Hack 2024
Hack 2024
VOLUME 8
HACKER DEMOGRAPHICS
Defining “Hacker”
HACKING MOTIVATIONS
If you were to ask 10 people off the
street whether they could distinguish
between hackers and cybercriminals,
they’d likely be unable to do so.
HARDWARE HACKING
Merriam-Webster defines a “ “hhacker”
acker” as “an expert at
programming and solving problems with a computer.”
While “hacker” is the predominant self-descriptor
used by the cybersecurity community (with even
HACKERS AND AI
some CISOs we know adopting the moniker), this
benevolent term has sadly become synonymous with
malice. The bad guys also call themselves hackers,
and unfortunately, they get most of the attention.
2
Table of Contents
Report Highlights 04
Letter from the Editor 05
Hacker Hacking
Demographics Motivations
Hardware Hackers
Hacking and AI
Conclusion 33
ITMOAH 2024
Content Gallery 34
Glossary 35
© 2024 Bugcrowd Inc. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. 3
KEY TAKEAWAYS
Report Highlights
This edition of Inside the Mind of a Hacker analyzed almost 1300 survey responses
from hackers on the Bugcrowd Platform, in addition to hacker interviews.
4
HACKER DEMOGRAPHICS
LETTER FROM THE EDITOR
An introduction from
our CEO David Gerry
HACKING MOTIVATIONS
Celebrating hackers is at the core of At first glance, nothing might seem further from
what we do at Bugcrowd. I’ve witnessed the abstract world of AI than the concrete world
of hardware hacking. However, consider the
so much change over the past decade
infrastructure needed to support the growing
when it comes to perceptions of the
demands of AI and complex applications.
hacking community.
Years ago, hackers were almost exclusively assumed
In our distributed computing world,
HARDWARE HACKING
to be criminals. Now, most security professionals
it’s easy to forget that the cloud is
not only understand the difference between threat
actors and hackers, but they actually have personal
made of iron.
experience with ethical hacking.
Internet of Things (IoT) devices are in our homes.
This is the eighth year in a row that we’ve published Autonomous vehicles are on the streets. Technology
Inside the Mind of a Hacker, and we’ve covered is in our pockets and wearable on our wrists.
some really compelling subjects over the years. Hardware powers everything, and that hardware
HACKERS AND AI
From neurodiversity in the hacking community to the needs to be secure.
rise of hacking influencer platforms, we’ve examined
Beyond the tie-ins between hardware hacking and
a broad spectrum of important topics.
AI as a target, AI is also seen as a tool. Hardware
Originally, we published Inside the Mind of a Hacker hackers can use AI for educational purposes, such
with the goal of breaking through dated hacker as when deciding what frequency to try for a fault
stereotypes. As perceptions changed, this report injection on a device.
seized the opportunity to do something different;
I’ve personally had the privilege of attending several
it now focuses on highlighting what’s next for the
Bug Bashes, where I’ve witnessed firsthand expert
hacking community. What trends are we seeing?
hardware hackers combining technology with the
What unique directions are hackers taking in their
hands-on ingenuity of humans. They’re taking
security research? How can Bugcrowd customers
machines apart, turning them upside down, and
and the greater cybersecurity community benefit
breaking them down, all while running automation
from these shifts?
programs, pulling apart code, and testing gaps in
In the last edition, Bugcrowd provided an exclusive technology. It’s truly the perfect union between
first look into how the hacking community is innovative technology and human ingenuity, which
leveraging generative AI as a tool. Owing to is something we’re really passionate
its widespread adoption, generative AI about at Bugcrowd.
was suddenly a topic of conversation
Inside the Mind of a Hacker
everywhere. But we noticed something
spotlights the immense power
interesting this year when analyzing the
that the hacker community can
data provided by almost 1300 hacker
unlock for our customers.
