urgency. It is important that we prioritize attention in this area so as to forestall similar (and perhaps worse) happenings.

Let’s remember that these hackers are not going away. We must expect that there will be continuous attempts at breaking into systems (be they government or private sector) by the large mass of hackers out there. Some would be copycat attacks while others would be fresh exploration of weaknesses of our systems accessible over the Internet.

The hacker menace (whether internal or external to an organization) is real and is here to stay. The best we can do is be prepared to prevent, detect and respond to (deal with) the threat when it materializes. Indeed, the realistic course is make it as hard as one possibly make it for hackers to break into systems.

There is more. There is no absolute security regardless of the amount of resources dedicated to system protection. A well-motivated hacker with an infinite resources (e.g. time and money) will break into a system however secure the system is deemed.

We will be discussing protection techniques in the future. Before that, however, we need to understand what motivates hackers and why they continue to be a menace.

Hacking has been around as long as computers existed. The menace has grown with the proliferation of the Internet and the Internet’s pervasive use. As the Internet reach grows, so also does the hacker threat. This is especially so given ease with which hackers, located in disparate locations, can collaborate and share attack techniques.

Hackers are people who usually intrude into computer systems and manipulate these systems for their own ends.  They are motivated by different interests, including the following:

Thrill for personal satisfaction

These are people who hack for the sake of hacking. They derive satisfaction from breaking into systems, for the fun the challenge the challenge presents and are motivated by anything other than the prize: breaking into systems. Some would then later brag about their escapades to their underground “communities” and in the process gain “respect” among their peers.

One can imagine the hackers in the recent Kenyan hacks bragging about how they embarrassed our forces and the Deputy President of the nation! Quite, some “respect” it would earn these intruders.

“Service to the Community”

These break into systems believing that exposing flaws in the systems is good for the community. Clearly they enjoy their thrill but also understand that once a flaw has been exposed, the people concerned will fix it and thus leave society better off. There was once a story of a kid who broke into a bank, created an accounted and planted a malicious program that, on a nightly basis deducted small amounts of money from all the accounts and deposited the amounts in an account he created. Later, it is said, he presented the evidence to the bank management. And he hadn’t withdrawn a cent from the large amount of money he had accumulated.

Now suppose that the hackers in the Kenyan cases intended “service to community”, they would rest easy that the government has woken up to the reality of exposure they face.

Motivated by Malice

Despite the above, my reading is that the people that hacked KDF and DP’s accounts were driven by malice. Even if they many not have gained access to sensitive KDF and DP information, the embarrassment in government ranks and across the country is palpable. As a result, some may question KDF’s ability to protect us when they cannot protect, as simple a thing as a twitter account. For the DP, the question I have had posed is: how could such a BIG office (with all the resources at its disposal) be so sloppy in the management of the DP’s communication channels.

Malicious hackers usually do a number of things once they enter a computer.

They may steal and (possibly) disclose sensitive information to unauthorized parties. For example, suppose such hackers gained access to the KDF’s battle strategy and plans. This would be treasure in the hands of an enemy.

Now suppose that they proceeded to modify the plans and which plans are then transmitted to the battle field. The consequences could be dire and those in the field could be acting on modified information. Indeed, suppose the hacker had ability to interfere with the timely and accurate transmission of such information! They would clearly hamper execution of battle plans to the detriment of KDF!

The term Information Warfare is becoming common place. This is where the theatre of war extends to cyberspace. Here hackers (working for parties in combat) target enemy targets in order to gain advantage in the field. A few years ago, Iranian nuclear facilities were infected by the stuxnet virus that paralyzed its nuclear centrifuges, clearly hampering the development of its nuclear program!

In the commercial arena the world is becoming more and more competitive. Whoever stays ahead in terms of research and development, and translating the information to products and services could stay ahead economically. Now suppose the malicious hacker gets hold of such intellectual property!

Industrial espionage is a reality today, whether by foreign or local parties.

