Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Google Pixel 10 Pro Fold to Feature a Slimmer Hinge, IP68 Rating: Report

24 June 2025

Tecno Spark Go 2 With 5,000mAh Battery, Free Link App Support Launched in India: Price, Specifications

24 June 2025

The Best Lip Balms for When Your Skin Is Crashing Out

24 June 2025
Facebook X (Twitter) Instagram
Just In
  • Google Pixel 10 Pro Fold to Feature a Slimmer Hinge, IP68 Rating: Report
  • Tecno Spark Go 2 With 5,000mAh Battery, Free Link App Support Launched in India: Price, Specifications
  • The Best Lip Balms for When Your Skin Is Crashing Out
  • VSCO to Launch Capture, a Dedicated Camera App for iPhone With Film-Style Presets: Report
  • Lenovo Chromebook Plus Price (25 Jun 2025) Specification & Reviews । Lenovo Laptops
  • Drag x Drive Launches On Nintendo Switch 2 This August
  • OnePlus Nord 5 Camera Details Revealed Ahead of July 8 Launch; Buds 4 to Offer Up to 55dB ANC
  • Lenovo Chromebook Plus With MediaTek Kompanio Ultra 910, Google AI Features and Dolby Atmos Launched
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
News

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

News RoomBy News Room4 April 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

“That’s not nice, and it’s not a good norm,” says Schneider. She says that much of the US government’s slow approach to cyberattacks stems from its care to ensure it avoids unintentionally hitting civilians as well as breaking international law or triggering dangerous blowback.

Still, Schneider concedes that Caceres and Angus have a point: The US could be using its cyber forces more, and some of the explanations for why it doesn’t amount to bureaucracy. “There are good reasons, and then there are bad reasons,” says Schneider. “Like, we have complicated organizational politics, we don’t know how to do things differently, we’re bad at using this type of talent, we’ve been doing it this way for 50 years, and it worked well for dropping bombs.”

America’s offensive hacking has, by all appearances, gotten less aggressive and less nimble over the past half decade, Schneider points out. Starting in 2018, for instance, General Paul Nakasone, then the head of Cyber Command, advocated a “defend forward” strategy aimed at taking cyber conflict to the enemy’s network rather than waiting for it to occur on America’s turf. In those years, Cyber Command launched disruptive hacking operations designed to cripple Russia’s disinformation-spouting Internet Research Agency troll farm and take down the infrastructure of the Trickbot ransomware group, which some feared at the time might be used to interfere in the 2020 election. Since then, however, Cyber Command and other US military hackers appear to have gone relatively quiet, often leaving the response to foreign hackers to law enforcement agencies like the FBI, which face far more legal constraints.

Caceres isn’t entirely wrong to criticize that more conservative stance, says Jason Healey, who until February served as a senior cybersecurity strategist at the US Cybersecurity and Infrastructure Security Agency. He responds to Caceres’ cyberhawk arguments by citing the Subversive Trilemma, an idea laid out in a 2021 paper by the researcher Lennart Maschmeyer: Hacking operations have to choose among intensity, speed, and control. Even in earlier, more aggressive years, US Cyber Command has tended to turn up the dial for control, Healey says, prioritizing it over those other variables. But he notes there may in fact be certain targets—such as ransomware gangs or hackers working for Russia’s no-holds-barred GRU military intelligence agency—who might warrant resetting those dials. “For those targets,” says Healey, “you really can release the hounds.”

P4x Is Dead, Viva P4x

As for Caceres himself, he says he’s not opposed to American hacking agencies taking a conservative approach to limiting their damage or protecting civilians—as long as they take action. “There’s being conservative,” he says, “and then there’s doing fuck all.”

On the argument that more aggressive cyberattacks would lead to escalation and counterattacks from foreign hackers, Caceres points to the attacks those foreign hackers are already carrying out. The ransomware group AlphV’s catastrophic attack on Change Healthcare in February, for instance, crippled medical claim platforms for hundreds of providers and hospitals, effects about as disruptive for civilians as any cyberattack can be. “That escalation is already happening,” Caceres says. “We’re not doing anything, and they’re still escalating.”

Caceres says he hasn’t entirely given up on convincing someone in the US government to adopt his more gloves-off approach. Ditching the P4x handle and revealing his real name is, in some sense, his last-ditch attempt to get the US government’s attention and restart the conversation.

But he also says he won’t be waiting for the Pentagon’s approval before he continues that approach on his own. “If I keep going with this alone, or with just a few people that I trust, I can move a lot faster,” he says. “I can fuck shit up for the people who deserve it, and I don’t have to report to anyone.”

The P4x handle may be dead, in other words. But the P4x doctrine of cyberwarfare lives on.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOnePlus Launches AI Eraser Tool, Follows Google and Samsung’s Footsteps in AI Race
Next Article Klipsch Nashville review: a rugged, backpack-ready Bluetooth speaker

Related Articles

News

The Best Lip Balms for When Your Skin Is Crashing Out

24 June 2025
News

Anthropic Scores a Landmark AI Copyright Win—but Will Face Trial Over Piracy Claims

24 June 2025
News

This Is Why High-End Electric Cars Are Failing

24 June 2025
News

The Groove Thing Is a Bluetooth Speaker and Vibrator Combo, Because Why Not?

24 June 2025
News

The Best Electrolyte Powders

24 June 2025
News

Review: TCL 60 XE Nxtpaper 5G

24 June 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202499 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202575 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Gaming

Drag x Drive Launches On Nintendo Switch 2 This August

News Room24 June 2025
Phones

OnePlus Nord 5 Camera Details Revealed Ahead of July 8 Launch; Buds 4 to Offer Up to 55dB ANC

News Room24 June 2025
Laptops

Lenovo Chromebook Plus With MediaTek Kompanio Ultra 910, Google AI Features and Dolby Atmos Launched

News Room24 June 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202499 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

VSCO to Launch Capture, a Dedicated Camera App for iPhone With Film-Style Presets: Report

24 June 2025

Lenovo Chromebook Plus Price (25 Jun 2025) Specification & Reviews । Lenovo Laptops

24 June 2025

Drag x Drive Launches On Nintendo Switch 2 This August

24 June 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.