survey respondents. There is no denying
that AI is still top of mind for many, but
ITMOAH 2024
5
HACKER DEMOGRAPHICS
T H E A N AT O M Y O F A
HACKER24
HACKING MOTIVATIONS
Personal
development
61%
say that hacking
helped them get a job
is the main hacking
motivator for
28%
HARDWARE HACKING
64%
hack
part-time
HACKERS AND AI
58%
are 24 years
old or younger
83%
are confident in
hacking AI-powered
hardware and
software
77%
90%
are Gen-Z or
use AI technologies
to hack
millennials
92%
2/3
encountered a vulnerability
speak two or more
languages
6
HACKER DEMOGRAPHICS
A Day in the
Life of a Hacker
HACKING MOTIVATIONS
The world of hacking is as diverse as it is dynamic. In this section, we'll explore the demographics of
Far from being a monolithic group, hackers of the hacking community, shedding light on their work
today represent a broad spectrum of backgrounds, habits, educational backgrounds, and the various
experiences, and approaches to cybersecurity. From paths that led them to this field. By understanding
dedicated professionals who've turned their passion who hackers are and how they operate, we gain
into a full-time career to weekend warriors balancing valuable insights into the human element of
day jobs and bug hunting, these individuals are cybersecurity—an aspect that's just as crucial as the
HARDWARE HACKING
united by their drive to uncover vulnerabilities and technology itself.
strengthen digital defenses.
The Basics
Languages Spoken Gender Differences
HACKERS AND AI
8% 1 1% Non-binary
also absolutely
owning the hacking
scene!
7
HACKER DEMOGRAPHICS
A DAY IN THE LIFE OF A HACKER
HACKING MOTIVATIONS
than 10 hours to their craft.
HARDWARE HACKING
their craft with the same
15–29 hours 10–14 hours skills gap. Hackers
degree of professionalism are crucial in today's
as in any other career. digital defense.
HACKERS AND AI
01 Hacking and security research While 84% of hackers identify hacking
and security research or information
02 Information and web application
and web application security as their
security
primary occupations, a diverse range of
03 Architecture and engineering professionals moonlight as hackers.
and technicians
maybe even your barista!
ITMOAH 2024
8
HACKER DEMOGRAPHICS
A DAY IN THE LIFE OF A HACKER
HACKING MOTIVATIONS
or at a
coffee shop
More than a third of .
tech mee p tu
hackers have turned
HARDWARE HACKING
Teach Me How to Hack
HACKERS AND AI
reflects the rapidly evolving nature of
Graduated from college 56%
cybersecurity, where the latest techniques
and vulnerabilities are often shared online Completed graduate school 17%
long before they make it into formal curricula.
But the learning doesn't stop at online tutorials. A How Hackers Learn Skills
remarkable 78% of hackers proudly wear the badge
of being self-taught, showcasing a DIY spirit that's Online resources 87%
deeply ingrained in hacker culture. This self-starter Friends or mentors 35%
mentality is complemented by peer-to-peer learning,
with 35% of hackers citing friends or mentors as key Self-study 78%
to their educational journeys. Academic or professional coursework 29%
But don’t discount formal education. Almost a third Trial and error 43%
of hackers learned how to hack in school. In general,
hackers are a well-educated group. Almost three-
quarters boast college degrees or higher, reflecting 69% of hackers
a level of academic achievement rivaling many
traditional professional fields. It's a strong reminder stay up to date on
that today's hackers aren't just self-taught techies the latest breaches
but often highly educated individuals who blend
their academic foundations with practical self-
directed learning. Going beyond being a technical
skill set, hacking is a field that benefits from diverse
knowledge, from both higher education and a
ITMOAH 2024
9
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
HACKING MOTIVATIONS
At Bugcrowd, we talk a lot about the societal misconception
that hackers and security professionals are two separate
groups when in reality, they are one and the same. Full-time
security professionals often hack on the side.
HARDWARE HACKING
There is no better example of this than Ads Dawson, who has been both a Bugcrowd
customer and a hacker on the Bugcrowd Platform. Ads has achieved some amazing
accomplishments in his career, including most recently contributing to the Bugcrowd VRT
update on AI application vulnerabilities. Read on to learn more about Ads!
HACKERS AND AI
Ads started in the security space with an apprenticeship at an MSP. He did not have
an educational background in computer science. Nevertheless, from there, he pro-
gressed along the path toward networking and security, network pen testing, appli-
cation security, and eventually LLM applications and AI security. Ultimately, he has
a passion for dissecting concepts down to the essence, which is extremely relevant
in hacking and the security space. “I figured that if I already know how to build, man-
age, and deploy hybrid cloud networks, why not learn how to break them?” Ads says.
