BitDam Blog

Rotem Shemesh
Rotem Shemesh
2 minutes & 45 seconds read · June 17, 2019

The Hacker Mindset Exposed

Jack likes to call himself a “ransomware activist”, but, in reality, he is a seasoned hacker. So seasoned, in fact, that he knows all the tricks of the trade and has tried many of them himself. That’s how he got to ransomware for fun and profit.

Jack doesn’t think like you and I. He actually believes that breaking into your computer and encrypting your files until you pay a ransom is ethical as long as he allows you to get your files back—after he makes off with the bitcoins, of course. In the real world, Jack would be considered a thief, tracked down by the police, arrested, tried and put away for years. But in our crypto-cyber environment, there isn’t an effective digital police force. The guardians of the law can seldom locate the criminal, let alone punish him for his evil deeds.

Not only does Jack think differently about ethics, but he and tens of thousands of his cohorts have created a highly developed, out-of-sight social network – sort of like the Pirates of Penzance but without the songs.

Jack and his friends hail from all over the world, wherever there is an Internet connection. They actually have their own Internet called “the Dark Web” and frequently visit it to trade stories, techniques and code snippets. They are as knowledgeable about cyber exploits and defense methods as Symantec, Check Point and Palo Alto Networks put together. The best among them more so. They innovate faster than you can say, “Who moved my healthcare data?”.

Across their social networks, hackers not only share knowledge but millions of valid email addresses too, accumulated through their many successful exploits. These absconded email addresses are traded over an exchange to be used again and again. Have you ever received an email from someone you know and were directed to click on a bizarre attachment? Your friend didn’t send you that email. It was one of Jack’s colleagues trying to trick you.

Some of Jack’s hacker-friends like to get physical. They walk around a company parking lot handing out memory sticks. Did you ever get a free one with some cool software? Oops! That might have been a prelude to another cyberattack.

To understand the motivations of these cyber assailants, you need to get into their heads and learn how they think. How do they strategize and implement their plans? We’ve done the research and we’re going to share it with you.

In our latest eBook, How Hackers Plan Their Attacks, we look at the psychological roots of hackers and explain how they go about their sinister business in five stages:

  1. Planning
  2. Dropper
  3. Payload
  4. C2
  5. Execution

In each of the stages, we get into the head of the hacker and describe his thinking process along with the various choices he faces and the considerations that bring him to his ultimate attack vector. You will learn all about the hacker’s goals, what he thinks of your cyber defenses and how he uses the Dark Web and other sources to break into your endpoints and networks. You might be shocked to find out how refined the professional hacker’s methodology is and how vulnerable your endpoints still are.

Have a look at our eBook to have a peek inside the fascinating world of hacking from the hacker’s perspective.

Schedule a Demo

Enter your email to get a free trial invitation