The number of hacks and cyber security incidents is increasing year by year (compare also TOP5 list of the world's biggest hacks). A dynamic arms race has broken out between black hat hackers (the bad guys) and cyber security specialists (the good guys).

The company Lockheed Martin (US-American armaments and technology group) has analysed a Black Hat hacker's procedure, which has become known as Cyber Kill Chain. The hacker's method is broken down into a 5-step procedure, which can be summarized as follows:

  • Step one: Public sources are used to gather information on the company structure, technical infrastructure, software in use
  • Step two: The attackers collect more detailed information, for example about spear phishing attacks
  • Step three: Based on the vulnerability analysis, a targeted attack is attempted, such as placement of a USB stick with malware
  • Step four: Now a bridgehead is installed, a backdoor into the IT infrastructure of the attacked company
  • Step Five: Takeover

There are a whole series of hacker films (including Die Hard 4.0), let me point out a recommendable German production: The feature film Who am I. No system is safe, from 2014. The films stars the actors Tom Schilling, Elyas M'Barek, Hannah Herzsprung. You'll also be able to watch social engineering at its best ... with cat videos!


The author is a manager in the software industry with international expertise: Authorized officer at one of the large consulting firms - Responsible for setting up an IT development center at the Bangalore offshore location - Director M&A at a software company in Berlin.