how to hire indian hackers

0 38
Introduction: 1、Indian 'Hack-for-Hire' Companies Infiltrate VIPs Phones, Emails...

Introduction:

1、Indian 'Hack-for-Hire' Companies Infiltrate VIPs Phones, Emails for Private Investigators: Report

how to hire indian hackers

2、A ?gital hit-list?eveals how Indian hackers were hired to spy on judges and politicians

Indian 'Hack-for-Hire' Companies Infiltrate VIPs Phones, Emails for Private Investigators: Report

  Illegal hacking operatives, dubbed “hack-for-hire” companies, are operating across India and infiltrate emails and phones of VIPs and states for a fee paid by private investigators around the world, an undercover investigation has claimed on Sunday.

  ‘The Sunday Times' and Bureau of Investigative Journalism conducted a sting operation to expose several Indian hackers offering their services to hack into private email accounts and messages of victims on behalf of investigators working for autocratic states, British lawyers and their wealthy clients.

  According to the investigation based on leaked documents and undercover work in India earlier this year, journalists posing as former MI6 agents turned private investigators claim that one gang "seized control of computers" owned by Pakistan's politicians, generals and diplomats and eavesdropped on their private conversations “apparently at the behest of the Indian secret services”.

  The hacking gang, which operates under the name WhiteInt, is run from a fourth-floor apartment in a suburb of the tech city Gurugram in Haryana. Its mastermind is a 31-year-old man — an occasional TV cybersecurity pundit who also holds down a day job at the Indian office of a British accountancy firm, according to the ‘Sunday Times' report.

  For seven years, he has run a network of computer hackers who have been hired by British private detectives to steal the email inboxes of their targets using ‘phishing' techniques, it claims.

  Malicious software which takes control of computer cameras and microphones, and allows hackers to view and listen to their victims are some of the methods used in such hack-for-hire operations, which earns hackers anywhere between $3,000 (roughly Rs. 2,46,650) and $20,000 (roughly Rs. 16,44,320).

  "I offer access to closed source information of email and computers of the PoI (person of interest) anywhere across the globe... an average timeline is around 20 to 30 days,” he was quoted as telling the undercover journalists.

  When approached last month by the team, he claimed he did not know some of the people named on his database and denied hacking the others listed: “I can say categorically that I have not hacked, launched or attempted to hack any of these people.” Another operative contacted by the team was a 28-year-old computer specialist, who boasted of hacking more than 500 email accounts, mostly on behalf of his corporate intelligence clients.

  “The British and the whole world... are using Indian hackers,” he is quoted as saying in Delhi.

  When approached for comment last month, he claimed he had only “hacked 100 times” and that he was “blowing my own trumpet”.

  He alleged that UK companies had been employing Indian hackers for more than a decade.

  One of them was allegedly set up in Delhi more than a dozen years ago supposedly to train a new generation of “ethical” hackers who could help safeguard individuals and businesses from cyberattacks.

  However, the firm, now defunct, is alleged to have secretly established a lucrative sideline taking cash from clients around the world to hack individuals. These clients are said to have included corporate intelligence companies based in Britain, the Sunday Times reported.

  The undercover investigation concludes that the use of the “Indian underworld to break into email accounts and smartphones has become a practice that has been proliferating for years”.

  Investigators from the UK have been able to commission “hack-for-hire” firms with little fear that they will be prosecuted for breaking the country's computer misuse laws.

  Several of the targets on the leaked database accessed by them include British lawyers and wealthy people involved in cases in London's High Court, reportedly including a member of the UK's richest Indian-origin Hinduja family, the Sunday Times report said.Apple launched the iPad Pro (2022) and the iPad (2022) alongside the new Apple TV this week. We discuss the company's latest products, along with our review of the iPhone 14 Pro on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.

A ?gital hit-list?eveals how Indian hackers were hired to spy on judges and politicians

