avatarDr Mehmet Yildiz

Summarize

Cybersecurity & Cybercrime

Here’s Why Cybersecurity Gets More Complex Due to a Unique Strategy by Hackers.

If an offer is ambiguous and too good to be true, we must be more cautious.

Photo by Tima Miroshnichenko from Pexels

Imagine you lost your tech job due to the pandemic. Your loved company is closed, struggling with economic challenges. And your family needs support to survive. You created a gig on the freelance sites advertising your exciting security skills.

One day you get an offer from a client equating at least ten times of previous daily rate. They ask you to collect data using your ethical hacking tools.

In addition, they confirm that you can do the job from home in your pajamas. When you have such an offer with remarkable flexibility and good pay, what would you do? Some freelance security consultants might jump into the opportunity with no hesitation.

Due to the pandemic in various parts of the globe, small IT companies in niche markets had to close their operations. Thus, talented cybersecurity experts lost their jobs and started looking for opportunities as freelancers. Since these people are skilled and experienced, the option is to be their own boss. Besides, they have great technical skills to make sense of the virtual world.

Let me return to the scenario I introduced in the first paragraph. My aim is to give you an idea of how the situation might progress and manifest.

The boss approaches the expert online. She introduces her company in general terms but does not provide links to it. Her reason is they are a cybersecurity company and cannot give details to the public.

Then they give the prospective employee a hyperlink through a VPN (Virtual Private Network) that the public cannot access but is convinced that they are a legitimate company.

The applicant has no idea about the location of the company. The boss prefers to communicate only through virtual chat. She will assign the job through a virtual portal.

But as a freelancer, the prospective employee hardly knows anything about the boss. Maybe they can chat with a chatbot or virtual assistant. However, the application would not know the employment location, company background, and other necessary info required in traditional workplaces.

The initial task was to prove to them the applicant could do the job, so they gave him a few resources to work on. The employer requires the applicant to create virtual machines and work through allocated ports. As it is cybersecurity, the applicant is not surprised to sign an NDA (Non-Disclosure Agreement).

This scenario may sound imaginary, but it is actually happening. Now, this practice has turned into a serious issue for society. It is based on the principle that if you can’t beat them, join them. What do I mean by that?

My point in this story is hackers focus on hiring talented cybersecurity experts, such as ethical hackers and cybersecurity consultants, on obtaining critical information about target organizations.

The goal is to hire experienced freelancers who can work remotely to support the goals of hacking groups. This situation was common on the dark side of the net for several years; however, it is now happening overtly on the white side as well.

A real-life example of this scenario was documented by the Gemini Advisory company recently. The report is accessible publicly at this link.

I enjoyed reading this well-articulated article titled Hacker Groups Tricked Security Pros into Working for Them: Be careful who you work for; your new job could be in cybercrime by Ronke Babajide. The article provides valuable advice to cybersecurity practitioners.

There might be several reasons for hackers to hire cybersecurity specialists. The possible use case for this type of role could be ransomware. As you might know, hackers earn substantial income from ransomware attacks. For example, as reported on the Statista website, there were 304 million ransomware attacks worldwide in 2020. It was 638 million in 2016.

Dealing with ransomware is a challenge for consumers. But they are also a challenge for large business companies and even government organizations. Security organizations such as the FBI and Europol recognize ransomware as a key threat, as mentioned in this report.

I introduced ransomware in this story and provided practical risk mitigation and incident handling guidelines in this article.

Another common reason for hackers to hire talented security workers could be to access money from online banking systems. A well-known access method is creating malicious code designed to steal money from banks. I shared one of the incidents from my experience related to a security breach for a bank in this article.

While cybersecurity is essential as a preventive measure, we must also focus on making our systems more resilient.

Many freelancers in this economic climate need to find well-paying jobs online. However, it is crucial that we check the sources of jobs with rigor.

