I've been hearing a lot about "hackers for hire." Can you please elaborate on who these groups -- such as Hidden...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Lynx -- are, who they target, why they are doing what they do, and whether my organization should be concerned about them?
So-called "hackers for hire" are professional organizations that use advanced capabilities to attack high-value targets for various reasons -- often for financial gain, but sometimes for hacktivism or simply to cause someone public embarrassment. Some individuals become part of hackers-for-hire organizations because they like the easy money and relatively low-risk work. Others live in an area where there are few legitimate jobs and hacking is a way to sustain a living.
These groups have adopted professional software development practices, achieved high levels of discipline and structure, and have access to the resources of a professional organization (e.g., teams of exploit researchers, software developers, testers and system administrators). In general, hackers for hire attack high-value targets that either have significant intellectual property or access to systems that would allow them to obtain high-value IP such as trade secrets, inventions or copyrights.
Hidden Lynx, like the infamous Comment Crew (also known as the APT1), is believed to be funded at least in part by the Chinese government. Hidden Lynx has purportedly attacked companies in Boston and Washington, D.C. within the financial services, international relations, education and defense industries.
Depending on your organization's industry, your enterprise may need to be concerned about hackers for hire. However, given the increase in watering hole attacks, organizations could be at risk even if they support, interact with or service one of the targeted sectors.
While your enterprise may not have the intellectual property, credit cards or personally identifiable information that hackers are looking for, it could offer a point of entry into other targeted industries. For example, the health insurance provider for a company in a target industry could be attacked because the target enterprise's employees access the health insurance provider's website, which is exactly where the hacker has hidden a zero-day vulnerability that will be used for future attacks.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your questions now via email! (All questions are anonymous.)
Dig Deeper on Hacker tools and techniques: Underground hacking sites
Related Q&A from Nick Lewis
When NSA cyberweapons went public, attackers bundled them into the EternalRocks malware. Nick Lewis takes a closer look at this new threat and ...continue reading
A Google Docs phishing attack used OAuth tokens to affect more than a million Gmail users. Nick Lewis explains how it happened, and how to defend ...continue reading
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.