The number of hacks and cyber security incidents is increasing year by year (compare also TOP5 list of the world's biggest hacks). A dynamic arms race has broken out between black hat hackers (the bad guys) and cyber security specialists (the good guys).

The company Lockheed Martin (US-American armaments and technology group) has analysed a Black Hat hacker's procedure, which has become known as Cyber Kill Chain. The hacker's method is broken down into a 5-step procedure, which can be summarized as follows:

  • Step one: Public sources are used to gather information on the company structure, technical infrastructure, software in use
  • Step two: The attackers collect more detailed information, for example about spear phishing attacks
  • Step three: Based on the vulnerability analysis, a targeted attack is attempted, such as placement of a USB stick with malware
  • Step four: Now a bridgehead is installed, a backdoor into the IT infrastructure of the attacked company
  • Step Five: Takeover

There are a whole series of hacker films (including Die Hard 4.0), let me point out a recommendable German production: The feature film Who am I. No system is safe, from 2014. The films stars the actors Tom Schilling, Elyas M'Barek, Hannah Herzsprung. You'll also be able to watch social engineering at its best ... with cat videos!

Author

Sebastian Zang has cultivated a distinguished career in the IT industry, leading a wide range of software initiatives with a strong emphasis on automation and corporate growth. In his current role as Vice President Partners & Alliances at Beta Systems Software AG, he draws on his extensive expertise to spearhead global technological innovation. A graduate of Universität Passau, Sebastian brings a wealth of international experience, having worked across diverse markets and industries. In addition to his technical acumen, he is widely recognized for his thought leadership in areas such as automation, artificial intelligence, and business strategy.