How a Teenager Can Hack Your Law Firm
At an ILTACON session, a 15-year-old ethical hacker showed just how easy it is to target law firms and attorneys in today's cybersecurity world.
August 21, 2018 at 02:26 PM
4 minute read
While corporations and law firms have been successfully infiltrated by well-trained nation state cybercriminals with unique hacking resources at their disposal, these are far from the only hackers that may be able to breach today's cyber defenses.
Given the wide availability of hacking tools and resources, even those with little experience can comprise a company's IT and web assets. Just ask Marcus Weinberger, a 15-year-old ethical hacker and son of Ben Weinberger, lawyer in residence at Prosperoware.
Marcus Weinberger, the young presenter at the “Watch a 15 Year Old Hack Your Firm's Users” session at ILTACON 2018, only got into ethical hacking recently, and is in the midst of learning some coding languages, such as Python.
But by using widely available resources like Google and GitHub, and purchasing a few relatively inexpensive tools, he has been able to learn just how easily one can infiltrate a law firm's web assets and employees.
Weinberger noted that some of the hardware tools he uses as an ethical hacker include “a wireless development board usually used for IT projects and home automation,” and a WiFi Pineapple device, which is “basically a tinny wireless router used for wireless penetration testing” that can be leveraged for “man-in-the-middle” attacks. While WiFi Pineapple devices can be expensive, many of the others tools can usually be bought for under $10.
To be sure, the tools Weinberger used, and the resources he relied on to learn how to use them, are far from secret. “This is not the dark web we are talking about here. All tools are all readily available to anyone here,” he noted.
There are a few types of cyberattacks noted that are fairly simple for hackers to executive. Web attacks, for example, can leverage SQL injections, which is a code technique to access a website or web application's database server to get a hold of information including password and login data.
Indeed, one can even search on Google for websites that run on programming languages like SQL or PHP to know how best to target them. “Just by finding that particular string in the URL identifies what that website is running on,” Weinberger said.
Today's hackers can also automate web attacks by using available pre-written scripts so they don't need to know how to code or create web hacking tools from scratch.
While web attacks can be easy, they may not be as devastating as the slightly more involved Wi-Fi attacks. By using Wifi Pineapple devices and related tools, for instance, hackers can access many devices connected to public, unsecured networks.
“At one point my family and I were on holiday somewhere and we were in a Walmart getting some food,” Weinberger recalled. “And my phone is rooted [which means] I can do some hacking stuff on there, and I realized I could do a 'man-in-the-middle' attack on Walmart's public Wi-Fi.”
Wi-Fi attacks are also menacing because they can trick consumer devices into automatically connecting to a malicious network without the device's user knowing.
“When your phone scans for Wi-Fi it will send out a list of networks it is looking for … and what devices do is notice that list and respond, and your phone will automatically connect to those.” By spoofing a Wi-Fi network to mimic the name of a common network that devices will likely recognize and connect to, hackers can then comprise many devices, including personal devices used by law firm employees.
And instead of relying on technical exploits, Weinberger noted that hackers can also trick users into infecting their own computers with malware by executing automated phishing attacks.
One tool he found, for example, will send a Twitter user “a direct tweet from an account they are familiar with, and the tweet can include a phishing URL” that mimics a well-known link, but is really a malicious link. All one needs to do is create a fake Twitter account and get followed by some of their targets.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250