Home Latest Insights | News 1960 Mainframe Hacking to Social Media ‘BlackHats’ today; killing the virus the Reverse Pareto Principle Way

1960 Mainframe Hacking to Social Media ‘BlackHats’ today; killing the virus the Reverse Pareto Principle Way

1960 Mainframe Hacking to Social Media ‘BlackHats’ today; killing the virus the Reverse Pareto Principle Way

The origin of ‘BlackHat’ , ‘WhiteHat’ and hacking.

‘Hacks’ started as programming shortcuts in the 1960s, to complete computing tasks more quickly. In some cases shortcuts were better than the original program. The UNIX operating system was accidentally developed as a result of attempts to ‘hack’

Meriam Wester calls a ‘WhiteHat’ a hacker who tests computer systems for possible vulnerabilities so that they can be fixed while it calls a ‘BlackHat’ one who infiltrates a computer system for malicious purposes.
As technology improved and computing became more accessible – smaller, cheaper, more powerful… frequency of hacking events increased. More specialized types of hacking emerged – email phishing, viruses, trojans, malware and eventually, ransomware. Computers providing disc drives for portable storage emerged, followed by USB (Universal Side Bus) and memory card reader interfaces. These added new methods of introducing more threats.  Portable storage media continuously became smaller and easier to conceal while capable of carrying more and more malicious bots and scripts. Corporate Intranets and LANs (Local Area Networks) evolved, so once one computer got compromised, all computers on the same private network were vulnerable.
In the more developed parts of the world, Internet started to become commonplace amongst large corporations by the end of 1993 and affordable (but not unmetered) to small offices and home users in large metropolis by 1995.
This created the opportunity for self-replicating viruses to create virtual pandemics through infected email files, and for websites with unscrupulous owners to gather peoples sensitive data without their consent.

The first anti-virus ever was during the 1970’s called ‘Reaper’, but was actually a virus mimic which was designed to take out one of the earliest viruses known as ‘Creeper’. Fully functional anti-virus programs didn’t start coming along until the 1990’s with Avast, Symantec’s ‘Nortons’, Dr. Solomon and Mc Afee being some of the first. Modern networks deploy UTM (Unified Threat Management) solutions, where Security Software companies and Firewall/Gateway Router Hardware companies partner to provide network security. Antivirus, Anti-malware, Firewall, Intrusion Prevention, Virtual Private Networking (VPN),  Web Filtering, Data Loss Prevention and Anti Spam are common threat management tools on a UTM device.

Fortinet, WatchGuard, Barracuda,  Zyxel , Sophos, Sonic Wall and Symantec Bluecoat are some of the leading providers. While many provide their complete solution end-to-end, Kaspersky and McAfee are common choices as software end-point integration partners. DarkTrace, F-Secure and Kerio Control, are examples of Cloud based providers.

BlackHat’ virtual marketing

BlackHat virtual marketing takes many guises. Three main areas are BlackHat mass email campaigns, BlackHat SEO (Search Engine Optimization) behavior, and BlackHat Online Platform/Social Media account management (BlackHat SMO).
Some BlackHat online activities are extremely malicious and include what in Nigeria are known as ‘419’ (advance fee fraud) scams. Others divert people to fake websites which seek to secure personal details to commit identity fraud. Identity fraud usually comes in two forms. 1. To defraud the targeted identity of their assets, such as bank reserves or 2. To commit an illegal act by assuming the targets identity, keeping the actual criminal beyond reach of authorities.
Other activities may be less malicious and be major time-wasters. Nevertheless, they can’t be viewed as benign. Remember – ‘Time is Money’.

 

BlackHat mass email campaigns

BlackHat mass email campaigns use The ‘Brute Force Method’. In cyber attacks, “Brute force attack” refers to a method used to obtain private information such as usernames, passwords, passphrases, and similar. By repeatedly submitting different combinations of credentials, attackers can ultimately guess them correctly, and gain access to the data those credentials protect.'(Security Trails Blog). In similar fashion the ‘Brute Force Method’ harvests email addresses indiscriminately from various sources (such as the registered email account of LinkedIn contacts). It then sends emails with identical content (spams) the whole of the harvested list without any effort to target only those people for whom the content will be relevant. It is often only a fraction of a percent of the mailing list that find the email useful. This means it becomes a timewasting nuisance to 99.9% who have been mailed. UTM’s generally co-operate on blacklists and such behaviour lands the spammers address on the blacklist which is updated regularly by ‘software definition’ files on the UTM. Those operating outside corporate services might be best to use ‘burner’ email addresses when signing up for stuff, especially anything ‘free’. Review content and burn the burner once a month.