  A little-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.The New Delhi-based company?rgeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States.The company - called?llTroX InfoTech Services - also targeted?ivate equity giant KKR and short-seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.Aspects of the company's hacking spree aimed at American targets are currently under investigation by US law enforcement, five people familiar with the matter told Reuters.The US Department of Justice declined to comment.Reuters does not know the identity of the clients who hired the company. In a telephone interview, the company’s owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.Muddy Waters founder Carson Block said he was “disappointed, but not surprised" to learn they had likely been targeted for hacking by a client of BellTroX.Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report on Tuesday saying they had "high confidence" that BellTroX employees were behind the espionage campaign.“This is one of the largest spy-for-hire operations ever exposed,” said Citizen Lab researcher John Scott-Railton.Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists,?x201C;cyber mercenary” services are widely used, he said.“Our investigation found that no sector is immune.”A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords.The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.Reuters was not able to establish how many of the hacking attempts were successful.Gupta - from BellTroX - was charged in a 2015 hacking case in which two US private investigators admitted to paying him to hack the accounts of marketing executives.? was declared a fugitive in 2017, although the US Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.Speaking by phone from his home in New Delhi, Gupta denied the hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.“I didn’t help them access anything, I just helped them with downloading the mails and they provided me all the details,” he told Reuters.“I am not aware how they got these details but I was just helping them with the technical support.”Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages and repeatedly declined to talk when a Reuters reporter visited him at his office on Monday.?okesmen for Delhi police and India’s foreign ministry did not respond to requests for comment.Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters.Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.Fahmi Quadir’s New York-based short-selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019.She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.Initially “it didn’t seem necessarily malicious,” Ms Quadir said. “It was just horoscopes; then it escalated to pornography.”Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short-sellers or members of her family.“They were even trying to emulate my sister,” Ms Quadir said, adding that she believes the attacks were unsuccessful. ? advocacy groups were also repeatedly targeted. Among them were digital rights organisations Free Press and Fight for the Future, both of whom have lobbied for net neutrality.The groups said a small number of employee accounts were compromised, but the wider organisations' networks were untouched.Timothy Karr, a director at Free Press, said his organisation “sees an uptick in breach attempts whenever we’re engaged in heated and high-profile public policy debates.”Evan Greer, deputy director of Fight for the Future, said: “When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process.”While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee.?e pitch offered to carry out “data penetration” and “email penetration.”?#xA0; ?#xA0;? Santos said he ignored those overtures, but could understand why some people didn’t.

Related questions

To hire Indian hackers ethically and legally, follow this structured approach, emphasizing legitimate practices and compliance with laws:

1. Define Your Requirements

  • Purpose: Clarify if you need penetration testing, vulnerability assessments, or cybersecurity consulting.
  • Scope: Determine if you need a freelancer, full-time employee, or a firm.

2. Seek Ethical Hackers

  • Certifications: Look for credentials like CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), or CISSP.
  • White-Hat Focus: Ensure candidates adhere to ethical guidelines, avoiding grey or black-hat activities.

3. Utilize Reputable Platforms

  • Freelance Marketplaces: Use Upwork, Toptal, or Freelancer to find vetted professionals with reviews.
  • Bug Bounty Programs: Engage hackers via HackerOne, Bugcrowd, or Cobalt, where Indian hackers often participate.

4. Leverage Indian Job Portals

  • Post listings on Indian platforms like Naukri.com, Indeed India, or LinkedIn with keywords like "ethical hacker" or "penetration tester."

5. Network in Cybersecurity Communities

  • Conferences/Events: Attend nullcon, c0c0n, or other Indian security conferences.
  • Online Forums: Join communities like OWASP local chapters, GitHub, or LinkedIn groups focused on Indian cybersecurity.

6. Partner with Cybersecurity Firms

  • Consult Indian IT firms like Wipro, Infosys, or Paladion Networks for specialized services.

7. Vetting Process

  • Portfolio Review: Check past projects, contributions to open-source tools, or CTF (Capture the Flag) competitions.
  • Background Checks: Verify references and ensure no history of malicious activity.

8. Legal Safeguards

  • Contracts: Define scope, deliverables, and confidentiality in written agreements.
  • NDAs: Protect sensitive information with non-disclosure agreements.
  • Compliance: Ensure adherence to laws like India’s IT Act, 2000, and international regulations (e.g., GDPR if applicable).

9. Educational Institutions

  • Recruit from top tech schools (IITs, NITs) or collaborate with cybersecurity programs for emerging talent.

10. Avoid Illegal Offers

  • Red Flags: Reject unsolicited offers for illegal services (e.g., data breaches). Report such approaches to authorities.

11. Remote Collaboration

  • Use tools like Slack, Zoom, or Trello for communication across time zones.

Final Note

Prioritize transparency and ethics. Ethical hacking strengthens security; illegal activities carry severe risks. Always align with legal frameworks and industry standards.

你可能想看:
最后修改时间:
admin
上一篇 2025年02月24日 16:40
下一篇 2025年02月24日 17:02

评论已关闭