In a recent case, systems of a large retail chain in North America (Target) were compromised. The hackers gained access to the company’s customer base, including credit card information. Such information could be used for malicious purposes including credit card fraud. While the impact on the retail chain hasn’t been quantified, clearly it suffered substantial brand image and (perhaps) to the advantage of its competitors.

Final words: pervasive technology use requires clear understanding of information protection needs. These include developing strategies, policies, deployment and operation needs to assure systems protection. Of necessity these needs would encompass aspects of people, processes and technology.

Dr Matunda Nyanchama is a Director and Managing Consultant at Agano Consulting Inc., an ICT services firm with offices in Canada and Kenya. He can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

Read 41310 times
Rate this item
(0 votes)

468 comments

  • Jasa Instagram
    Jasa Instagram Monday, 12 June 2017 19:22 Comment Link

    I simply could not leave your web site before suggesting that I actually loved the usual information a person supply to your guests? Is going to be back regularly in order to check up on new posts

  • Gambling
    Gambling Monday, 12 June 2017 18:56 Comment Link

    Interesting blog! Is your theme custom made or did you download it from somewhere? A theme like yours with a few simple tweeks would really make my blog jump out. Please let me know where you got your theme. Many thanks|

  • binabot v2 review
    binabot v2 review Monday, 12 June 2017 16:58 Comment Link

    wow, awesome post.Really thank you! Much obliged.

  • Vintage Luggage for sale
    Vintage Luggage for sale Monday, 12 June 2017 14:34 Comment Link

    Your style is very unique in comparison to other folks I ave read stuff from. Many thanks for posting when you ave got the opportunity, Guess I all just book mark this site.

  • detox cleanse smoothie recipes
    detox cleanse smoothie recipes Monday, 12 June 2017 12:07 Comment Link

    very couple of web sites that take place to become in depth below, from our point of view are undoubtedly nicely worth checking out

  • Alberta
    Alberta Monday, 12 June 2017 09:55 Comment Link

    Fantastic blog! Do you have any recommendations for aspiring writers?
    I'm hoping to start my own blog soon but I'm a little lost on everything.
    Would you advise starting with a free platform like Wordpress or go for a paid
    option? There are so many options out there that I'm totally overwhelmed ..
    Any ideas? Thanks a lot!

  • hondenverzekering
    hondenverzekering Monday, 12 June 2017 07:53 Comment Link

    You really make it appear really easy along with your presentation but I in finding this matter to be actually one thing that I think I would by no means understand. It kind of feels too complex and very vast for me. I am looking ahead on your subsequent put up, I'll attempt to get the cling of it!|

  • Upvc Windows  Doors
    Upvc Windows Doors Monday, 12 June 2017 01:35 Comment Link

    Terrific work! This is the type of info that should be shared across the web. Disgrace on Google for no longer positioning this put up higher! Come on over and discuss with my web site. Thank you =)

  • eurooppalotto.co.za
    eurooppalotto.co.za Sunday, 11 June 2017 23:08 Comment Link

    Thanks again for the blog post.Really thank you! Will read on

  • alessandro cassioli
    alessandro cassioli Sunday, 11 June 2017 22:26 Comment Link

    Good respond in return of this matter with genuine arguments and telling everything concerning that.|

Login to post comments

We are proud to be a leading in consulting and ICT training company. We are happy to serve you. Follow us on:

Our Firm

  • What we do
  • About us
  • Opportunities
  • Opinions & News
  • Contact
  • Partners
  • Awards
  • Experience
  • Events Calendar
  • Media Gallery

Twitter Feed

Jerry Lewis, comedy king and master of slapstick, dies at 91 https://t.co/Y79EXj7Y9v
RT @PanAfricanUnity: The real destruction of Black Civilization came after the destruction of our KNOWLEDGE of SELF! #Sankofa https://t.co/…
Follow Matunda Nyanchama on Twitter

Contact Info

Ufundi Plaza,
Moi Avenue
Nairobi, Kenya 00200

+254-20-267-0743

This email address is being protected from spambots. You need JavaScript enabled to view it.

8.00 am to 5.00 pm