Cyber Security News

Hacker Group Publicly Announced That They Are Recruiting Pentesters

Hacker groups recruit pentesters because they possess valuable skills in identifying and exploiting vulnerabilities. This aligns with the offensive capabilities that are needed for cyber attacks. 

Besides this, Pentesters’ expertise in finding security flaws helps enhance the group’s ability to compromise systems and networks for malicious purposes.

Daily Dark Web recently discovered and reported that a hacker group, 62IX, officially announced they are actively recruiting pentesters and DDoSers.

Hackers Recruiting Pentesters

It is assumed that the 62IX hacker group is a pro-Russian hacker group. This group has been suspected of attacking several key targets through cyber networks, such as telecommunications firms in Australia and Hong Kong. 

The belief is that they have deployed quite a few strategies consisting of malware and social engineering tricks to be able to infiltrate sensitive systems. 

Moreover, it has also been claimed that 62IX hacker groups indulged in spying activities on America. However, it remains unclear why the group does what it does. 

International law enforcement agencies are currently carrying out investigations directed at this group. 

Here’s what the operators of the 62IX hacker group stated:-

“In order to join our team, you need to fill out a short questionnaire, according to which we will judge whether to recruit you or not.

“When filling out the questionnaire, be as honest as possible and express your thoughts correctly, as well as the information you fill out.”

Here below is the announcement spotted by Daily Dark Web.

The trend of hacker groups recruiting pentesters has quickly changed over the past few years, with cyber threats becoming more sophisticated.

These groups have increasingly sought pentesters to strengthen their offensive capabilities as they recognize the strategic advantage of having people with real security knowledge.

Precautionary Measures

Here below, we have mentioned all the precautionary measures:-

  • Thorough Background Checks
  • Strict Code of Ethics
  • Regular Monitoring
  • Non-Disclosure Agreements (NDAs)
  • Education and Training

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

13 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

2 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago