Introduction:
1、Google research: Most hacker-for-hire services are frauds

2、Major Benefits of Choosing Us as Your Android Development Company
3、Bahamut Spyware Group Compromises Android Devices Via Fake VPN Apps
Google research: Most hacker-for-hire services are frauds ♂
Hacker-for-hire services available online are what we thought they were -- scams and ineffective -- new research published last week by Google and academics from the University of California, San Diego, reveals.
"Using unique online buyer personas, we engaged directly with 27 such account hacking service providers and asked them with compromising victim accounts of our choosing," researchers said.
"These victims in turn were 'honey pot' Gmail accounts, operated in coordination with Google, and allowed us to record key interactions with the victim as well as with other fabricated aspects of their online persona that we created (e.g., business web servers, email addresses of friends or partner)."
The research team said that of the 27 hacking services they engaged, 10 never replied to their inquiries, 12 responded but never actually attempted to launch an attack, and only five ended up launching attacks against the test Gmail accounts.
Of the 12 who responded but never launched any attacks, nine said they were no longer hacking Gmail accounts, while the other three appeared to be scams.
Image: Mirian et al.
Researchers said the services usually charged between $100 and $500 for their services, and none used automated tools for the attacks.
All attacks involved social engineering, with hackers using spear-phishing to fine-tune attacks for each victim. Some hackers asked for details about the victim they were supposed to target, while others didn't bother, and opted to employ re-usable email phishing templates.
The oddity among the five hackers who launched an attack was that one of them tried to infect the victim with malware (a remote access trojan) rather than phish the victim's account credentials. The malware, once installed on the victim's system, would have been able to recover passwords and authentication cookies from local browsers.
Furthermore, one attacker was also able to bypass two-factor authentication (2FA) by redirecting the victim to a spoofed Google login page that harvested both passwords as well as SMS codes and then checking the validity of both in real time.
The research team also found that hackers who learned they'd have to bypass 2FA usually doubled their prices.
Researchers also observed that prices for hacking Gmail accounts also increased across the years, going from $125/account in 2017 to around $400 today. They attributed this rise in pricing to Google improving account security measures.
"As a whole, however, we find that the commercialized account hijacking ecosystem is far from mature," the research team said. "We frequently encountered poor customer service, slow responses, and inaccurate advertisements for pricing.
"Further, the current techniques for bypassing 2FA can be mitigated with the adoption of U2F security keys," they added.
Ignoring the scam sites, researchers said they didn't view hacker-for-hire services as a danger for user accounts. This is due to the high prices for hacking each account, but also due to the low quality of service they provide.
More details about this research can be found in a white paper named "."
Major Benefits of Choosing Us as Your Android Development Company ♂
Full-Stack Android App Developers
Hire dedicated Android developers who can create feature-rich and fast-performing mobile apps that are both scalable and stable. to manage your frontend and backend mobile app development and advance your business process.Android App Migration
Hire dedicated android developers who can create feature-rich and fast-performing mobile apps that are both scalable and stable. for migrating your existing Android Applications to any other platform at an affordable cost.Android App Upgradation
Our Android application engineers offer consultation on Android application up-gradation and assist you in updating your application inline with latest Android version and by adding new features.Android Maintenance & Testing
We help you manage your existing app, maintain it to keep it updated and secure. This ensures high-level performance for your app that in turn leads to positive reviews and greater customer satisfaction.Custom Android Apps
Our Android app engineers consistently strive to create custom mobile applications that are recognized for their excellent features, complete security, adaptability, and creative design.Android App Consultation
Bahamut Spyware Group Compromises Android Devices Via Fake VPN Apps ♂
The Bahamut APT group has been targeting Android users through a fake SecureVPN website since at least January 2022.
According to a new advisory from Eset, the app used as part of this malicious campaign was a trojanized version of either of two legitimate VPN apps, SoftVPN or OpenVPN. In both instances, the apps were repackaged with Bahamut spyware code.
"We were able to identify at least eight versions of these maliciously patched apps with code changes and updates being made available through the distribution website, which might mean that the campaign is well maintained," Eset wrote.
The security researchers explained that the primary purpose of the app modifications was to exfiltrate sensitive user data and spy on victims' messaging apps.
In particular, the fake SecureVPN Android apps could extract sensitive data such as SMS messages, contacts, call logs, device location and recorded phone calls.
