Go back

The Ethics of Cybersecurity Training: Are Hackers Learning More from Online Platforms than Defenders?

The digital world is like a massive city—every corner, every street, and every door is connected through networks and systems. Just like a city needs police to maintain order, the digital world needs cybersecurity professionals to protect against hackers who aim to exploit weaknesses. Online platforms like TryHackMe, Hack The Box, and Cybrary have revolutionized how we teach these skills, making cybersecurity education more accessible than ever. But here’s the hard truth: the same resources helping defenders learn how to protect systems are also empowering hackers to attack them.

This isn’t a hypothetical issue; it’s happening right now. Hackers are using online platforms to sharpen their skills, learn new techniques, and gain access to tools that make them even more dangerous. So, how do we address this? Let’s break it down, one point at a time.

Why Online Cybersecurity Training Is a Double-Edged Sword

The idea behind online cybersecurity platforms is simple: make knowledge accessible to everyone to strengthen global digital security. But the reality is more complicated. These platforms don’t (and often can’t) distinguish between someone learning to defend a company’s network and someone planning to hack it.

How Hackers Exploit These Platforms

Hackers aren’t using these platforms to “dabble” in cybersecurity - they’re using them as tools to become more skilled, professional attackers. Here’s how:

1. Honing Attack Skills

Cybersecurity platforms teach penetration testing (ethical hacking), which is all about thinking like a hacker to find weaknesses. However, for someone with malicious intent, this training provides a roadmap for exploiting systems.

  • Example: Let’s say a course teaches SQL injection techniques - a common method hackers use to extract data from websites. A student might use this knowledge ethically to test their company’s website, but a hacker could use the exact same method to steal sensitive customer data from an unsecured e-commerce site.
  • Why It Matters: Cybersecurity platforms often go into incredible technical detail to ensure students truly understand the methods. While this is essential for defenders, it also means hackers have everything they need to replicate the attacks.

2. Practicing Without Fear

Platforms like Hack The Box create virtual labs where users can simulate attacks on isolated systems. This is fantastic for ethical training, but it’s also a safe environment for hackers to refine their techniques without risk of getting caught.

  • Example: Imagine a hacker who’s still learning the ropes. They can experiment with advanced hacking tools like Nmap, Metasploit, or Burp Suite in a simulated environment, mastering their use before applying them to real-world targets.

3. Accessing Advanced Topics

Many platforms go beyond basic cybersecurity skills and dive into advanced areas like malware analysis and reverse engineering. While this knowledge is crucial for defenders to combat cyber threats, it’s equally valuable for hackers aiming to create more sophisticated malware.

  • Example: A course might teach students how to disassemble malware to understand how it bypasses antivirus software. A hacker could use the same techniques to create new malware that’s harder to detect.

4. Blending into the Crowd

Hackers don’t need to announce their intentions. They can sign up for these platforms using fake identities, participate in community discussions, and complete challenges alongside genuine cybersecurity professionals. This anonymity makes it nearly impossible to differentiate between ethical learners and malicious actors.

The Platforms Hackers Love to Exploit

Let’s look at some of the most popular platforms in cybersecurity training and why they’re both a blessing and a risk.

1. Hack The Box

Hack The Box (HTB) is like Disneyland for cybersecurity enthusiasts. It offers realistic, hands-on challenges that simulate real-world hacking scenarios.

  • How It Works: Users “break into” virtual machines (VMs) designed to mimic common vulnerabilities found in systems. Challenges range from beginner-friendly to highly advanced.
  • How Hackers Exploit It: For hackers, HTB is the perfect training ground. They can experiment with real hacking tools and techniques without consequences, mastering the exact methods they’ll later use against actual targets.
  • Example: A challenge might involve exploiting a misconfigured file-sharing server to gain unauthorized access. While a defender might use this skill to protect their organization, a hacker could apply it to attack poorly secured servers found online.

