Is what we know about hackers true?.. The truth behind hacking, how it happens, and hacker mistakes

Is what we know about hackers true?.. The truth behind hacking, how it happens, and hacker mistakes

Advertisement

27/8/2021-Last update: 13/09/2022-21:07 (GMT+1)

Electronic hacking is a complex process based on exploiting a security vulnerability in a computer system to illegally infiltrate, and carry out an attack based on data modification, theft, destruction or any other malicious actions.

In a report published by the American Hackernoon website , author Julian Morey confirms that there are different types of cyber attacks that involve the use of various means, including Denial of Service (DDoS) attacks that are used as an initial step in complex burglaries, and the deadly “Bing” attack. Phishing, spoofing, session exploits, ransomware, and others.

Some cyber attacks require huge budgets and long processing times with the participation of a large number of hackers and are sometimes supervised by governments (Getty Images)
Some cyber attacks require huge budgets and long processing times with the participation of a large number of hackers and are sometimes supervised by governments (Getty Images)

According to the author, it is very important to know the nature of these attacks because it is not possible to fight something about which we do not have enough information, in addition to trying to understand the goals of the perpetrators of electronic hacking operations.

Huge budgets

Hollywood films often promote a stereotype about hackers, depicting them in dark rooms in a specific type of jacket, trying to carry out their attacks very late at night.

In fact, some cyber attacks require huge budgets and long processing times, involve a large number of hackers, and are sometimes supervised by governments of countries to target other governments.

Types of hackers

Whether it's a government agency or any criminal organization, you may be surprised at the levels of hierarchy, division of tasks, and collaboration needed to launch cyber attacks. It is not unusual to recruit a large number of hackers, or entire teams to carry out specific tasks, such as: secretly infiltrating or encrypting communications and other operations, or providing infrastructures for self-protection, hiding and dealing with money and cryptocurrencies (such as Bitcoin).

Hollywood films often promote a unified stereotype about hackers
Hollywood films often promote a unified stereotype about hackers

The writer stresses that there are less organized hackers, but their goals are very limited. A prime example is Scriptkids, or novice hackers who exploit vulnerabilities in computer systems to make small profits, but are quickly caught by the authorities because they often discover the vulnerability by mistake, and abuse it without adequately covering their tracks. They seem to have won a grand prize with the illusion of being invincible, but in the end they are nothing but ordinary thieves.

As such, there are types of hackers depending on the motives:

Avengers, mercenaries, activists, states, criminal organizations, and terrorists.

According to the author, this list does not include all types of hackers, and the level of threats varies from one category to another.

Timestamp..defense or attack

The timestamp is a critical factor in the effectiveness of cyberattacks. Aside from the novice and hobbyist operations, organized cyber attacks involve very careful documentation and regulation. 

The attack may require a very long monitoring period (ranging from 6 months to several years) and the attack is carried out after a long preparation, including escape strategies, preparation for counter-penetration and camouflage operations, which complicates the task of defenders in repelling the operation.

Some of those who have been exposed to cyber attacks may believe that they know exactly when the attack was launched, but are unaware that the process went into effect months ago through several seemingly unrelated phishing campaigns, but they were targeting certain parts of the computer system of the target organization .

It is not uncommon for criminal organizations to conduct small operations to find out the assets and strategic locations required for later, more comprehensive operations. Professional hackers use similar strategies to increase profits and reduce risks, by devoting time to taking precautionary steps such as scouts.

hacker mistakes

The writer adds that regardless of the level of skills of hackers, in the end, they are human beings who cannot avoid mistakes that fall into the hands of defenders and authorities. 

Among these errors:

  • Creating unintended patterns (by reusing the same tools, tricks, and networks) that lead to hacker detection.
  • Use the same networks for personal and "professional" tasks.
  • Not knowing the actual value of what they got from the hacking operations.
  • Turn their dangerous activities into a chore.
  • Forgetting to use Tor stealth software uses an encrypted connection on the Internet, even just once, which leads to their entrapment.

The writer concludes that confronting pirates is not limited to the technical aspect only, as the tools are just means, not goals. What some may consider irrelevant attacks in different periods, may be part of a comprehensive attack strategy, so caution must be taken when receiving any cyber threat of any size.



Source : websites



📨 Leave us a comment :
#
Advertisemen