Ads has been hacking for about six years, and he’s loving it so far. He’s a self-described
“meticulous dude” who cites a dedication to curiosity in every aspect of his life to be
a main driver of his hacking success. “I have always challenged and motivated myself
to fully comprehend a solution or function at a very detailed level,” Ads shares.
VIEW PROFILE
10
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
HACKING MOTIVATIONS
learning (ML) adversarial capabilities.
“It is really effective to spend time on enhancing your offensive arsenal for investing
HARDWARE HACKING
in the long run,” Ads says.
For teams hoping to get more out of their bug bounty programs, Ads
shared valuable insights from the hacker perspective. It starts with fos-
HACKERS AND AI
tering better relationships with the hacking community.
“Challenge the hacker and always motivate them to dig deeper! If you are denying a
submission, it’s important to elaborate why and always be open to the possibility of a
decision change. Another thing that goes a long way is spending some time on a ca-
dence to update your program with new features or even notifications about behavior
changes,” Ads says.
He also recommends that teams put themselves in a hacker’s shoes. Ask yourself if
your scope is clear and concise while providing a clear and valid reporting chain with
achievable acceptance criteria. By reviewing your program details from a different lens,
you can catch areas where you’re potentially pigeonholing your program.
To wrap up, we asked Ads what he wished security leaders understood about hack-
ers. “Hackers spend a lot of time out of their personal lives working within reasonable
disclosures and constraints to secure compa-
nies’ attack surfaces. Come to the table with a
cooperative spirit and a willingness to achieve “Embrace
mutually fair reasoning,” Ads says. “Embrace
the fact that every hacker has unique in- the fact that
sights, perspectives, and capabilities to of-
fer. Having a dedicated and motivated hacker every hacker has
finding holes in your ecosystem is incredibly
valuable, especially compared to traditional unique insights,
methods of security testing in resource-con-
perspectives,
ITMOAH 2024
strained environments.”
and capabilities
to offer.”
11
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
Ads has been on both sides of a bug bounty program. Therefore, his per-
HACKING MOTIVATIONS
spective is valuable for hackers looking to improve their skills and earn
greater recognition. When it comes to advice for hackers who are engag-
ing with security teams, Ads suggests a well-rounded approach.
“Consider every angle, leave no stone unturned, and always parse information thor-
oughly. It’s always incredibly easy to skim information, especially when you’re running
on fumes. Prioritize yourself when you’re feeling burnt out—taking a walk or going to
the gym does magic for your productivity. Lastly, don’t become hard-set on your fa-
vorite toolset or setup—always take the opportunity to step outside of your comfort
HARDWARE HACKING
zone,” Ads advises.
HACKERS AND AI
writeups) as a great
the loop and regularly allows him to challenge himself.
way to show off
their experience.
12
HACKER DEMOGRAPHICS
The Heart of Hacking
The rush of outsmarting cybercriminals? Exhilarating.
Hackers are driven by a mix
The satisfaction that comes with strengthening
HACKING MOTIVATIONS
of personal and altruistic digital defenses? Unmatched. And the real magic
motivations that go far beyond happens when individual triumphs become collective
victories. In this world, every bug squashed and
the stereotype of the lone coder every vulnerability patched is a win for the entire
seeking a payday. Earning money community.
is certainly a benefit, but hackers So while the challenging puzzles and cutting-edge
tech are cool, the best part about being a hacker
love making a difference in the
HARDWARE HACKING
is the opportunity to make the digital world a safer
digital world, protecting both place while getting to do so alongside an awesome
community. It's a reminder that in the world of
individuals and organizations
cybersecurity, the whole is greater than the sum of
from threats. its parts—and that's what makes hacking so cool.
HACKERS AND AI
More Than Just a Paycheck While hackers still consider
making money important, they are
Why do you hack?
increasingly being driven by other factors.
