Evan Bleier, writing in the May 8, 2015 edition of London’s TheDailyMailOnline, observes what most of all of us are already well aware of: “dirty deeds are done cheap on the world wide web. In addition to all the illicit goods and substances that are being sold on the Internet, illegal services are also available for the right price. For hacking services, that price is surprisingly low in many cases.”
“Individuals who want to hire a hacker to get into someone’s Gmail account, will only have to pay about $90 for the services,” according to the publication — BusinessInsider.com. Individuals who can’t afford to pay, can try their luck using tips from the wikiHow page devoted to hacking Gmail,” Mr Bleier writes. According to the page: “Hacking a Gmail address can come in handy if you lose your account password, manage other people’s business accounts, or simply want to improve your computer skills. If you want to crack Gmail passwords, you can hack Gmail with browser settings, phishing and keylogging software and special scripts. Getting into someone’s FaceBook account is also relatively inexpensive; and, costs around $350.”
“Altering a Yelp rating retails for as much as $300, [while] stealing someone’s Hilton HHonor points costs about $15; and, gaining access to a stranger’s NetFlix account is only $1.25. There are options for DIYers, and prospective hackers can get a lesson from a professional for $20. There is even a [digital] marketplace for hacking services set up on a site called Hackers List,”TheDailyMailOnline noted. “Customers on the site can log on using their FaceBook account, and are encouraged to ‘Hire the right hacker.’
“Hiring a hacker shouldn’t be a difficult process, we believe that finding a trustworthy professional hacker for hire should be a worry free experience”, according to the website. “At Hackers List, we want to provide you with the best opportunity to find your ideal hacker; and, for professional hackers around the world to find you.”
This ‘Cyber Gun’ For Hire
As Matthew Goldstein wrote in the January 16, 2015 New York Times, “the business of hacking is no longer just the domain of intelligence agencies, international crime gangs, shadowy political operatives, and disgruntled “hacktivists” taking aim at big targets. It is an increasingly personal enterprise,” with a pay as you go menu. Hackers List matches seeks to match hackers with people looking to gain access to email accounts, to unflattering photos from a website, or gain access to a company’s database. In less than 3 months of operation, over 500 hacking jobs have been put out for bid on the site, with hackers vying for the right to do the dirty work,” Mr. Goldstein wrote.
“Hacking into individual email, or social media accounts occurs on a fairly regular basis, according to computer securit experts, and law enforcement officials. In September, the Internet was abuzz, when hackers posted nude photos of female celebrities online. It is no clear how successful “Hackers List:” will be,” Mr. Goldstein wrote. “A review postings [at the time of Mr. Goldstein’s article], found that many had yet to receive a bid from a hacker. Roughly 40 hackers [had registered at the time of Mr. Goldstein’s article]; and, there are [were] 844 registered job posters. From the postings, it is hard to tell how many of the job offers are legitimate.”
“The site did get a favorable review on hackerforhirereview.com, which specializes in assessing the legitimacy of such services. The reviewer and owner of that site, who would identify himself only as Eric in emails, said he gave his top ranking to Hackers List — because it’s a “really cool concept,” that limits the ability of customers and hackers to take advantage of one another,” Mr. Goldstein wrote.
We have already seen what the lone wolf and small group terrorist cells are capable of — in the aftermath of the events in France, Canada, Australia, and now Garland, Texas. Now, think of a Dr. No,” or a cyber serial killer, and/or, cyber thieves who are gaining access to sensitive mergers and acquisitions/proprietary information — for a trading advantage on Wall Street — and, you have the makings of a serious and more profound cyber threat. Much as the hired gun traveled the old West as a “hired gun,” we are now beginning to see the burgeoning of a similar phenomena in the cyber/digital world. Where this all ends up — is anyone’s guess.
No comments:
Post a Comment