Cris Thomas | |
---|---|
Nationality | American |
Other names | Space Rogue |
Alma mater | University of Massachusetts Lowell, Boston University |
Occupation(s) | Cyber Security Researcher, White hat hacker, Author |
Years active | 25 |
Known for | Whacked Mac Archives, Hacker News Network (HNN), CyberSquirrel1 (CS1), Cyber Security |
Cris Thomas (also known as Space Rogue) is an American cybersecurity researcher, white hat hacker, and award winning [1] [2] best selling [3] author. A founding member and researcher at the high-profile hacker security think tank L0pht Heavy Industries, Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1998) on the topic of government and homeland computer security, specifically warning of internet vulnerabilities and claiming that the group could "take down the internet within 30 minutes". [4]
Subsequently, Thomas pursued a career in Cyber Security Research while also embracing a public advocacy role as a cyber security subject-matter expert (SME) and pundit. Granting interviews and contributing articles, [5] Space Rogue's advocacy has served to educate and advise corporations, government, and the Public about security concerns and relative risk in the areas of election integrity, cyber terrorism, technology, [6] the anticipation of new risks associated with society's adoption of the Internet of things, [7] and balancing perspective (risk vs. hype). [8]
A founding member of the hacker think tank L0pht Heavy Industries, Thomas was the first of L0pht's members to leave following the merger of L0pht with @Stake in 2000, and the last to reveal his true name. [9] [10] Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1999). Testifying under his internet handle, Space Rogue, the testimony of Thomas and other L0pht members served to inform the government of current and future internet vulnerabilities to which federal and public channels were susceptible. The testimony marked the first time that persons not under federal witness protection were permitted to testify under assumed names. [4]
While at the L0pht Thomas created The Whacked Mac Archives and The Hacker News Network. In addition he released at least one security advisories detailing a flaw in FWB's Hard Disk Toolkit. [11] [12]
Thomas continued a career in Cyber Security Research at @Stake, [13] Guardent, Trustwave (Spiderlabs), [14] Tenable, [15] and IBM (X-Force Red). [16] Selected to serve as a panelist during a 2016 Atlantic Council cyber risk discussion series, [6] and a webinar speaker for the National Science Foundation's WATCH series, [17] [18] Thomas has embraced a public advocacy role as a cyber security subject-matter expert (SME) and pundit, granting interviews and contributing articles [5] to educate the public about security concerns and relative risk. Topics include election integrity, cyber terrorism, technology, [7] password security, [19] the anticipation of new risks associated with society's adoption of the Internet of things, [8] and balancing perspective (risk vs. hype). [20]
In response to a 2016 United States Government Accountability Office report [21] revealing the nation's nuclear weapons were under the control of computers that relied on outdated 8" floppy disks, [22] Thomas argued that the older computers, data storage systems, programming languages, and lack of internet connectivity would make it more difficult for hackers to access the systems, effectively reducing the vulnerability of the weapon control systems to hacking. [23]
Following cyber security mega-breaches at Target, [24] Home Depot, [25] and the U.S. Office of Personnel Management, [26] Thomas advocated for proactive implementation of basic security measures as the most effective means to thwart similar mega-threats. [27] Bluntly stating that the gap between knowledge and implementation leaves companies and individuals at unnecessary risk, Thomas’ recommendation focused on simple measures that have been known for one to two decades, but which organizations have not implemented universally. [27] Thomas had identified retail cyber security breaches, including that at FAO Schwarz, as early as 1999. [28] [29]
In 2017, at the Defcon hacker conference Thomas assisted with escorting Rep. Will Hurd (R) and Rep. Jim Langevin (D) around the conference area through the various villages. [30]
At Defcon 27 in 2019 Thomas appeared on a panel with Rep. Langevin (D-RI), [31] Rep. Lieu (D-CA), [32] and former Rep. Jane Harman [33] entitled "Hacking Congress: The Enemy of My Enemy Is My Friend." [34] During the panel Thomas was quoted as saying “It’s up to us as a community to engage with those people…to educate them”, "But Congress doesn't work that way; it doesn't work at the 'speed of hack'. If you're going to engage with it, you need to recognize this is an incremental journey” [35] and “it takes 20 years to go from hackers in Congress to Congress at DEF CON”. [36]
The Whacked Mac Archives was an FTP download site managed by Thomas with the world's largest collection of Apple Macintosh hacking tools. [37] The total size of all the tools on the site was 20MB. [38] A CD copy of the contents of the FTP site was advertised for sale in 2600: The Hacker Quarterly. [39]
Serving as Editor-in-Chief, [40] Thomas founded and managed L0pht's online newsletter and website, known as the Hacker News Network [41] (or simply Hacker News or HNN). [10] Originally created to rapidly share discoveries about computer security, Hacker News also became a forum for users to post security alerts as vulnerabilities were identified. [42] The publication grew, eventually supporting paid advertising and an audience that included technology journalists and companies with an interest in cybersecurity. [4] The website can be seen in several background shots of the video "Solar Sunrise: Dawn of a New Threat" [43] produced by the National Counterintelligence Center in 1999. [44]
After L0pht's merger with @Stake in 2000, the Responsible disclosure-focused Hacker News Network was replaced with Security News Network. [4] [45]
Hacker News Network, after a decade offline, set for a launch on Jan. 11, 2010, with video reports about security, [46] the last videos were published in 2011. [47] Hacker News Network in 2018 redirects to spacerogue.net [48] [49]
In 2013, Thomas created the project CyberSquirrel1 as a satirical demonstration of the relative risk of Cyberwarfare attacks on critical infrastructure elements such as the North American electrical grid. [50] Started as a Twitter feed, the CyberSquirrel1 project expanded to include a full website and CyberSquirrel Tracking Map; [51] as the dataset grew, Attrition.org's Brian Martin (alias “Jared E. Richo” a/k/a Jericho) joined the project in 2014. [20] CyberSquirrel1's results disrupted public perception regarding the prevalence of nation-based hacking cyberwarfare attacks, concluding that damage due to cyberwarfare (for example, Stuxnet) was "tiny compared to the cyber-threat caused by animals", [50] [52] referring to electrical disruptions caused by squirrels.
