Hiring a hacker online; What you need to know.

Where do I hire professional hackers online? This is like asking, “which is the best website to hire a mechanic?” — without specifying whether you need an automobile mechanic, an air conditioning mechanic, a bicycle mechanic, a motorcycle mechanic, a tractor mechanic, etc. Going even further down, the best website to find a mechanic who works on VWs may not be the best website to find a mechanic who works on Mazdas.

There’s more than one type of hacker. Hollywood depictions where “a hacker” can hack absolutely any type of computer are no more realistic than those where every doctor has the skills of a trauma surgeon, EMT, general practitioner, neurosurgeon, and so on — or those where every scientist is an expert at absolutely every kind of science, whether it’s biology, chemistry, physics, or whatever. (And typically has the skills of an engineer, mechanic, and electrician as well.)

Those that operate outside of the law would also be those who would take advantage of you and may very well complicate what ever issue you are going through. That is why you will want to hire someone who understands the law and operates accordingly. By and large, hackers are considered either white hats (“ethical”) hackers or black hats. Keep in mind that as usual, the world is not black and white only, though.

You can hire white hats quite easily from a lot of reputable companies and then they try to break into your system, your application or whatever. This is called a penetration test and is about as “unglamorous” as you can imagine. There are automated test tools available, some of them quite sophisticated (and expensive). They even provide you with neat reports. What a penetration tester then does is to reassess and verify the findings. Think of penetration tests as a QA measure for system hardening and security awareness of the various people involved with an IT system, and you are close enough to the truth.

For completeness, I will give you a short overview on Black Hats. Black Hats can — by and large, again — be divided into three subgroups.

  • Script-Kiddies, who download invasion tools from the internet (often themselves being malware) or misuse tools used by white hat hackers in the hopes of finding a way to break into a system. Nowadays, they usually deploy a crypto miner upon success. Not for hire.
  • Then there are more sophisticated attackers with more criminal energy. People using ransomware on larger companies fall into this category.
  • Another are bot-net providers. You can use bot-nets to overload services and prevent valid users from accessing them. In the case of e-commerce websites, that can create massive losses — so you can (try) to extort the owner of the site by threatening them with what is called a distributed denial of service or DDoS[2] attack. The hacker or hacker groups providing the botnets usually are not identical with the people extorting the money. They are happy to rent out their botnets, which still gives good money without the need of exposing themselves too much. And they are obviously for hire, tough not for their expertise, but for their botnets.
  • And then there are what is called Advanced Persistent Threats. Those are usually funded by governments and/or intelligence agencies, well equipped and highly skilled people. Very much not for hire.

Recover compromised accounts (should be done by the web site/service provider) or generally give you assistance to prevent compromise accounts. You’ll find freelancers who know their stuff, are very patience with newbies and are not very expensive (though – rarely all three of those together).

If you want much higher quality professionals, you can try at the contact page on y3llowl4bs but beware: most high level security professionals are not only expensive, but also You have to be very specific, know what you need, and be willing to pay the associated costs.

There is a wide range of different hackers, from those who are paid $5 an hour to those who are paid $500/hr.

Typically a real hacker would not threaten you before he has shown real evidence of his work. And that does not include public data, like your LinkedIn password or any other leaked public information.

For example, back in the day, we would eject the CD-ROM drive off a person’s computer, and then start the hacker talk with them, so that they knew it’s for real.

Also, worthy hackers (those getting paid more than $50/hr) generally do not target average people. They either target high profile people, or high profile systems, such as banks, infrastructure, political figures, government agencies, etc. so if someone claims to be a big-time hacker and at the same time threatens to hack your computer and steal your information, these are just contradictory.

Even for an expert hacker it would take 1 or 2 days worth of work to get into a personal computer and extract useful information. That’s $1,000 worth of time as well as a significant risk of legal prosecution, for almost nothing in return.