3% 28%
For my personal development
For reasons I'd
rather not share
4% 18%
For something to do For financial gain
8%
For my livelihood
15%
For the excitement
11% 14%
For the greater good
For the challenge
ITMOAH 2024
What stands out is the mix of motivations—today's hackers Hacking isn't just
aren't one-dimensional. They're professionals who want to about the money
earn a living, sure, but they're also passionate about learning,
al and
solving problems, and making the internet safer. It's about person
llment.
professional fulfi
13
HACKER DEMOGRAPHICS
THE HEART OF HACKING
HACKING MOTIVATIONS
The hacker community is full of untapped potential
Not enough scope 26%
waiting to be unleashed. While hackers are eager to
dive deeper into their work, they are held back by
Not enough programs that match my interest 25%
narrow scopes, mismatched interests, and a lack of
required technology.
Not having the physical technology needed 20%
Limited access to private programs stands out
Unresponsive program owners or brands 19% as the top frustration among hackers, with
almost half citing a desire for more
HARDWARE HACKING
Inadequate incentives 11% opportunities. While hackers
can continue to build their
reputations,
No safe harbor 6%
companies have
the chance to
None of the above 15% expand their
programs or
Other 13% explore new
approaches.
HACKERS AND AI
Level up!
The message is
91% of hackers say they clear: Give hackers
are now armed with more the room to roam, the tools
Have you avoided disclosing a vulnerability The legal aspect of vulnerability disclosure
because a company lacked a clear pathway represents another challenge for hackers. More
for you to report it without risking legal than half of hackers have held back on reporting
consequences? disclosures due to unclear reporting pathways.
Without a safe harbor, hackers tread a fine line
between well-intentioned probes and unauthorized
52% 48% access, turning their exploration into legal trouble.
Yes No
There’s certainly a path
forward. Organizations can 73% of hackers
potentially double their observed more
influx of valuable security vulnerabilities
information if they can than last year.
implement clear, hacker- It's dangerous
ITMOAH 2024
14
HACKER DEMOGRAPHICS
THE HEART OF HACKING
HACKING MOTIVATIONS
89% of hackers
believe companies
appreciate hackers
more than ever
before.
HARDWARE HACKING
breach risks for
companies. Hackers:
The unsung heroes of
corporate security!
1 2 3 4
Hacking Together
HACKERS AND AI
How Important Are These?
Building long-term
relationships
47% 35%
Getting constructive
feedback
57% 32%
Educating others on
security best practices
54% 31%
Hackers are
Hacking is evolving beyond solo missions. Today's The spirit of mentorship is strong too. team players!
hackers are active community members working Instead of gatekeeping, hackers are
inviting others in, with 81% involved
82% are in it for the
toward the common good. A significant 82% are long haul, building
in guiding and working with peers.
committed to building lasting relationships with solid relationships
This commitment to growth extends to
companies and bug bounty program owners, their own skills, as 89% actively seek
with program owners.
creating a sustained defense. constructive feedback.
15
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
Meet Specters
From Experiencing Homelessness
HACKING MOTIVATIONS
to Being a Hardware Hacking Specialist
HARDWARE HACKING
Born in Chicago, Specters stumbled upon hacking during a tumultuous time in his life—
when he found himself homeless and searching for a way out.
HACKERS AND AI
hacking would be good to learn because it seemed like ‘computer people’ made
some money,” Specters says.
He was first inspired by old-school phreaks like “My first bug bounty
Mark Abene. He got started in car hacking and
was used to pay for
malware analysis.
my first apartment
and quite literally
As he journeyed into the hacking world, Specters saved me from
had to learn that not all bugs have an impact.
He would remind himself of the importance of homelessness.”
stepping back when he didn’t get the result he
wanted.
VIEW PROFILE
16
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
Specters started with car hacking, but he also loved malware analysis.
HACKING MOTIVATIONS
Now, he is passionate about everything related to hardware hacking.
For hackers looking to get into hardware hacking, Specters recommends starting
with different Arduino kits. These will help aspiring hackers learn many aspects of
hardware hacking. Specters personally bought an IoT clock Arduino kit that had
many different protocols and circuits that he had to set up, which he recommends
HARDWARE HACKING
as well. He advises aspiring hackers to analyze hardware using different tools and
to seek out resources from the security community to get started.
Paying It Forward
“Identity has always been
HACKERS AND AI
Specters is extremely passionate
about paying his success for- a difficult issue for me.
ward and expanding diversity in I am talking to so many
the hacking community. “I think
something that bothers me is the
different communities now
lack of Hispanic representation in and so many people who
hacking,” Specters says.
had similar experiences,
and just making friends
Specters does presentations for Latinx has really helped me, so I
groups, introducing them to comput-
ers and hacking. He also mentors peo- want to pay that forward.”
ple who are seeking guidance, providing
them with instruction and materials to get
them started.