2. TryHackMe

TryHackMe is known for its user-friendly approach, making cybersecurity education accessible to beginners while still offering advanced challenges.

  • How It Works: The platform gamifies learning, presenting lessons as “rooms” that users solve step by step. Topics include web application security, phishing, privilege escalation, and more.
  • How Hackers Exploit It: Hackers, especially novices, love TryHackMe for its approachable design. It provides a clear learning path, starting with basic skills and advancing to complex attack methods.
  • Example: A phishing simulation room might teach how to craft convincing fake emails. While the intent is to educate defenders, hackers can take this knowledge and create phishing campaigns targeting vulnerable groups, like small businesses or seniors.

3. Cybrary

Cybrary is like the Netflix of cybersecurity training—offering a massive library of free and paid courses covering everything from ethical hacking to compliance and governance.

  • How It Works: Open access to a wide range of courses ensures anyone can learn, regardless of experience level.
  • How Hackers Exploit It: Cybrary’s open-access model is a double-edged sword. While it democratizes knowledge, it also allows malicious actors to access advanced topics without restrictions.
  • Example: A malware analysis course teaches students how to reverse-engineer malicious software. A hacker can use this to study existing malware, improve its capabilities, and launch more effective attacks.

Why Hackers Can Blend In So Easily

The biggest problem with online platforms is that they don’t ask too many questions. Their goal is to educate as many people as possible, but this openness also makes them vulnerable to misuse.

1. Anonymity: Most platforms require little more than an email address to sign up. Hackers can use fake credentials, making it impossible to trace their

identity.

2. No Vetting Process: Anyone can enroll, regardless of their intentions. Background checks or proof of ethical intent are virtually nonexistent.

3. Hands-On Focus: Practical learning is central to these platforms, which is great for defenders—but it’s also perfect for hackers looking to practiceattacks.

Real-Life Examples of Misuse

1. The Insider Threat

A disgruntled former employee used skills gained through cybersecurity training to breach his previous employer’s systems, causing millions in damages. This incident highlights how easily knowledge can be weaponized when ethical intent is absent.

2. The Teenage Hacker

In the UK, a teenager used free online resources, including cybersecurity platforms, to execute ransomware attacks on small businesses. What started as curiosity quickly escalated into illegal activity, showing how accessible training can enable even inexperienced attackers.

3. State-Sponsored Cybercrime

Some government-backed hacking groups actively recruit from cybersecurity communities. Individuals who excel on platforms like Hack The Box often find themselves targeted for recruitment, where their skills are used offensively.

What Can Be Done to Prevent Misuse?

1. Stricter Registration Requirements

Platforms could implement identity verification, requiring users to prove who they are before accessing advanced content. While this adds friction, it reduces the chances of bad actors slipping through the cracks.

2. Mandatory Ethics Education

Every course should emphasize the ethical use of cybersecurity skills. This includes teaching the legal consequences of cybercrime and showing real-world examples of the harm caused by malicious hacking.

3. Monitoring and AI Detection

Platforms can use AI to monitor user behavior. For instance, accounts that repeatedly access offensive training materials could be flagged for further review.

4. Collaborating with Law Enforcement

Platforms can partner with governments to report suspicious activity. For example, anonymized data could be shared to identify potential threats while protecting users' privacy.

The Responsibility of Knowledge

At the end of the day, cybersecurity knowledge is a tool—it can be used to build or destroy. While online platforms are doing incredible work to empower defenders, they also need to take responsibility for the unintended consequences of their accessibility.

For those learning cybersecurity, remember: the skills you gain carry immense power. Use them wisely, because every action you take has the potential to impact not just systems but people’s lives. A world with better digital defenses starts with ethical education and responsible use of knowledge.

Author: Goran P.

Source: https://www.linkedin.com/in/goran-p-18b885250/

Photo: AI

Subscribe to our bi-weekly Linkedin newsletter

Subscribe

You can support TheSIGN by becoming our SATELLITE. Click to learn more about sponsorship.