If an offer is ambiguous and too good to be true, we need to be more cautious not to get involved in cybercrime. This situation is not only for cybersecurity freelancers but many other online technology positions too.

Thank you for reading my perspectives.

Mitigating Security Risks of APIs for Business Organizations

Eleven Emerging & Futuristic Technologies for the Global Economy & Personal Investment

Artificial Intelligence Does Not Concern Me, but Artificial Super-Intelligence Frightens Me

Besides increasing the hormonal intelligence of my readers and writing about neurotransmitters such as dopamine, serotonin, oxytocin, GABA, and acetylcholine, one of my goals as a writer is to raise awareness about the causes and risk factors of prevalent diseases that can lead to suffering and death for a large portion of the population.

I aim to educate, create awareness, and empower my readers to take control of their health and well-being.

To raise awareness about health issues, I have written several articles that present my holistic health findings from research, personal observations, and unique experiences. Below are links to these articles for easy access.

Metabolic Syndrome, Type II Diabetes, Fatty Liver Disease, Heart Disease, Strokes, Obesity, Liver Cancer, Autoimmune Disorders, Homocysteine, Lungs Health, Pancreas Health, Kidneys Health, NCDs, Infectious Diseases, Brain Health, Dementia, Depression, Brain Atrophy, Neonatal Disorders, Skin Health, Dental Health, Bone Health, Leaky Gut, Leaky Brain, Brain Fog, Chronic Inflammation, Insulin Resistance, Elevated Cortisol, Leptin Resistance, Anabolic Resistance, Cholesterol, High Triglycerides, Metabolic Disorders, Gastrointestinal Disorders, and Major Diseases.

I also wrote about valuable nutrients. Here are the links for easy access:

Boron, Urolithin, taurine, citrulline malate, biotin, lithium orotate, alpha-lipoic acid, n-acetyl-cysteine, acetyl-l-carnitine, CoQ10, PQQ, NADH, TMG, creatine, choline, digestive enzymes, magnesium, zinc, hydrolyzed collagen, nootropics, pure nicotine, activated charcoal, Vitamin B12, Vitamin B1, Vitamin D, Vitamin K2, Omega-3 Fatty Acids, N-Acetyl L-Tyrosine, and other nutrients to improve metabolism and mental health.

Disclaimer: Please note that my posts do not include professional or health advice. I document my reviews, observations, experience, and perspectives only to provide information and create awareness.

As part of my creative non-fiction writing goals, I’d like to share a few stories that might warm our hearts with a bit of humor into weighty topics.

Sample Humorous Stories

Apparently, I Was a Dog in a Previous Life

Finally, After Burning Her House, Georgia Found Enlightenment

Hilarious Tips to Prevent Brain Atrophy and Keep the Gray Matter Giggling

Amygdala Hijacks: A Humorous Approach to Emotional Mastery

My First Humorous Lecture to Science Students in the 1990s

7 Hilarious Reasons Why Your Vitality Plays Hide-and-Seek

8 Psychological Points I Had to Unlearn and Relearn the Opposite

5 Funny Yet Real Reasons We Accumulate Visceral Fat

The Quirky Side Effects of Keto Diets

Based on my writing experience and observations, I documented findings and strategies that might help you amplify your voice, engage your audience, and achieve your desired outcomes in your writing journey.

I publish my lifestyle, health, and well-being stories on EUPHORIA. My focus is on metabolic, cellular, mitochondrial, and mental health. Here is my collection of Insightful Life Lessons from Personal Stories.

You may also check my blog posts about my articles and articles of other writers contributing to my publications on Medium. I share them on my website digitalmehmet.com. Here is my professional bio. You can contact me via weblink.

You might join my six publications on Medium as a writer by sending a request via this link. 24K+ writers contribute to my publications. You might find more information about my professional background. You may join Medium with my referral link.

Cybersecurity
Technology
Freelancing
Business
Science
Recommended from ReadMedium