Hacker tool: Cloud supercomputers
Updated: Nov 18, 2019
What is a hacker cloud supercomputer?
The employment of cloud-based and remote resources to handle processing and calculations for any program algorithm or software for illegal use is a hacker cloud supercomputer.
Supercomputers, in the beginning, were physically large machines and a network of smaller computers tasked with programs that require an enormous amount of processing. Processing that delegates resources that are available and can accommodate said calculations. Even as we speak, government agencies and intelligence agencies house such computers in their private network. To process the vast amount of intelligence they receive daily. The amount of data they process is so enormous that we don't even know the size of the data. And no, they are not in the terabytes, a terabyte is not a lot of data. Yes, you can store a lot of movies in a one terabyte hard disk, but we implore you to focus on the topic at hand. We are talking about data that is a trillion times more than your one terabyte hard disk, at least.
MO: modus operandi
Just like most things in life, there is always a purpose or reason why hackers do what they do best. Be it political or monetary (still the main two reasons). Sometimes, the reason a hacker would want to possess a supercomputer is power.
- Cracking encryption and passwords/pass-code
- Crypto mining
- DDOS attacks (Dedicated denial of service)
- Virtual Private Network for masking their trail
- Data hacking
- Breaching highly secure government data centers
- Cyber espionage and manipulation of data (spying)
- Personal attacks or crashing computers or hardware
The possibilities are endless. Think of the worst thing you can do with a computer; chances are you can add that to this list.
You have a website, and as with all sites, it has to sit somewhere. And no, it does not sit on a real cloud. There is a computer, a bunch of computers or servers sitting on a rack somewhere on the planet, and these computers are where your website makes itself comfortable. So every time someone goes online and types your website address, they direct these computers closest to your physical location.
Depending on how your website is set up, each site allocates a certain amount of space, processing, and ram. Think of it as computer rations. So one server or computer can host more than one website. Take, for example, half of one server's resource allocated to your site.
This means your website has all of this processing power and storage to process. A good practice is to allocate more than enough resources because the more traffic to your website, the more processing power, and ram and storage are required. So at any one time, there is plenty of space in your allocated computer ration that is unused.
So say your website is not entirely secure. Whoever developed your website did not deploy the best available security practices to secure your website. It's the perfect opportunity for a hacker to go inside your site and install their applications into it.
So if you have a website that receives very little traffic but crashes all the time, your website could be hijacked. IT Block has found quite a few sites with crypto-mining applications inside of it. Imagine you pay each year for website hosting, and these hackers made money for free off you. Sneaky.
Say you have a website, much like what we said earlier. Or you have an application perhaps. Or maybe even an ERP system. And all of these are deployed in AWS or Google Cloud or Microsoft Azure. Secure right. You are right; they are very reliable. As safe as they come. The caveat here would be they secure everything on their end of the table.
What this means to be exact, hackers would have a difficult time breaking through their security measures. Why bother when they can hack you, right? All they want are the keys.
Cloud services are very secure, but they do give out keys. So anyone who has the key can access your cloud-computing resource has the rights to access them. For example, a website's SSL certificate expires, this leaves an opening for hackers to latch on and monitor the connection to and from your website or application. Once they have access to the back end of your cloud servers, they can install and run anything on it.
Your laptop and desktop are not safe. If you were to google, "the internet is slowing down" or "my laptop is slowing down." You will realize they almost all say the reason as "malware."
Malware is a broad term. Malware could mean virus, spyware, keylogging software, worms, suspicious programs, etc. But what we fail to realize is how malware on your system is feeding information back to its source.
It is a scary thought, but yes your computer could at this moment be transmitting information. Say a hacker wants to break the encryption of a file, they would be able to disseminate all the decryption responsibility to every computer "infected" with their software. And every computer that connects to the internet with this "software" will perform calculations on behalf of the parent software housed in the hacker's network. FYI, hackers almost always run a virtual private computer in their machine as a security measure. They know how to cover their tracks.
The government created the internet. It is ironic, the very same technology pitted against them.
A talented programmer cum hacker could create exquisite software. Maybe they make a free video player or free antivirus software. People love how great this software is and use it all the time to watch movies.
The software launches every time you start up your computer and runs in the background. And maybe the software is using a negligible amount of computing power from your computer.
Say this application becomes very popular, and millions of people around the world are using it daily.
Say this programmer is secretly a hacker. Not only does the tentacle of his software reach personal computers everywhere, office servers, cloud resources, and web servers too.
Theoretically, you could design a DDOS attacking software that attacks any website from every one of these resources and crash it. Worst of all, you cannot block these IP addresses, since these are everyday users anyway. They need access to the website which they attacked. Maybe the website attacked is amazon or a government health website.
You have to admit, that did sound a lot like a zombie apocalypse. The best cybersecurity agency or government agency has limited physical locations. And they need a physical space to house their supercomputers. They cannot legally use everyone's computer against these hackers. They restrict the confines of what is legal. The same goes for law enforcement. And like a zombie apocalypse, it does not make sense to go after the zombie. You have to go to the source of the problem.
Forgive us for exaggerating. Unlike a zombie apocalypse, such an infection is very curable with a vaccine-like approach to the problem. And very much like a vaccine, one has to locate the source. And that is not a simple task, nor is it an impossible one.
To summarize, you shouldn't panic. Crimes evolve, and so does enforcement. What you can do is always to hire a professional when sensitive data is at stake.
Also, if you are never sure, try a VPN, for extra security.
And if you would like to know more about it, talk to us. We will be glad to give you any advice. After all, we are an IT services provider based in Singapore.
And as always, please like and share if you can. We thank you for reading this and have a beautiful day ahead.