{"id":17375,"date":"2020-09-15T00:34:29","date_gmt":"2020-09-14T20:34:29","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/hackers-movie\/17375\/"},"modified":"2020-09-15T00:34:29","modified_gmt":"2020-09-14T20:34:29","slug":"hackers-movie","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/hackers-movie\/17375\/","title":{"rendered":"A modern take on the movie Hackers"},"content":{"rendered":"<p>Several common misconceptions hinder the widespread adoption of cybersecurity culture. One myth \u2014 hackers are really smart, so it\u2019s pointless to fight them \u2014was popularized in particular by the movie <em>Hackers<\/em>, released exactly a quarter of a century ago. The movie gave rise to a set of clich\u00e9s still employed by the film industry.<\/p>\n<p>Indeed, the movie\u2019s misfit heroes and their adversary, Plague, an infosec expert at Ellingson Mineral, are portrayed as highly intelligent geeks able to find and exploit vulnerabilities in any information system.<\/p>\n<p>For example, the main character is equally at ease breaking into a school database and a cable operator\u2019s network. Phantom Phreak makes calls from payphones to Venezuela without paying a cent. Even Joey, the group\u2019s youngest and \u00a0least-experienced hacker, manages to gain access to the Gibson supercomputer at Ellingson Mineral. It all looks quite impressive (for 1995) but let\u2019s take a closer look at the crew\u2019s accomplishments.<\/p>\n<h2>Hacking a TV station<\/h2>\n<p>The protagonist, Dade (aka Crash Override), breaks into the network of a TV station to replace a dull show with something more captivating. He does so by calling the night guard, posing as an accounting employee who needs access to his computer, and asking the guard to read out the phone number on the dial-up modem.<\/p>\n<p>On the one hand, it\u2019s basic social engineering. On the other hand, it\u2019s lunacy on the part of the company \u2014 and I\u2019m not even talking about the haplessness of the guard. Why is the accountant\u2019s computer on the same network that controls the broadcast? Why does it have a modem constantly waiting for an incoming call? Why is the phone number written on the modem?<\/p>\n<p>While that intrusion is going on, it turns out another hacker is already inside the company\u2019s network: Kate, aka Acid Burn. How did she get there? Well, the company probably has other computers with exposed modems.<\/p>\n<h2>Hacking Gibson<\/h2>\n<p>Novice hacker Joey breaks into the Gibson supercomputer. That is, he logs in through a modem from home using the head of PR\u2019s super-secure account password, <em>god<\/em>. That\u2019s despite every character in the movie (including said head of PR and Plague, who is responsible for the company\u2019s security) knowing that the most common passwords in this flick\u2019s reality are <em>love, secret, sex<\/em>, and <em>god<\/em>. What\u2019s more, the head of PR has superuser rights for some inexplicable reason. All told, the hackers\u2019 \u201cgreat\u201d achievement is less about ingenuity than corporate fecklessness.<\/p>\n<h2>Plague\u2019s skullduggery<\/h2>\n<p>The movie\u2019s plot revolves around the cunning scheme of the hacker Plague, who works at Ellingson Mineral. He writes a piece of malware to salami-slice a few cents off every company transaction, and transfers the proceeds to a secret account in the Bahamas. That might have been an original plotline had a similar scheme not been deployed 12 years earlier in the movie <em>Superman III<\/em>. For some reason, everyone describes the malware as a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/worm\/\" target=\"_blank\" rel=\"noopener noreferrer\">worm<\/a>, although the film says nothing about its distribution and replication.<\/p>\n<p>Based on that information, can we really consider Plague a cybercriminal genius? Hardly. He heads information security at a company where no one apart from him has the first clue about the subject. And he\u2019s in cahoots with the head of the PR department, effectively giving him carte blanche? It\u2019s an insider attack; the problem is not so much a lapse in cybersecurity as the company\u2019s recruiting policy.<\/p>\n<h2>Da Vinci virus<\/h2>\n<p>When Joey accidentally downloads part of the \u201cworm,\u201d Plague launches a virus (again, it\u2019s not clear if it actually is a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">virus<\/a>, or whether the writers just liked the sound of what in 1995 was a new term for most moviegoers) by the name of Da Vinci. The malware seizes remote control of the target company\u2019s oil tankers with the potential to capsize them by pumping water into the ballast tanks. In fact, though, the \u201cvirus\u201d is a red herring.<\/p>\n<p>Plague is simply using it to (a) divert attention from the money-grabbing \u201cworm,\u201d (b) accuse Joey and pals of hacking into the company and ultimately blame them for the \u201cworm,\u201d and (c) turn them over to the Secret Service, get inside Joey\u2019s computer, and find out what information has leaked \u2014 not to mention buy time for the malware to siphon off more cash.<\/p>\n<p>In fact, such a \u201cvirus\u201d is way too futuristic for that time. For a start, the very idea of a seagoing vessel in 1995 being permanently connected to the operator company\u2019s navigation systems is crazy. First, the Internet is not needed for navigation either today or back then; the GPS system was already fully operational and available to civilians.<\/p>\n<p>Second, for a ship to have been constantly online in the mid-1990s plays fast and loose with reality. Data transfer by satellite didn\u2019t exist then; it would have required a permanent\u00a0\u2014 and prohibitively expensive\u00a0\u2014 modem connection over a voice line.<\/p>\n<p>Moreover, tankers (which could be classified as critical infrastructure) do not have backup manual systems for ballast water injection control.\u00a0The process is fully computerized. For that matter, a computer is perfectly capable of failing even without malware. In short, for the Da Vinci virus to work, someone would have had to lay the long and laborious groundwork to sabotage the merchant vessel, including at the stage of ship design.<\/p>\n<h2>Preparing for the showdown<\/h2>\n<p>The protagonists decide to stop the dastardly Da Vinci and obtain the full code of the \u201cworm\u201d to find out where the stolen money is being transferred. Their preparations are nothing if not thorough. But here the movie begins to go off the rails.<\/p>\n<p>The hacker Cereal Killer impersonates a telephone company employee, infiltrates the building of the US Secret Service, and plants a bug there. (Why none of the employees, supposedly professionals, suspects a teenager in saggy pants is a mystery, as is his off-screen punishment.)