An archive containing the full data set and supporting material of the project was uploaded to the Internet Archive under the Creative Commons license on January 19, 2021.
As the 2015-2016 alleged Russian interference in the 2016 United States elections unfolded, public and media interest in hacking and hackers increased. [53] Leading up to the 2016 election, Thomas was interviewed for mainstream media productions, including CNBC's On the Money. [54] [55] After the release of the Joint Analysis Report, Thomas called for expanded detail on Indicators of Compromise in Federal Joint Analysis Reports, indicating that increased transparency and IP address reporting were instrumental for enhancing security. [56]
Prior to the 2018 election Thomas continued his advocacy speaking with CBS News and other outlets about securing our elections and the vulnerability of voting machines. [57] [58] [59] [60]
In February 2023 Thomas released his first book, Space Rogue: How the Hackers Known as L0pht Changed the World. [61] [62] Written as a personal memoir, the book detailed his childhood growing up in Maine, how he discovered the online world of BBS’s and met the other members of the hacker collective L0pht Heavy Industries. The book covers how the L0pht released security vulnerability information, created L0phtcrack, gained media recognition, and testified in front of Congress in 1998. The book also covers the L0pht’s transition to the security consultancy @Stake, and how the L0pht’s impact still ripples throughout the information security industry today.
The book spent several weeks in the Amazon top 10 in the Computer & Technology Biographies category and briefly hit number 1. [63] The book was a finalist in the 2023 International Book Awards. [64] and a winner of the 2023 National Indie Excellence Awards (NIEA). [65]
Computer security, cybersecurity, digital security, or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.
Chris Wysopal is an entrepreneur, computer security expert and co-founder and CTO of Veracode. He was a member of the high-profile hacker think tank the L0pht where he was a vulnerability researcher.
ATstake, Inc. was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures and Ted Julian. Its initial core team of technologists included Dan Geer and the east coast security team from Cambridge Technology Partners. Its initial core team of executives included Christopher Darby, James T. Mobley, and Christina Luconi.
Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. Since 2015, it operates as an independent subsidiary of Canon Inc.
FK Bregalnica Štip is a football club based in Štip, Republic of North Macedonia. They are currently competing in the North Macedonian Second League.
Klubi i Futbollit Shkëndija commonly known as Shkëndija, is a football club based in Tetovo, North Macedonia. Their home stadium is Ecolog Arena and they currently play in the Macedonian First League. In the 2010–11 season of the Macedonian First Football League, the club won its first major championship.
Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.
Korea Internet Neutral Exchange, the only carrier-neutral Internet exchange (IX) in South Korea, is a B2B company that specializes in Internet infrastructure. KINX provides Internet data center (IDC), content delivery network (CDN), and cloud computing services to customers. The headquarters is in Seoul, South Korea. As of March 2020, KINX has 126 employees.
The 26th Network Operations Squadron, United States Air Force, is a network operations unit located at Gunter Annex, in Montgomery, AL.
Electrical disruptions caused by squirrels are common and widespread, and can involve the disruption of power grids. It has been hypothesized that the threat to the internet, infrastructure and services posed by squirrels may exceed that posed by cyber-attacks. Although many commentators have highlighted humorous aspects of the concern, squirrels have proven consistently able to cripple power grids in many countries, and the danger posed to the electrical grid from squirrels is ongoing and significant. This has led to tabulations and maps compiled of the relevant data.
Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with contracts awarded to Tenable, Inc. (then known as Tenable Network Security) and Hewlett Packard Enterprise Services to improve cybersecurity within the DoD. It is mandated by regulations for all DoD agencies and is deployed via download. Part of the ACAS software monitors passive network traffic, new network hosts, and applications that are vulnerable to compromise. It also generates required reports and data that are remotely accessible, with a centralized console, and is Security Content Automation Protocol (SCAP) compliant. The Defense Information Systems Agency's Cyber Development (CD) provides program management and support in the deployment of ACAS. The Army's Systems Engineering and Integration Directorate said in 2016 that ACAS gives the Army "a clear, specific and timely picture of cyber vulnerabilities and how they are being addressed. Not only does the technology streamline processes at the operator level, it also enables broader goals such as the Cybersecurity Scorecard and automated patching for improved mission assurance."
Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.
Log4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. The vulnerability had existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud's security team on 24 November 2021. Before an official CVE identifier was made available on 10 December 2021, the vulnerability circulated with the name "Log4Shell", given by Free Wortley of the LunaSec team, which was initially used to track the issue online. Apache gave Log4Shell a CVSS severity rating of 10, the highest available score. The exploit was simple to execute and is estimated to have had the potential to affect hundreds of millions of devices.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite news}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: CS1 maint: bot: original URL status unknown (link)