Hacker Personas: The Infiltrator

A Deeper Look Into Cybercrime

Published March 2021

X

Infiltrators rely on virtual back doors and unprotected points of entry to slip through hidden cracks. Hiding in the shadows, this type of cybercriminal lurks, watches and waits for the opportunity to invade systems. DNS (Domain Name System), which is considered a trusted protocol, is especially vulnerable. Once the criminal redirects internet traffic to malicious websites or takes control of servers, the damage is inevitable. But thanks to modern technology and security awareness training, damage can be mitigated quickly.