U.S. Government Wants to Return Malware Back to Sender

Cyber Crime is Skyrocketing – And the U.S. has a New Plan

With the increased cyber crime the world is facing today, countries are beginning to look for alternative methods to divert malware attacks.  The U.S. Defense Intelligence Agency is doing just that.  In recent reports, there have been talks of rerouting malware attacks back to the same sender it came from.  Essentially, a “return to sender” method.  Lieutenant-general, Vincent Stewart of the U.S. Defense Intelligence Agency recently stated,

“Once we’ve isolated malware, I want to reengineer it and prep to use it against the same adversary who sought to use against us. We must disrupt to exist.”

This may be a way to “teach the hackers a lesson”.  But how many times have we heard how difficult it is to catch cyber criminals because they leave virtually no tracks?  How would spending the time and money to implement this, be worthwhile?  Could it be?  Perhaps, but it’s a long shot.  Also, who is to say the hacker won’t see the “return to sender” occurring and reroute it elsewhere — thus making the U.S. government appear as a hacker to an innocent third-party?

There are several ways to look at this, but perhaps we focus on the biggest flaw of them all.  Why not stop the malware attack from beginning in the first place?  Block the threat, and you won’t have to return it back to the original sender.  Or work on remediation efforts.  Most solution providers have been complacent.  They haven’t advanced their technology to effectively combat today’s cyber threats.  Instead, they have continued to use an archaic blacklist approach which has proven time and time again, it is not effective.

Instead of consistently hoping for the best, knowing your slowing catching up to the hacker — why have the best security solution and stay one step ahead?  By implementing a default-deny approach, or application whitelisting technology, any unknown threats will be tested and proven safe before they are allowed to execute.  Thus, catching each new malware variant before it can worm its way into devices.

What are your thoughts on the government’s latest proposed approach?

 4,315 total views,  1 views today

(Visited 1 times, 1 visits today)

7 thoughts on “U.S. Government Wants to Return Malware Back to Sender”

  1. Its like a terrorist attack, you don’t know it’s going to happen until it happens. I mean the “don’t know” bit of that statement is that the innocent are normally the victims, hackers send their attacks from hacked servers that are just unconscious of what is happening so when we black list the IP address of the server it destroys an innocent companies sever/communications and the hacker just moves on to the next victim.

    So I think this policy will just hurt more innocent people than the actual hackers/terrorists as you might actually get to damage the odd one or two but that will only make them more determined to find another way.

  2. Excellent idea and this will also kill the multi billion dollar Anti-Virus / Internet Security industry that have blackmailed the www users for years.
    About time they came up with a fix for all the Spammers and Virus Code Programmers that have bludgeoned us and extorted money for their criminal activity ☺

    1. @Alan C Buckley: Malware has not been a problem since I installed PC MATIC with Super Shield.
      The program “WHITE LISTS” over 16,000 posts that should not be received.
      Go to PC PITSTOP and have a look. You will not be disappointed.

  3. I think if the entire world used whitelisting the bad guys would find another way to do their evil greedy deeds. We live in a wicked greedy world.

Leave a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.