Cybersecurity: Wondering how much hackers make?

Wondering how much hackers make?

Today, cybercrime is characterized by scale and "industrialization". Global cybercriminal organizations are becoming more and more professional and "operate" like enterprises. They usually recruit talents on the dark web and provide developers and hackers with very Competitive monthly salary and benefits, including paid vacation and sick leave.

Kaspersky recently released a report that analyzed 200,000 job advertisements posted on 155 dark web sites from March 2020 to June 2022. Hacker organizations and APT organizations recruit mainly for software development. people (61% of all ads), and offer highly competitive compensation packages to attract talent.

According to the report, for capable attack specialists, cybercrime job advertisements offer an average salary of up to $15,000 per month and a maximum salary of $20,000.

In addition to developers, hacking groups are also trying to supplement other job roles, including data analysts, malware and tools developers, initial intrusion actors, reverse engineers, website and phishing email designers, malware testers and IT management staff etc.

"Employment" offers offered by cybercriminal organizations are quite competitive compared with similar positions in the legitimate job market, and may appeal to unemployed professionals or young IT graduates who are struggling to find work.

Uncle Dun can only sigh, criminals nowadays are racking their brains! We understand that talent is competitiveness. And many companies and departments have not realized the importance of recruiting troops in network security, and they have been preempted by black products.

However, Uncle Dun still wants to remind comrades who want to learn "technology" on this topic. Don't be led astray by high salaries.

Let us popularize the consequences of cyber security crimes for you.

The relevant provisions of the "Criminal Law" on cybersecurity crimes mainly include Articles 285, 286, 287, and 291, mainly for illegal intrusion into computer information. System crimes, illegally obtaining computer information system data, illegally controlling computer information system crimes, providing intrusion, illegally controlling computer information system programs and tools, destroying computer information systems, fabricating and disseminating false information, selling to others or providing citizens’ personal information Penalties stipulated in the Criminal Penalty Regulations.

[Crime of Illegal Intrusion into Computer Information System] Whoever violates state regulations and intrudes into computer information systems in the fields of state affairs, national defense construction, and cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention.

[Crime of Destroying Computer Information System] Whoever , in violation of state regulations, deletes, modifies, adds, or interferes with the functions of the computer information system, causing the computer information system to fail to operate normally, with serious consequences, shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; those with particularly serious consequences , shall be sentenced to fixed-term imprisonment of not less than five years.

[Illegal acquisition of computer information system data, illegal control of computer information system crimes] Violation of state regulations, intrusion into computer information systems other than the provisions of the preceding paragraph or use of other technical means to obtain data stored, processed or transmitted in the computer information system, or to If the computer information system is illegally controlled, if the circumstances are serious, they shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, and may also be sentenced to a fine; if the circumstances are particularly serious, they shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and a fine.

【Crime of providing programs and tools for intrusion and illegal control of computer information systems】providing programs and tools specially used for intrusion and illegal control of computer information systems, or providing programs to others knowingly committing illegal and criminal acts of intrusion and illegal control of computer information systems , tools, and if the circumstances are serious, it shall be punished in accordance with the provisions of the preceding paragraph.

[Crime of Aiding Information Network Criminal Activities] Knowing that others use the information network to commit crimes, providing technical support such as Internet access, server hosting, network storage, communication transmission, etc., or providing assistance such as advertising promotion, payment and settlement, etc., if the circumstances are serious, Sentenced to fixed-term imprisonment of not more than three years or criminal detention, and concurrently or solely to a fine.

In fact, the salary of network security engineers is not low.

According to the research data of authoritative organizations, the network security offensive and defensive personnel that employers are most in short of have a large gap in penetration testing, vulnerability discovery and utilization, and reverse analysis skills, accounting for 40%, 33% and 32% respectively. Talents with the above skills are highly sought after by employers.

The earlier you learn, the better you will be able to catch up with the good opportunities for industry development. Be the first to become the industry elite.

​finally

In order to help you better learn about network security, the editor has prepared a set of introductory/advanced learning materials for network security for you. The content in it is all notes and materials suitable for zero-based beginners. I understand, all the information is 282G in total. If you need a full set of network security introduction + advanced learning resource package, you can click to get it for free (if you encounter problems with scanning codes, you can leave a message in the comment area to get it)~

CSDN spree: "Introduction to Network Security & Advanced Learning Resource Pack" for free sharing

Network security source code collection + toolkit
Network
security interview questions
The last is the network security interview questions section that everyone is most concerned about.
insert image description here

The total data is 282G. If you need a full set of network security introduction + advanced learning resource package, you can click to get it for free ( If you encounter problems with scanning the code, you can leave a message in the comment area to get it)~

Internet Security Gift Pack: "Introduction to Internet Security & Advanced Learning Resource Pack" for free sharing

​Video supporting materials & domestic and foreign network security books and documents

Internet Security Gift Pack: "Introduction to Internet Security & Advanced Learning Resource Pack" for free sharing

Guess you like

Origin blog.csdn.net/Y525698136/article/details/131412026