They also enabled the spying of chat messages on several messaging apps, including WhatsApp, Signal, Viber, Telegram and Facebook Messenger.
Data exfiltration is performed via the keylogging functionality of the malware, which relies on Android's accessibility services. Eset suggested that the campaign appears highly targeted, as the company did not notice any instances in their telemetry data.
"We believe that targets are carefully chosen since once the Bahamut spyware is launched, it requests an activation key before the VPN and spyware functionality can be enabled. Both the activation key and website link are likely sent to targeted users," reads the technical write-up.
Despite this, the advisory highlights that the Bahamut APT group, active since at least 2017, typically targets companies and individuals in the Middle East and South Asia.
"Bahamut specializes in cyberespionage, and we believe its goal is to steal sensitive information from its victims," Eset wrote. "Bahamut is also referred to as a mercenary group offering hack-for-hire services to a wide range of clients."
Related questions
Companies that hire ethical hackers (also known as white-hat hackers or cybersecurity professionals) typically seek individuals skilled in identifying and mitigating security vulnerabilities. These roles are critical in industries like tech, finance, healthcare, and government. Below is a breakdown of sectors and examples:
1. Tech Companies
- Examples: Google, Microsoft, Apple, Meta (Facebook), Amazon, IBM, Cisco, Tesla.
- Roles: Penetration testers, security engineers, vulnerability researchers.
- Why: Protect infrastructure, cloud services, and consumer products.
2. Cybersecurity Firms
- Examples: Palo Alto Networks, CrowdStrike, FireEye (Mandiant), Check Point, Rapid7, Fortinet.
- Roles: Red teamers, threat hunters, incident responders, malware analysts.
- Why: Develop security tools, respond to breaches, and offer client services.
3. Financial Institutions
- Examples: JPMorgan Chase, Bank of America, Citigroup, PayPal, Visa.
- Roles: Security analysts, fraud investigators, compliance auditors.
- Why: Safeguard financial data, transactions, and customer accounts.
4. Government & Defense
- Agencies: NSA (U.S.), GCHQ (U.K.), CISA (U.S.), Defense contractors (Lockheed Martin, Raytheon).
- Roles: Cyber warfare specialists, intelligence analysts, forensic investigators.
- Why: National security, critical infrastructure protection.
5. Consulting Firms
- Examples: Deloitte, PwC, KPMG, Accenture, Booz Allen Hamilton.
- Roles: Cybersecurity consultants, risk assessors, compliance advisors.
- Why: Advise clients on security strategies and regulatory compliance.
6. Bug Bounty Platforms
- Platforms: HackerOne, Bugcrowd, Synack.
- Programs: Companies like Tesla, Shopify, and Intel offer bounties for vulnerability reports.
- Why: Crowdsource ethical hacking to identify flaws before malicious actors do.
7. Startups & Blockchain Firms
- Examples: Coinbase, Chainalysis, OpenSea, emerging fintech companies.
- Roles: Smart contract auditors, blockchain security experts.
- Why: Secure decentralized systems and crypto assets.
Common Job Titles
- Penetration Tester
- Cybersecurity Analyst
- Incident Responder
- Security Operations Center (SOC) Engineer
- Chief Information Security Officer (CISO)
Skills & Certifications
- Certifications: CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), CISSP, CompTIA Security+.
- Technical Skills: Network security, reverse engineering, exploit development, familiarity with tools like Metasploit, Wireshark, and Burp Suite.
- Soft Skills: Problem-solving, communication, ethical judgment.
How to Get Hired
- Build a portfolio (e.g., GitHub, CTF competitions, bug bounty achievements).
- Network via conferences (DEF CON, Black Hat) or LinkedIn.
- Apply through company career pages or specialized platforms like CyberSN.
Note on "Reformed" Hackers
While rare, some firms may hire individuals with past black-hat experience if they demonstrate reform, skills, and transparency. Legal clearance and trust are critical here.
Ethical hacking is a legitimate and growing field, with demand fueled by rising cyber threats. Always ensure work aligns with legal and ethical standards.
Expanding the Android attack surface: Analysis of React Native Android applications
How to Use Yaazhini to Scan Security Vulnerabilities in Android APK API
Android penetration testing 12: IDA dynamic debugging so
Incremental installation and Android V4 signature introduction
hire a hacker for decrypting whatsapp database(whatsapp forensics)
Exploration and practice of optimizing the file size of Android dynamic link libraries

评论已关闭