 

 

BlackHat SEO (Search Engine Optimization)

 

There are several BlackHat SEO techniques and only one will be dealt with here as an example – ‘Keyword Stuffing’. ‘Keyword stuffing’ is the inclusion of an unnatural number of keywords. When you’re practicing on-site SEO and you choose a keyword to include in your content, make sure you don’t overuse that keyword. Also, failing to use important keywords in your content will tell Google you shouldn’t be highly ranked. As a result, it will lower your chance of people finding your website’ (Joshua Lyons Marketing)
BlackHat SEO behaviour tends to be common amongst small independents working freelance on web design for small businesses and individuals.
.Once search engine listing kicks in, the BlackHat strategies will generate good visibility for a while. The customer will think the web designer/SEO did a great job. As the search engine algorithms gradually start picking apart the contrasts between the BlackHat manifestations and the site content in general, the visibility will start to slip. At this stage, the customer is unlikely to realize it is the work of the web designer/SEO and will probably think they are getting something wrong, or put it down to some other cause.

 

BlackHat Online Platform/Social Media account management (BlackHat SMO).

 

Engagement  in online platforms generally falls into three categories of users. 1. The SMO Machine of large corporations who have a professional SMO structure. 2. Amateur/Freelance SMOs who don’t consistently represent a specific brand or client. Some may have some aspiration to monetize their engagement on a platform, but as yet are only building an unfocused network/following by weight of numbers. Some see it as a potential ‘side hustle’  and don’t yet have a clear plan or a firm commitment. 3. Generic users.

Tekedia Mini-MBA edition 16 (Feb 10 – May 3, 2025) opens registrations; register today for early bird discounts.

Tekedia AI in Business Masterclass opens registrations here.

Join Tekedia Capital Syndicate and invest in Africa’s finest startups here.

In this article, we will focus on LinkedIn, because it is the platform which has the highest level of sensitivity to BlackHat SMO behaviour.
The sensitivity arises from LinkedIn being a professional networking platform rather than generic social media. It is unlikely anybody joins LinkedIn as a means to keep in social contact with friends and family, be amused, or have fun. In this way, much of the Generic users, by far the majority, are sensitized to BlackHat SMO behaviour on LinkedIn, in a way less likely on ‘Social Media’ Platforms.
The other thing that is that many users join the LinkedIn professional networking platform with a mature understanding of ‘Social Media’ Platforms and start exhibiting behaviours not a good fit for LinkedIn. In that way, it is not that easy to recognize where engagement poorly aligned with platform purpose ends, and deliberate BlackHat SMO tactics start.
“If you can get better at your job, you should be an active member of LinkedIn, because LinkedIn should be connecting you to the information, insights and people to be more effective.” –Reid Hoffman, Co-Founder of LinkedIn
Now, its indisputable, that Reid Hoffman, a LinkedIn Founder, is in a position to say exactly what the platform is, and by inference, what it isn’t. This author will only argue that point, if Reid is not being taken at his word and somebody who didn’t invent the platform thinks they know better!
So, since Reid has said the platform should be ‘connecting you to the information, insights … to be more effective (in your job)’ then the sum content in a members ‘feed’ which is failing that criteria, is collectively, a VIRAL LOAD.
And like any anti-viral approach, we need a means to identify and classify viruses and a way of dealing with them. Lets investigate some LinkedIn borne viruses.

 

The ‘fire and forget’ virus
Corporations are generally fairly tight on staying ‘topical’ and ‘brand centric’ on LinkedIn. If Diageo post, it’s almost a given professionals linked with anything alcohol related will get something topical. Mondelez is highly likely to be relevant to FMCG, while MTN will probably be a product in the Telecoms space. Big companies will generally have a Chief Marketing Officer, followed by perhaps a Vice President of Social Media, and perhaps two or more layers of subordinates. This creates a structure for checks and balances before publishing content.
What corporates sometimes fail on, is realizing LinkedIn is an engagement platform and when they have made their post, the work isn’t finished, it just started. Failing to service replies is big brand damage.

 

The ‘fan club’ aka the celebration or admiration virus
This ‘virus’ creates background noise in feed for third parties when someone they barely know congratulates someone they don’t know at all on things like new jobs, birthdays, academic achievements, retirements, or other personal milestones. It is a bit ‘look at me-ish’ and would be more sincere if it was either done by DM or not at all. Either way, it would reduce the ‘viral load’ on third parties.

