Hacking to Get Paid

Authored by Jake Moraites; Cybersecurity Consultant and Lindsay Timcke; Cybersecurity Director

In the current digital landscape, hacking has become a lucrative business opportunity for cybercriminals across the globe. Gone are the days where hacking was limited to isolated incidents of curiosity or mischief. Hacking is a business now and one way or another, hackers will ensure they get paid.

Ransomware is only step one in the nightmare of a breach these days. Typically, when hackers break into organizations and install ransomware, they are able to hold the organization hostage until they are paid substantial ransom payments. This approach has proven to be highly effective for years providing hackers with a quick and direct source of income. However, it is important realize ransomware nowadays is often just the beginning of a more comprehensive attack.

BlackCat Attack:

Recent activities of the hacking group BlackCat demonstrate how tactics used by hackers are evolving. In their breach of the online platform Reddit, BlackCat claims they were able to exfiltrate close to 80 gigabytes of stolen confidential data. Not only are hackers focusing on locking down valuable systems, but they have moved their focus to exfiltrating valuable information for various purposes. Exfiltration allows cybercriminals to exploit data such as passwords, addresses, and intellectual property to use for further financial gain.

How long are they in your system before you notice?
This past year, IBM reported that hackers are commonly in systems for over 207 days prior to a firm identifying a breach, and on average takes another 70 days to contain the attack once it has been identified (per IBM Cost of a Data Breach Report 2022). Essentially this means that once hackers breach a space, they can map the environment looking for ways to exfiltrate data for months without anyone realizing they are there. The prolonged presence of hackers within systems demonstrates the importance of organizations having proactive security measures and continuous network monitoring.


If a hacker has breached your environment and has been behind your firewall, then it is a very good assumption that you did not find them until they were ready to be found and presume, they have exfiltrated your data. The hackers were not so sophisticated that they beat all your perimeter defenses to get caught sleeping behind your network.

Mitigate or reduce the likelihood of an attack

By better understanding the changing tactics and motivations of hackers, organizations can better prepare themselves to mitigate any potential risks they may face.

How can CLA help?

CLA’s cybersecurity team has years of experience performing risk assessments, application review, responding to cyber incidents and helping mitigate them. Please contact us to help in assessing and mitigating your risk for a cyber attack.

  • 813-384-2735

Kadian currently works with the Information Security Services Group as well as higher education group providing compliance services, outsourcing and co-sourcing engagements and information security assessments.

Comments are closed.