• Country
    • Main Menu
    • China
    • Germany
    • Italy
    • Liechtenstein
    • Austria
    • Poland
    • Romania
    • Switzerland
    • Hungary
  • Language
    • Main Menu
    • Deutsch
    • English
  • Alliance Portal
  • Client Portal
  • Offices & Contact
Funk
  • Funk
  • Risk fields
    • Zurück
    • Risk fields
      • Cyber Risks
      • ESG risks
      • Political Risks
      • Liability Risks
      • Property Damage
      • Show all
    • FEATURED

      Technical articles
  • Services
    • Zurück
    • Risk management
      • Enterprise risk management
      • Funk Beyond Insurance
      • Risk Academy
      • Sustainability consulting with Funk
    • Insurance management
      • Claims management
      • Client portal
      • Special services
      • International
      • Show all
    • FEATURED

      ‘MyFunk’ client portal
  • Industries
    • Zurück
    • Industry
      • Automotive
      • Construction Project
      • Energy
      • Chemical
      • Food
      • Logistics
      • Alle anzeigen
    • Property sector
    • Health and social affairs
    • Other industries
    • Service providers
    • Art & events
    • Independent professions
    • Trade
    • Associations
    • Local authorities
    • FEATURED

      Real Estate Industry
  • Icon: Drei Personen in einer Gruppe About Funk
    • Zurück
    • Family-run company
      • Our Funk Values & Purpose
      • Strategy
      • History
      • Funk Foundation
    • Innovations
    • Sustainability
    • Diversity & Inclusion
    • Offices
    • FEATURED

      Our Values & Purpose
  • Media
    • Zurück
    • Our Media
    • Technical articles
    • FEATURED

      Technical articles
  • Country
    • Zurück
    • China
    • Germany
    • Italy
    • Liechtenstein
    • Austria
    • Poland
    • Romania
    • Switzerland
    • Hungary
  • EN
    • Zurück
    • DE
    • EN
  • Alliance Portal
  • Client Portal
  • Offices & Contact
Contact us
Im Griff der Black Hats Im Griff der Black Hats
Im Griff der Black Hats
  1. en
  2. Media
  3. Technical articles
  4. Risk management
  5. In the grip of the black hats

In the grip of the black hats

What do all hackers have in common? A passion for technology, says cyber expert Lucas Will. In a guest post, he shows that not all hackers are criminals. But when the dark side strikes, the situation quickly becomes dangerous for companies.

I made my first foray into the hacker scene when I was still in school, inspired by a classmate. But if you are expecting a story here about my criminal past, you’ll be sadly disappointed.

 

Ihre Kontaktanfrage wurde versendet.
Please fill the mandatory fields.

Contact Form

By submitting the contact form, you agree that your data will be used to process your request. You can find further information and revocation instructions in the data protection statement.

Your point of contact

Ihre Kontaktanfrage wurde versendet.
Please fill the mandatory fields.

Contact Form

By submitting the contact form, you agree that your data will be used to process your request. You can find further information and revocation instructions in the data protection statement.

Your point of contact

Lucas Will

Lucas Will

Lucas Will has 20 years of experience in IT security and was even a hacker himself before founding his own IT security firm in 2006. Today he works as a freelance corporate consultant.

The hackers I know, both male and female, aren’t living a life of crime. What unites them is their fascination for networks, their passion for technology and their desire to shine a light on security vulnerabilities. They are a real force for the common good, many of them plugging up gaps in security in their spare time. Some of them are even true experts in their fields, be that processor architecture or the structure of operating systems. Perhaps you’re thinking, OK, so if hackers are just people who really love technology, why do hacker attacks cause billions of euros of damage to the economy every year? Put it this way: the tools hackers develop are neutral in themselves, but can be used for other, more nefarious purposes.

 

A look at the dark side

The hacker scene I know is not criminal. But of course it does have a dark underbelly that in many ways follows the classic cliché of shadowy figures in hoodies. These ominous characters are often called ‘black hats’ or even criminal hackers – the opposite of the ‘white hats’ or ethical hackers.

Regardless of the terms used, however, you can say that there are hackers, and then there are criminals who use their hacking skills to commit crimes. In this context, recent years have seen a steady rise of organised groups who carry out campaigns with department-like precision: extortion, break-ins and data theft, or trading in stolen data on the dark web.

The methods they use are becoming increasingly complex: using hacking tools that exploit IT system vulnerabilities, black hats often attack lots of different servers and create what are known as ‘back doors’ in them. They can then access their victims’ systems through these back doors and restrict the availability of services or data. The criminals basically become providers of infrastructure for acts of sabotage. Another popular ploy is to hide illegal websites on the computers of rather inconspicuous medium-sized businesses.

 

Optimising profits and processes

Criminal use of ransomware is the most well-known tactic thanks to reporting in the media on WannaCry, NetPetya and the like. Encryption Trojans such as these can be used to paralyse entire file systems, only releasing them again once a ransom has been paid. Attacking the system at the start of these types of extortion campaigns is the most difficult part; after that, the black hats only need simple technical knowledge. And underbelly or not, like more above-board operations, there is also a trend here of working to optimise profits and processes: Trojans and the ransom amount are tailored to the individual victim, while for malware there is actually proper manufacturer support for reporting problems.

Incidentally, company employees still make the best accomplices for these criminals, albeit usually unwittingly. Phishing – gaining access to data through fake websites and emails – is also a widely used method among black hats. Companies should therefore regularly provide training to their teams. Another helpful strategy is to identify critical systems and processes in order to give them special protection. After all, the same rings true both for the hacker scene and for that email congratulating you on your million-euro win: don’t take everything at face value – not everything is as it seems.

 

29/04/2021

Back to top

The best recommendation. Funk.

  • Risk fields

    • Risk fields
  • Services

    • Risk management
    • Insurance management
  • Industries

    • Industry
    • Property sector
    • Health and social affairs
    • Service providers
    • Art & events
    • Independent professions
    • Trade
    • Associations
    • Local authorities
  • About Funk

    • Family-run company
    • Innovations
    • Sustainability
    • Diversity & Inclusion
    • Offices
  • Media

    • Our Media

    Technical articles

+49 40 35914-0
Headquarters Hamburg, Valentinskamp 20, 20354 Hamburg
All offices
welcome(at)funk-gruppe.de

International Insurance Broker and Risk Consultant

  • Legal information
  • Privacy statement
  • Mandatory information
  • Supply Chain Due Diligence Act
  • Whistleblowing system
  • Sitemap