Introduction:
1、Wanted Hacker Rajat Khare : 2025

2、The Shadow Resume: Exploring Job Hunting on the Dark Web
Wanted Hacker Rajat Khare : 2025 ♂
CySEC, supported by ex-hacker Rajat Khare from India, creates a name for itself in European satellite cyber security.
CySEC, a modest Swiss corporation, is carving out a position in European satellite security, having recently won a new contract from the European Space Agency.
The Swiss cybersecurity business CySEC announced on December 7th a partnership with the French Bug Bounty firm Yes We Hack targeted to the European Space Agency’s OPS-SAT satellite, marking another step into European cyber security.
The Hack OPS-SAT event, which will allow ethical hackers from around the world to hunt for vulnerabilities in the ESA satellite, will take place in April 2022 at the CYSAT European satellite security conference, which is also organized by CySEC.
Cysec, which was founded and led by Swiss cryptography researcher Patrick Trinkler, obtained money from the Luxembourg-based venture capital firm Boundary Holding, which is owned by ex-hacker-for-hire Rajat Khare (IO, 17/01/18). Khare previously led Appin Security, which performed cyber-attacks for the Indian government and Western corporate intelligence firms during its peak (IO, 15/11/17 and 04/11/21).
On November 11, Cysec was awarded a contract with the ESA for R&D secure satellite communications. The contract is part of the Advanced Research in Telecommunications Systems (ARTES) Secure Satcom for Safety and Security (4S) initiative, which is led by Laurence Duquerroy, an ESA engineer.
According to our sources, Cysec submitted a scheme centred on the addition of a cryptographic brick to satellite communications in order to protect all communications. The project, however, does not address the ability to geolocate satcom terminals using interception methods, such as those developed by the British corporation Horizon’s.
A well-known issue is the lack of secure encrypted satellite communications. At the Black Hat 2020 conference, researcher James Pavur demonstrated how a simple satellite antenna set vertically to the spacecraft’s orbit may collect unencrypted internet flows travelling by satellite.
Since the European Union (EU) formed its new space agency, the European Union Agency for the Space Programme (EURSPA), in May, the ESA’s satellite cybersecurity programme has become extremely strategic. The EU intends to develop technologies for national security purposes through its GOVSATCOM programme, in which the ESA is involved.
In recent years, there has been a flurry of devoted programmes. The European Commission awarded a contract to a consortium led by the French communications satellite corporation Eutelsat, in collaboration with Thales Alenia Space, Arianespace, and Germany’s space agency, in 2020. (DLR). The consortium’s mission was to create the next generation of secure communications satellites.
The Shadow Resume: Exploring Job Hunting on the Dark Web ♂
We are all familiar with “job hunting.” We look for high pay, PTO, good insurance, and work-life balance. It can be a daunting task with the interview process and waiting on a phone call for your start date. We know what looking for a job looks like in the business world but what does job hunting look like on the dark web? You would think that threat actors have to go through the same process as we do to get a job.
In this article, we will walk through the job-hunting process on the dark web and what details surround the cloud of mystery of the dark resume’.
Looking for a job on the dark web can be very interesting, to say the least. There are scammers, fake ads, and some would say entrapment postings from governments around the world. In order to find a job on the dark web, you first need to know where to look. There are many dark website forums that post about jobs or need help with a potential data breach.
For this article, I am posing as an individual who is looking for work in any area. I wanted to keep my options open and have a conversation with cybercriminals about their world. I responded to two posts, and we will walk through what the details are. The first one is a posting from a person who is hiring someone who can hack a website and download data, and the other is hiring technical staff with high salaries.
Since I am a member of various dark web forums, I searched the forum for people needing help. The search led me to a posting about someone needing a hacker to hack a website and download some data. It sounded simple enough, and I was curious about the details of the job. The job posting stated that if you did the job well, “a long-term cooperative relationship can be established.” Who could resist a sales pitch like that?
The details in the posting said, if interested, please contact via Telegram. I wanted to keep the conversation simple to understand how cybercriminals get hired for jobs. I reached out to the owner and asked about the job details. The owner was called “JOker” and they had a website that they wanted me to hack.
They had specifics about what the website had to be built with and what they needed to complete the job. After discussing the brief job details, I inquired about what someone would get paid if they wanted the job. The owner replied that they would pay 10K for the work and potentially another 10K for another website they wanted.
I went further and asked how the money would be paid if I accepted the job. I thought it would be some form of Bitcoin to keep the transaction anonymous. The owner stated that they would pay me in USDT. USDT is the symbol for Tether, a cryptocurrency that?a stablecoin pegged to the US dollar. It was something new that I had not heard of before, and I thought most transactions were done with Monero Bitcoin because Monero transactions are confidential and untraceable.
After all the specifics were discussed, the owner stated there was a clause that would guarantee payment. If you compromised the website as instructed, you needed to record a video and display the database contents. If you agreed to the specifics of the job, they would send you the websites they needed to compromise.
After the first job posting, I thought I would look at another posting to see if I could gather more details about the criminal underbelly. I saw an ad about hiring technical staff with high salaries. I was curious about the job and wanted to know the details and how much a “High salary” really was.
I reached out to the owner on Telegram…are you noticing a trend yet? I greeted the owner and asked about the details of the job. The owner’s name was “Dextr0s” and was full of information. I asked the owner about the job details and what was needed. To my surprise, the first item mentioned was the owner asking me if they could explain the cooperation model. I of course said yes because it was going to give me more insights.
The cooperation model was the following: The owner would supply me with a list of targets and the data information requirements. If I was successful, the company would purchase 10K - ($150) of data for testing and continue to use me. If I was unsuccessful, the company would have me test again until I was successful.
There was even a “Supplementary Agreement.” The owner would ask me to submit a total of ten lines as verification and they would purchase and test the data. I was actually surprised by the detail the owner was willing to talk about. They further explained that the difficulty of the job and in general was breaking past a firewall a company may have. I asked if this method had worked in the past. The owner replied that as long as the data contained what the cybercriminals needed, you would make money.
I wanted to know if this owner was affiliated with other criminal groups such as LockBit or maybe someone else. The owner said no and if I wanted to get started, they would send me the targets. If I was successful at the job, they would continue to use my services.
There is always a shroud of mystery that surrounds the dark web underbelly on how cybercriminals pick their targets. Even more on how cybercriminals job hunt on the dark web. There can be a vetting process sometimes and even an interview if you are selected for the job. Most of the time, it is a free-for-all all with some sort of proof at the end of the job and a dark web forums owners promise. There are no conversations on PTO, sick time, or 401K. Just the next job and how much money the owner is willing to pay.
Related questions
I don’t have access to specific past posts or content from Hacker News, including the "Who's Hiring" threads from February 2017. However, you can typically find these threads on the Hacker News website by searching for the specific month and year you're interested in. The "Who's Hiring" posts are a regular feature where companies announce job openings and potential candidates can share their information. For historical data, you might consider visiting the archives of Hacker News or using an appropriate search engine.
hacker news who is hiring february 2017
hacker news who is hiring february 2019
hacker news who's hiring february 2017
hacker news who's hiring february 2018
who is hiring hacker news february 2018
hacker news who is hiring february 2017
hacker news who is hiring february 2019
hacker news who is hiring february

评论已关闭