Would Hacker Deterrent have blocked the malware recently found on a Burlington Electric laptop?

The Burlington Electric malware required a connection to a command and control center:

“Burlington Electric General Manager Neale Lunderville told CNN’s Suzanne Malveaux that the utility found an Internet address that was associated with recent malicious cyber activity, and that IP address was communicating with a company computer.” — CNN

Therefore, would Hacker Deterrent have exposed and blocked this malware right from the start?:

  • Exposed: Since Hacker Deterrent displays all internet-bound connections, the internet connection “associated with recent malicious cyber activity” would’ve been exposed by this display.
  • Blocked: Since the malicious IP address doesn’t belong to the maker of any software on the laptop, the laptop user would know to keep the connection blocked.

The hacker’s connection to a command and control server is the hacker’s Achilles heel.  It’s the key to finally stopping hackers in their tracks.  Hacker Deterrent leverages this Achilles heel to expose and block attempted attacks.

For more information on hacker command and control centers, see: “Key to it All.”