Categories: HackingSecurity

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government affairs, but the scenario is reversed, there has been an unprecedented technological evolution and principal countries have discovered a new way of making war, a new way of spying.

Today the hacker is the most important player for governments and cyber warfare but not only, private companies and industry of crime consider him as the repository of knowledge that has become crucial, the mastery of new technology.

Today is very common read about zero-day vulnerability, a concept unknown to many professional some years ago, we are all aware of the potential risks related to the exploit of this kind of “bugs” in large

An essential element of a «cyber weapon» is the exploit of an unknown vulnerability. Known as zero day vulnerability, it is a factor that influences its efficiency and makes it possible to target specific applications or infrastructures. Governments and private business have suddenly discovered the importance of discovering bugs in the most common applications, creating a new market for the new precious commodity.

Hacker’s skill is essential to develop a cyber weapon, it’s fundamental for governments to approach what is considered the fifth domain, the cyber space, these professional could help military to protect of critical infrastructures but could also be engaged to penetrate foreign networks in complex and hidden cyber operations.

China, Russia, Iran, North Korea, Israel and U.S. are the countries that major investing in the creation of new cyber units composed by hackers involving them in offensive cyber operations and cyber espionage campaign.

In many cases the governments have public announced the recruiting of skilled hackers,  NSA chief General Keith B. Alexander during last edition of Defcon Hacker Conference, asked to the hacker community for help U.S. securing cyberspace.

If the figure of hacker is changed what can be said on its way to operate? Differently from the past also hacking has been influenced by consolidated procedures of analysis, hacking has become in many cases a profession for the exercise of which requires the right tools.

The hacker now has a multitude of tools and application to stress and test systems to be studied, there are established methods essentially based on shared experiences with colleagues. Forums, events and web allow rapid circulation of information that facilitates very much the work of these professionals who once worked mostly in solitary and in total anonymity.

General Keith Alexander, director of the National Security Agency told a Washington forum that the today hacking practices is increasingly focused  to cause severe economic damage.

According the official hackers are stepping up the intensity of their attacks, moving from “disruption” to “destruction” of targets.

“We are seeing the threat grow from exploitation to disruption to destruction,” he declared at the Woodrow Wilson Center.

The attacks of groups of hackers could represent a serious menace for economic texture of a country but could also devastate critical infrastructures such as power grid operators —

“all of that is in the realm of the possible.” the General said.

The last wave of attacks against oil sector and banking have raised the possibility to block the operating of targeted systems, these types of destructive offensive can wipe out data with dramatic consequences that once again alert on the opportunity to establish the proper response to the incidents.

On the topic Alexander said.

“It could overwrite the ability of a system to turn on,” “Think about a company that loses all the data on its system… If you wipe out the data, you wipe out the ability of the system to operate.”

According to U.S. official one of the first action to do to improve the collaboration between private sector and governments, the cooperation must be explicitly regulated in an efficient cyber strategy to respond to incoming cyber threats.

Is desirable that the definition of a common strategy to respond to cyber attacks shared by primary actors of every sector.

U.S. Government is aware of the capabilities of groups of hackers and it afraid a cyber 9/11, cybercriminals and cyber terrorists could soon create serious damage and the country must be prepared.

The discussion is raised during the same days in which is circulated the news regarding the attack against one of the principal Office of The White House despite according official fonts revealed that no classified systems were breached and there was no indication any data breach.

In a similar context once again the figure of the hacker assume a strategic role especially for private sector and with particular reference to Small Business on which the economy of giants is based. A proper cyber strategy must consider also measures to defend these vulnerable organizations and the sharing knowledge on basic hacking techniques could prevent disastrous consequences.

How many Sys Admins know about the protection against SQL injection attacks? How many developers know exactly how an hacker could exploit the lack of validation inside their code?

Reading reports of continued attacks such as those at universities all over the world we believe that too few really know how hackers try to circumvent systems of companies and organizations …

If we cannot beat them then let them friends!

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.