17
HACKER DEMOGRAPHICS
HACKER HALL OF FAME
HACKING MOTIVATIONS
We asked 1300 hackers Here are some of the most popular responses.
who inspired them most These hackers inspired a generation, and they
as security professionals. all happen to be part of the Bugcrowd Crowd!
HARDWARE HACKING
OrwaGodfather
#1 top Bugcrowd hacker
HACKERS AND AI
Top 3 P1 hacker on Bugcrowd
BusesCanFly Nagli
Self-taught hardware hacker Earned over $1 million
in bug bounties
100% accuracy on Bugcrowd
Winner of Indeed’s
8x Bug Bash competitor 2022 Bug Bash
InsiderPhD
Has 80k subscribers
on Youtube
Jhaddix Iceman
ITMOAH 2024
18
HACKER DEMOGRAPHICS
HACKING MOTIVATIONS
Codingo
Previous top 10 hacker
on Bugcrowd
Co-founder of Subfinder
HARDWARE HACKING
Farah Hawa TodayIsNew
Cybersecurity content Almost a decade hacking
creator and influencer
1st place in total points from Bugcrowd
Bug triage professional Bug Bounty Engagements
HACKERS AND AI
Rachel Tobac
3x DEF CON 2nd place winner in
the Social Engineering Competition
Zwink
Bugcrowd all-time top 10 hacker
for P1/P2 vulnerabilities
rez0
One of Yahoo’s top 10
bug bounty program hackers
HACKING MOTIVATIONS
a dramatic
acceleration.
HARDWARE HACKING
HACKERS AND AI
the conditions are perfect for threat and these misconceptions are harmful
actors who target hardware, threatening because threat actors will exploit every
consumers, companies, and governments. hardware vulnerability they can find.
20
HACKER DEMOGRAPHICS
THE RISE OF HARDWARE HACKING
HACKING MOTIVATIONS
specialized equipment or that it's too complex for
than just in their software.
anyone but advanced technical experts to engage
It involves the unauthorized manipulation or in. These notions are becoming increasingly
modification of a device's hardware to bypass outdated, as tools are becoming more affordable
security measures, gain unauthorized access, or and resources more accessible. Consider, for
alter a device’s intended functionality. The goal of example, side-channel attacks. These are becoming
hardware hacking is often to circumvent protections, increasingly common, as measuring equipment has
steal data, or gain control of a device in ways its become more precise and affordable. With these
tools, hackers can now capture detailed operational
HARDWARE HACKING
designers didn’t intend. Software security, no matter
how sophisticated, is practically useless if attackers data from live systems. While some extremely
find ways to exploit the physical hardware. expensive tools can certainly make things
easier, they're rarely necessary. Like
A number of common techniques are used to break with all forms of hacking, creativity and
into hardware. In side-channel attacks, for example, problem-solving go a long way.
a threat actor observes a system and monitors
it to catch unintentional information leakage, like Fault injection attacks are also on the
rise, also in part because of the accessibility of
HACKERS AND AI
power consumption or electromagnetic emissions,
to recover cryptographic keys or other secret data. low-cost gadgets. An impressive example of this is
Firmware manipulation is a technique to change when security researcher Lennert Wouters hacked a
a device's core programming, opening doors to Starlink satellite dish using a custom-built modchip
unauthorized access. Fault injection is a common costing just $25. By physically attaching this device
hardware hacking technique that deliberately to a stripped-down dish, they launched a fault
introduces errors into a device's operations. By injection attack that temporarily shorted the system.
causing precise, temporary malfunctions through This anomaly allowed them to effectively bypass
means like voltage glitches or clock signal Starlink's security measures, granting access to
manipulation, threat previously locked areas of the system's software.
actors can bypass “It’s a myth
security measures, skip that hardware Not-So-Smart Devices
important instructions, hacking requires
or gain access. As our world becomes increasingly interconnected
expensive
and as more smart devices are connected to the
tools or is more
internet, security risks will multiply exponentially
difficult than web as a result. Devices connected to the internet are
development.” part of the large global network, and unfortunately,
this means they are exposed to potential dangers.
