Go back
The digital world is like a massive city—every corner, every street, and every door is connected through networks and systems. Just like a city needs police to maintain order, the digital world needs cybersecurity professionals to protect against hackers who aim to exploit weaknesses. Online platforms like TryHackMe, Hack The Box, and Cybrary have revolutionized how we teach these skills, making cybersecurity education more accessible than ever. But here’s the hard truth: the same resources helping defenders learn how to protect systems are also empowering hackers to attack them.
December 20, 2024
This isn’t a hypothetical issue; it’s happening right now. Hackers are using online platforms to sharpen their skills, learn new techniques, and gain access to tools that make them even more dangerous. So, how do we address this? Let’s break it down, one point at a time.
The idea behind online cybersecurity platforms is simple: make knowledge accessible to everyone to strengthen global digital security. But the reality is more complicated. These platforms don’t (and often can’t) distinguish between someone learning to defend a company’s network and someone planning to hack it.
How Hackers Exploit These Platforms
Hackers aren’t using these platforms to “dabble” in cybersecurity - they’re using them as tools to become more skilled, professional attackers. Here’s how:
1. Honing Attack Skills
Cybersecurity platforms teach penetration testing (ethical hacking), which is all about thinking like a hacker to find weaknesses. However, for someone with malicious intent, this training provides a roadmap for exploiting systems.
2. Practicing Without Fear
Platforms like Hack The Box create virtual labs where users can simulate attacks on isolated systems. This is fantastic for ethical training, but it’s also a safe environment for hackers to refine their techniques without risk of getting caught.
3. Accessing Advanced Topics
Many platforms go beyond basic cybersecurity skills and dive into advanced areas like malware analysis and reverse engineering. While this knowledge is crucial for defenders to combat cyber threats, it’s equally valuable for hackers aiming to create more sophisticated malware.
4. Blending into the Crowd
Hackers don’t need to announce their intentions. They can sign up for these platforms using fake identities, participate in community discussions, and complete challenges alongside genuine cybersecurity professionals. This anonymity makes it nearly impossible to differentiate between ethical learners and malicious actors.
The Platforms Hackers Love to Exploit
Let’s look at some of the most popular platforms in cybersecurity training and why they’re both a blessing and a risk.
1. Hack The Box
Hack The Box (HTB) is like Disneyland for cybersecurity enthusiasts. It offers realistic, hands-on challenges that simulate real-world hacking scenarios.
2. TryHackMe
TryHackMe is known for its user-friendly approach, making cybersecurity education accessible to beginners while still offering advanced challenges.
3. Cybrary
Cybrary is like the Netflix of cybersecurity training—offering a massive library of free and paid courses covering everything from ethical hacking to compliance and governance.
The biggest problem with online platforms is that they don’t ask too many questions. Their goal is to educate as many people as possible, but this openness also makes them vulnerable to misuse.
1. Anonymity: Most platforms require little more than an email address to sign up. Hackers can use fake credentials, making it impossible to trace their
identity.
2. No Vetting Process: Anyone can enroll, regardless of their intentions. Background checks or proof of ethical intent are virtually nonexistent.
3. Hands-On Focus: Practical learning is central to these platforms, which is great for defenders—but it’s also perfect for hackers looking to practiceattacks.
1. The Insider Threat
A disgruntled former employee used skills gained through cybersecurity training to breach his previous employer’s systems, causing millions in damages. This incident highlights how easily knowledge can be weaponized when ethical intent is absent.
2. The Teenage Hacker
In the UK, a teenager used free online resources, including cybersecurity platforms, to execute ransomware attacks on small businesses. What started as curiosity quickly escalated into illegal activity, showing how accessible training can enable even inexperienced attackers.
3. State-Sponsored Cybercrime
Some government-backed hacking groups actively recruit from cybersecurity communities. Individuals who excel on platforms like Hack The Box often find themselves targeted for recruitment, where their skills are used offensively.
1. Stricter Registration Requirements
Platforms could implement identity verification, requiring users to prove who they are before accessing advanced content. While this adds friction, it reduces the chances of bad actors slipping through the cracks.
2. Mandatory Ethics Education
Every course should emphasize the ethical use of cybersecurity skills. This includes teaching the legal consequences of cybercrime and showing real-world examples of the harm caused by malicious hacking.
3. Monitoring and AI Detection
Platforms can use AI to monitor user behavior. For instance, accounts that repeatedly access offensive training materials could be flagged for further review.
4. Collaborating with Law Enforcement
Platforms can partner with governments to report suspicious activity. For example, anonymized data could be shared to identify potential threats while protecting users' privacy.
At the end of the day, cybersecurity knowledge is a tool—it can be used to build or destroy. While online platforms are doing incredible work to empower defenders, they also need to take responsibility for the unintended consequences of their accessibility.
For those learning cybersecurity, remember: the skills you gain carry immense power. Use them wisely, because every action you take has the potential to impact not just systems but people’s lives. A world with better digital defenses starts with ethical education and responsible use of knowledge.
Author: Goran P.
Source: https://www.linkedin.com/in/goran-p-18b885250/
Photo: AI
You can support TheSIGN by becoming our SATELLITE. Click to learn more about sponsorship.