Hacker groups recruit pentesters because they possess valuable skills in identifying and exploiting vulnerabilities. This aligns with the offensive capabilities that are needed for cyber attacks.
Besides this, Pentesters’ expertise in finding security flaws helps enhance the group’s ability to compromise systems and networks for malicious purposes.
Daily Dark Web recently discovered and reported that a hacker group, 62IX, officially announced they are actively recruiting pentesters and DDoSers.
It is assumed that the 62IX hacker group is a pro-Russian hacker group. This group has been suspected of attacking several key targets through cyber networks, such as telecommunications firms in Australia and Hong Kong.
The belief is that they have deployed quite a few strategies consisting of malware and social engineering tricks to be able to infiltrate sensitive systems.
Moreover, it has also been claimed that 62IX hacker groups indulged in spying activities on America. However, it remains unclear why the group does what it does.
International law enforcement agencies are currently carrying out investigations directed at this group.
Here’s what the operators of the 62IX hacker group stated:-
“In order to join our team, you need to fill out a short questionnaire, according to which we will judge whether to recruit you or not.
“When filling out the questionnaire, be as honest as possible and express your thoughts correctly, as well as the information you fill out.”
Here below is the announcement spotted by Daily Dark Web.
The trend of hacker groups recruiting pentesters has quickly changed over the past few years, with cyber threats becoming more sophisticated.
These groups have increasingly sought pentesters to strengthen their offensive capabilities as they recognize the strategic advantage of having people with real security knowledge.
Here below, we have mentioned all the precautionary measures:-
You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
In the current software landscape, security breaches caused by untested or poorly tested code are…
Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…
In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…
Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…
The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…