Today, the market is flooded with these "smart"
devices, from “smart” microwaves to “smart”
flip-flops, and many of these prioritize features
over security, creating numerous entry points for
cyberattacks. A smart device getting hacked can
have immediate real-world impact.
ITMOAH 2024
21
HACKER DEMOGRAPHICS
THE RISE OF HARDWARE HACKING
For instance, a vulnerability in a smart oven could Using AI, a threat actor can tap multiple webcams
allow a threat actor to remotely activate the and create reconnaissance targets and large,
appliance, creating a significant safety risk. This powerful intelligence networks. In the not-so-distant
scenario isn't hypothetical; a security flaw in LG's future, devices may be so interconnected that an
smart home app once made such a smart oven AI could hack all sorts of devices with just an
HACKING MOTIVATIONS
exploit possible. internet connection.
Hardware security flaws are found beyond kitchen AI could also pose a threat to physical
appliances, and the consequences of these security. It could analyze vast amounts
vulnerabilities in other smart devices can be even of data to create convincing fake identities,
more severe. The medical field is an industry where complete with realistic credentials and background
hardware hacks of smart devices can be extremely information. These might create digital IDs or RFID
dangerous. In 2017, the FDA confirmed serious badges, potentially granting access to restricted
security flaws in St. Jude Medical's cardiac devices. areas like server rooms or data centers. Once inside,
HARDWARE HACKING
It revealed that hackers could potentially manipulate an attacker could compromise systems or install
pacemakers and defibrillators through their remote backdoors, leading to data breaches, espionage, or
monitoring systems, not only compromising patient service disruptions.
data but potentially endangering lives. For such
industries, the stakes extend far beyond data
protection to matters of life and death.
HACKERS AND AI
The Power of AI
AI is changing the security industry,
and hardware is no exception. First,
it’s making tools more powerful. AI What Happens Next
significantly enhances the effectiveness Looking to the future of hardware
of side-channel attacks. security, we can expect several key
developments as AI continues to evolve.
For example, AI algorithms can perform complex AI-driven defense mechanisms will likely
analyses, discovering minute variations in power emerge, resulting in automated systems
consumption, electromagnetic emissions, or for detecting and responding to hardware
timing data from a device. Additionally, they can vulnerabilities. We'll see an increased
identify behavioral patterns that humans might focus on securing the intersection of
miss. Moreover, AI's ability to quickly process and hardware and software, recognizing that
adapt to complex patterns makes it particularly vulnerabilities often lie in their integration.
suited for tackling the intricate timing issues often
associated with fault injection techniques. AI can While the threat of hardware hacks
help determine the correct frequency, timing, and is significant, this is not a cause for
intensity of induced faults. panic but a call for action. The growing
community of hardware security experts,
AI can also extend the reach and speed at which a now more open to newcomers than ever,
hacker accesses systems—the ability to automate stands ready to protect the vast array of
and parallelize attacks enables simultaneous devices that our world depends upon.
breaches across multiple devices. For instance,
ITMOAH 2024
22
HACKER DEMOGRAPHICS
Hardware Hacking
Quantified
It’s hard to buy anything these days without
HACKING MOTIVATIONS
some form of an interconnected functionality.
Hardware hacking specialist Brandon Reynolds said it best: Whether we’re talking about cars or medical
“IoT has taken the world by storm and has become the true Wild devices, the idea of hardware vulnerabilities
being exploited is a scary prospect. Luckily,
West of our constantly evolving world. Unfortunately, not many
the Bugcrowd Platform partners with
understand what is happening underneath the shiny exterior of
hardware hacking specialists, some of whom
their new toy. It could be running around all day shouting your
HARDWARE HACKING
are spotlighted in this report, to help support
WIFI password, and you wouldn’t have a clue unless you knew organizations’ attempts to secure their
what to look for!” hardware and firmware.
gh t
au
HACKERS AND AI
-t Many hackers start
f
el
microcontrollers,
Ask a Hacker
of hardware breadboards, voltmeters,
hackers logic analyzers, and
packet sniffers. Is hardware hacking too
expensive to break into?
