Fejléc

Technology isn’t everything: this is how hacking organizations really work

Szerző ikon Gusztáv Krékity

Dátum ikon 2022.10.13

When discussing cybersecurity, most think of firewalls, SIEM, or advanced security tools. Yet, 70% of cyberattacks exploit human vulnerabilities, not technology. Understanding how criminal hackers operate and addressing insider threats is essential for effective protection.

Modern Cybercrime: More Than a Stereotype

Contrary to the Hollywood image of reclusive hackers, today’s cybercriminal organizations function like legitimate businesses. For instance, one German hacking group established over 30 fake companies with employees on payroll, utilizing forged IDs and documents. These organizations often rely on the human element to bypass traditional security measures.

Insider Threats: A Critical Vulnerability

One prevalent tactic involves “blackhead” hackers, experts planted within organizations using fake credentials. Without thorough background checks, these individuals gain access to critical systems, causing significant damage. In one case in Saxony, two undercover hackers shut down a company within a week, impacting 2,000 employees.
Former employees can also pose threats. Disgruntled staff may leak sensitive information on the dark web, enabling cyberattacks. Proper exit protocols and ongoing employee engagement are vital to mitigate this risk.

Social Engineering: Manipulating Trust

Social engineering is another powerful tool for hackers. A common scam involves recruiting financially struggling employees with promises of extra income. Unsuspecting individuals are then tricked into executing attacks, such as inserting malicious USB devices, often causing widespread disruptions.

The Hacker Career Path

Many hackers are highly skilled IT professionals. Alarmingly, 20% of graduates from top IT programs opt for cybercrime due to its lucrative rewards. While average IT salaries hover around €4,000 per month, hackers can earn millions annually, highlighting the need for competitive compensation and robust security training.

A Broader Approach to Security

Organizations must go beyond investing in technology. Comprehensive background checks, employee training, and financial support programs are critical to addressing the human side of cybersecurity. Leadership should prioritize holistic strategies to mitigate the 70% of threats originating internally.
By understanding the inner workings of cybercriminal organizations and addressing both technological and human vulnerabilities, businesses can better protect themselves from sophisticated attacks.

This article is based on a presentation by Robert Ehlert and Morgan Alexander (Quantum Cyber Lab AG). You can watch their presentation on this page:: socssummit.com

Read the full article on our International subsidiary’s website by clicking on the image.