 

The motivation, inspiration or life challenge virus
When these viruses show up in feed, they increase the ‘viral load’ and reduce the visibility of content that meets the ‘Reid Hoffman’ standard.

 

The ‘agree?’ virus
An older cousin to the above virus, usually telling a fictitious scenario around HR or Recruitment, preaching to the converted, and ending with the phrase ‘Agree?’

 

The baited conflict virus
This is a very agile and infectious virus. This is achieved through posts which encourage support, and ‘devils advocate’ responses in as close to equal measure as possible. The poster doesn’t care whether the initial position is supported or not, as long as a hostile debate ensues. Examples could be baiting Trump supporters into a Biden criticism in the US, or starting a debate about who deserves to win, in a global sporting final. The object of the poster is simply to be at the centre of the noise, it doesn’t matter much who wins.

 

The random content virus
The random content virus is something which members do when they find something they think is infectious and immediately impactful though it has no ‘Reid Hoffman’ value. It’s probably been picked up from a Social Media account, and is reposted on LinkedIn verbatim by members too lazy to author original content.

 

The bandwagon virus
The bandwagon virus is lemming behaviour focusing on whatever seems to be commonly circulating at the time. At the moment it is ‘pointless polls’. In a few months it will probably be something else.

 

In the interests of expediency, we will end the virus list here! Now while search engines have algorithm tricks to clobber the work of rogue SEOs, UTMs have definition files to deal with email blacklists, and LinkedIn has algorithms to prioritize content in feed, there is no known anti-virus solutions to these types of viruses.
They may seem harmless, but they are distracting and time wasting. On their own, the ideology ‘why become bemused?.. can’t you just scroll by?’ has some merit, but as a bulk ‘viral load’ together they can waste time like dealing with a bunch of spam emails… wouldn’t it be much more beneficial if they just were not there?
My ‘Brave’ browser interface displays data on the performance of its security features for the most recent session.
The problem is that they represent the unconnected organic actions of different members. In this way the only solution must be an organic response. Hence the ‘Reverse Pareto Principle’.

 

What is the Pareto Principle?

The Pareto Principle, is also called the 80-20 rule.

 It is ‘an aphorism which asserts that 80% of outcomes (or outputs) result from 20% of all causes (or inputs) for any given event. In business, a goal of the 80-20 rule is to identify inputs that are potentially the most productive and make them the priority. For instance, once managers identify factors that are critical to their company’s success, they should give those factors the most focus’.

Although the 80-20 axiom is frequently used in business and economics, you can apply the concept to any field—such as wealth distribution, personal finance, spending habits, and even infidelity in personal relationships’. – investopedia.com
I call 20-80 the ‘Reverse Pareto Principle’
My organic solution is simple. Every day, I pick a continuous flow of 50 entries in my feed, and pick the 10 worst performers against the ‘Reid Hoffman’ standard. I do a quick check of their page to satisfy myself that the entry isn’t uncharacteristic (don’t want to throw the baby out with the bathwater!).
Then I just ‘unfollow’ all 10 of them.
It might seem like a lot of work, but after a while it does get easier, and this organic ‘anti-virus’ does gradually improve feed… well… for those for whom Reid Hoffman’s vision for the network he co-created is important.
If members feel their traction losing grip by contributing in ways that increase the ‘viral load’ then at least some of them will be keen to modify their contribution behaviour to recover traction.
Those who have no interest in doing it for themselves should try to think of the welfare of all the Nigerians who are struggling to put food on the table for their families and have limited browsing capacity due to ‘metered’ available data. When they come online to try to do a bit of job search hustle and they meet an endless wall of BlackHat SMO virus feed content which has to scrolled past, eating precious data, the result can literally be murder!

 

References and Acknowledgements (not in the main text body) :

www.esecurityplanet.com/products/unified-threat-management-vendors/
www.fortinet.com/resources/cyberglossary/unified-threat-management
https://blog.ongig.com/job-titles/social-media-job-titles/
https://jjlyonsmarketing.com/resources/buying-links-and-other-blackhat-seo-tactics-that-can-get-you-in-trouble/
http://plaza.ufl.edu/ysmgator/projects/project2/history.html
www.toolbox.com/it-security/vulnerability-management/articles/what-is-unified-threat-management/
securitytrails.com/blog/brute-force-attacks

No posts to display

Post Comment

Please enter your comment!
Please enter your name here