82%
motivat
-fin
money. In contrast,
ancial
to
s r
23
HACKER DEMOGRAPHICS
HARDWARE HAC KING QUANTIFIED
HACKING MOTIVATIONS
encountered a new believe there are
vulnerability they had more vulnerabilities What kind of hardware or firmware
never seen before in now than there were are most vulnerable to attacks?
the past 12 months. a year ago.
HARDWARE HACKING
to attacks. Other vulnerable hardware includes
unnecessarily complex devices and cheap
1 IoT devices
consumer hardware.”
2 Autonomous vehicles
Topy “Anything IoT/cloud/network-enabled
is most vulnerable to attack. The attack
3 Smartphones surface explodes when it’s network-connected.
HACKERS AND AI
Very often you’ll find that one device holds
4 Medical devices the keys to the kingdom and can attack all
other devices through some kind of cloud
5 Industrial control systems infrastructure.”
’ t repor t a vu
Ask a Hacker n l
ne
did
rab
67%
ility
24
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
HACKING MOTIVATIONS
Brandon Reynolds is a hardware expert and IoT specialist.
He’s been a key participant in multiple Bugcrowd Bug Bashes,
and his supportive nature, friendly attitude, and excellent work
ethic leave a lasting impression on everyone he meets.
HARDWARE HACKING
Read on to learn more about how Brandon balances hacking,
a security career, and a family in this hacker spotlight!
HACKERS AND AI
a lot of time to dedicate to programming and security.
When he was roughly 14 years old, Brandon wanted to understand how his game
consoles and other electronics worked at their most basic levels. Learning to dis-
assemble video games, PC applications, and other software or firmware led him
to software development, and eventually, to a full-time focus on cybersecurity.
25
HACKER DEMOGRAPHICS
HACKER SPOTLIGHT
Brandon started hacking in 2020, roughly when the COVID-19 pandemic started.
He hacks part-time, mostly late in the evening. He also works as a principal secu-
rity architect and a CSO.
HACKING MOTIVATIONS
“In general, finding security bugs was
always a big puzzle to me. If it’s built
by humans, there’s always mistakes.”
HARDWARE HACKING
take on these technologies, you also have to have a solid understanding of various
other areas (mobile, cloud, etc.), which Brandon has.
HACKERS AND AI
In the hardware world, there are so many tools that are not only necessities but
also derivatives of one another (like serial/UART adapters). His favorite tool is his
Saleae Logic Analyzer.
Hacking Impact
In the three years that Brandon has been hacking, he’s already earned life-chang-
ing rewards. The bug bounties he has received paid for nearly his entire wedding
and a new car (all from a single program)! “I’ll always be thankful for the rewards
I’ve received for helping companies secure their products,” Brandon says.
When asked why he hunts with Bugcrowd, Brandon says, “I’ve gotten to know so
many people (both hackers and Bugcrowd employees). They’ve all treated me
with respect.”
VIEW PROFILE
26
HACKER DEMOGRAPHICS
12 MONTHS OF
AI INNOVATION
We asked hackers these five questions about their generative
HACKING MOTIVATIONS
AI usage and beliefs in early 2023, and we asked them
the same questions a year later. Check out how their
responses changed in only 12 months!
2023 2024
HARDWARE HACKING
Whoa!
In just a year,
Hackers who believe AI dramatically
proved its value
AI technologies
increase the value 21% 71% to hackers.
of hacking
HACKERS AND AI
More hackers are
Hackers using adopting generative
generative AI 64% 77% AI technologies
in their security
for hacking
research workflows!
27
HACKER DEMOGRAPHICS
The Three T’s
of AI Hacking
HACKING MOTIVATIONS
A lot happened in AI last year. The release of
GPT-4, Claude 3, and numerous open-source
models, as well as the introduction of vision and
voice models, have electrified, and concerned, the
security industry. Some hackers are wondering,
“How can I use AI to become a better hacker?”
while others are concerned AI might fully replace
HARDWARE HACKING
them. Meanwhile, everyone agrees that companies
using AI have a new class of vulnerabilities to worry
about now. At Bugcrowd, we frame this as the
three Ts of AI: AI as a tool, a target, and a threat.
HACKERS AND AI
AI vulnerabilities systems most at risk, and
ways to mitigate the damage.
earlier this year.
