Hacker Group Publicly Announced That They Are Recruiting Pentesters

Hacker groups recruit pentesters because they possess valuable skills in identifying and exploiting vulnerabilities. This aligns with the offensive capabilities that are needed for cyber attacks. 

Besides this, Pentesters’ expertise in finding security flaws helps enhance the group’s ability to compromise systems and networks for malicious purposes.

Daily Dark Web recently discovered and reported that a hacker group, 62IX officially announced they are actively recruiting the pentesters along with DDoSers.

Technical Analysis

It is assumed that the 62IX hacker group is a pro-Russian hacker group. This group has been suspected of attacking several key targets through cyber networks such as telecommunications firms in Australia and Hong Kong. 

The belief is that they have deployed quite a few strategies consisting of malware and social engineering tricks to be able to infiltrate into sensitive systems. 

Moreover, it has also been claimed that 62IX hacker group indulged in spying activities on America. However, it remains unclear why the group does what it does. 

Investigations directed at this group are currently being carried out by international law enforcement agencies. 

Here’s what the operators of the 62IX hacker group stated:-

“In order to join our team, you need to fill out a short questionnaire, according to which we will judge whether to recruit you or not.

“When filling out the questionnaire, be as honest as possible and express your thoughts correctly, as well as the information you fill out.”

Here below we have presented the universal form:-

Universal form (Source – Twitter)

The trend of hacker groups recruiting pentesters has quickly changed over the past few years, with cyber threats becoming more sophisticated.

These groups have increasingly looked for pentesters to strengthen their offensive capabilities as they recognize the strategic advantage of having people with real security knowledge.

Precautionary Measures

Here below we have mentioned all the precautionary measures:-

  • Thorough Background Checks
  • Strict Code of Ethics
  • Regular Monitoring
  • Non-Disclosure Agreements (NDAs)
  • Education and Training
Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here