<\/p>\n<p>Dade and Kate sift through Ellingson Mineral\u2019s trash and steal some papers. That bit\u2019s believable\u00a0\u2014 even today not every company monitors how and where its garbage gets chucked. But a perusal of the trashed documents handily serves up 50 passwords that can be used to penetrate the corporate systems. More a gusher than a leak.<\/p>\n<h2>The final battle for Gibson<\/h2>\n<p>The main characters ask the hacker community for help, and together they bombard the supercomputer with viruses. At this point, the film has finally lost all connection with reality. Unfortunately, we know nothing about the architecture of Ellingson Mineral\u2019s information systems, and therefore can\u2019t quite work out how a throng of attackers can simultaneously connect to Gibson, upload an assortment of viruses, and download the \u201cworm.\u201d<\/p>\n<p>It is not even clear whether they acted over the Internet or somehow connected directly to the company\u2019s internal modems. In any case, Plague somehow pinpoints the source of the attacks.<\/p>\n<p>At this point, the curious phrase \u201cMultiple GPI and FSI viruses\u201d is heard. GPI stands for <em>General Purpose Infectors<\/em>, a long-outdated name for viruses that can be embedded in any executable file. FSIs, or <em>File Specific Infectors<\/em>, are viruses that target files of a certain format. In other words, the phrase basically means that the security team can see a lot of viruses.<\/p>\n<h2>International calls<\/h2>\n<p>Throughout the film, the hacker known as Phantom Phreak uses payphones free. The technique, which seems the least plausible from a 2020 perspective, is actually the most credible. In those days, phreaking\u00a0\u2014 breaking into telephone systems\u00a0\u2014 was a core part of hacker culture, hence Phantom Phreak\u2019s name.<\/p>\n<p>To make free calls, he uses a device that generates tones to simulate coins being inserted into the phone, a ploy known as <em>red boxing<\/em>. It really did work, and instructions were widely circulated in hacker communities even in the pre-Internet age. Thinking that coins had been dropped in, payphones signaled to the billing system how many minutes to give the phreaker.<\/p>\n<p>By 1995, red boxing was already on its way out. Telephone companies, aware of the vulnerability, were busy implementing protective technologies such as frequency filters, duplication over digital channels, and ways to physically verify the number of coins inserted. But red boxing was still in play at the time of the movie\u2019s release.<\/p>\n<h2>Equipment<\/h2>\n<p>Of special interest is the equipment used by the hackers. Kate, hailing from a wealthy family, works on a P6 laptop, which she says is \u201cthree times faster than a Pentium.\u201d That\u2019s a reference to the Pentium Pro, the first of Intel\u2019s sixth-generation x86 microprocessors. In those days it really was the world\u2019s most powerful chip, and it was released, like the film, in 1995. And Kate\u2019s modem could clock a speed of 28,800 kbps\u00a0\u2014 another best for that time.<\/p>\n<p>However, a closer inspection reveals that when connecting through public telephone booths, the protagonists use what looks like an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Acoustic_coupler\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">acoustic coupler<\/a>, which converts acoustic signals into digital ones. That\u2019s an extremely unreliable contraption that supported only 1,200 kbps, and by 1995 it was hopelessly outdated. Still, it looks impressive.<\/p>\n<h2>Pure fantasy<\/h2>\n<p>Other moments in the movie also stretch the imagination to the breaking point. Among other things, the hackers go after a government agent, during which they:<\/p>\n<ul>\n<li>block his credit card;<\/li>\n<li>add bogus traffic violations to his record;<\/li>\n<li>declare him dead in the Secret Service database.<\/li>\n<\/ul>\n<p>It is not clear how they manage to do all this, but, once again, it is more testament to the incompetence of the bank, the police, and the Secret Service than to the ingenuity of the hackers. The only convincing trick the hackers play is posting a lewd ad on a dating site. But that doesn\u2019t take hacker skills, just a particular sense of humor.<\/p>\n<p>And the finale wouldn\u2019t be complete without the antiheroes causing chaos by hacking the city\u2019s traffic lights. Classic.<\/p>\n<h2>The bottom line<\/h2>\n<p>Even on-screen hackers are not superhuman; they simply exploit the mistakes and stupidity of others. And most real-life attackers are even less expert, hardly evil geniuses. Our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness<\/a> training platform helps clear up this and many other misconceptions, teaching employees to avoid obvious mistakes.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>To mark the film\u2019s 25th anniversary, we examine Hackers in terms of modern information security.<\/p>\n","protected":false},"author":700,"featured_media":17376,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[78,2187,2047],"class_list":{"0":"post-17375","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-hackers","11":"tag-movie","12":"tag-truth"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hackers-movie\/17375\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hackers-movie\/21901\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/hackers-movie\/8584\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hackers-movie\/23292\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hackers-movie\/21484\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hackers-movie\/20096\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hackers-movie\/23869\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hackers-movie\/22822\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hackers-movie\/29082\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hackers-movie\/8818\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hackers-movie\/37028\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hackers-movie\/15673\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hackers-movie\/16035\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hackers-movie\/13979\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hackers-movie\/25156\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hackers-movie\/29243\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hackers-movie\/26085\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hackers-movie\/22873\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hackers-movie\/28195\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hackers-movie\/28027\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/movie\/","name":"movie"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17375"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17375\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17376"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}