AI as a tool
86% of hackers say
Both sides of the cybersecurity game will use AI to
AI has fundamentally
increase the scale and sophistication of their tactics. changed their
For example, threat actors can create convincing
approach to hacking,
spear phishing attacks at scale and defenders can for better or worse.
use AI models to detect intrusions within milliseconds.
Top five ways AI technologies make hacking more fun, Has AI fundamentally changed
profitable, or interesting (according to hackers) your approach to hacking?
51%
Automating repetitive tasks to free up time for more complex ones.
Yes,
Enhancing data analysis, allowing for deeper insights. positively
28
HACKER DEMOGRAPHICS
THE THREE T’S OF AI HACKING
HACKING MOTIVATIONS
are using it for basic tasks like running queries
on data and creating reports.
HARDWARE HACKING
The reasons revolve around creativity and
Analyzing data adaptability. Most hackers believe that AI cannot
62%
match human creativity, such as the ability to try
out crazy-sounding attack vectors and find they
actually work.
HACKERS AND AI
exploits. Additionally, hackers
Ask a Hacker
few minutes.
29
HACKER DEMOGRAPHICS
THE THREE T’S OF AI HACKING
HACKING MOTIVATIONS
their understanding of hacking methods.
HARDWARE HACKING
recognizing patterns and anomalies,
No
enabling quicker and more precise
identification of vulnerabilities.
74%
Additionally, AI's predictive capabilities
and customization options make
Yes
these tools more effective at handling
complex cybersecurity challenges.”
HACKERS AND AI
AI as a target Ask a Hacker
7%
No
Hackers overwhelmingly
believe AI is ripe for
93%
exploitation. Even using AI
ITMOAH 2024
Yes
on the backend creates new
flaws in the attack surface
of the product.
30
HACKER DEMOGRAPHICS
THE THREE T’S OF AI HACKING
HACKING MOTIVATIONS
No
Luckily, the
l
crowdsourcing mode
g wi ll
of security testin
53%
Yes always stay on top of
emerging threats.
Human ingenuity
wins again!
HARDWARE HACKING
As expected, hackers don’t have much How many organizations are adequately
confidence in companies securing their prepared to tackle AI security?
AI systems. It’s also not surprising to see that
CISOs are more confident in their security Hackers CISOs
abilities. What is surprising, though, is the sheer
HACKERS AND AI
Less than 10%
difference in confidence levels. More than 41% 17%
two times as many hackers think that the vast
majority of companies will be blindsided by AI 10–25%
33% 31%
security issues.
26–50%
The devil is in the Hackers and 20% 34%
details, and hackers CISOs both
agree that most 51–75%
see AI exploits every 5% 15%
day, which explains companies are
not prepared for 76–100%
this discrepancy.
AI, period. 1% 3%
82%
ITMOAH 2024
Yes No
Yes
73% 27%
31
HACKER DEMOGRAPHICS
THE THREE T’S OF AI HACKING
AI as a Threat
AI systems can cause harm to users. This harm
could range from realistic (saying biased things) Do the risks associated with
to speculative (future models could be used to AI outweigh its potential?
HACKING MOTIVATIONS
create weapons).
No
72%
To a point, but organizations must balance
AI’s power with human creativity to reduce risks 37%
HARDWARE HACKING
AI is fine for low-stakes tasks, but we
should tread carefully in critical applications 45%
Yes, but only with the safety net of human
oversight to ensure accountability 7% As you can see, AI
offers many benefits
Yes, as long as AI models are when hackers use it
transparent and regularly audited 6% as a tool.
HACKERS AND AI
However, hackers
No, there’s still too much uncertainty overwhelmingly believe that
and potential bias in AI systems 2% the risks associated with AI
outweigh the benefits.
Poisoning
Creating fake Manipulating Developing tools iting
data inputs Explo es
data and systems to carry and methods r s a n d bias
to influence erro isk
identities that are out nefarious for large-scale ffect r
predictive that a ns
hard to detect tasks attacks
models decisio
ITMOAH 2024
1 2 3 4 5
32
HACKER DEMOGRAPHICS
Conclusion
That’s a wrap on this year’s edition of Inside the Mind of a Hacker!
This year, we explored how quickly hacker attitudes regarding AI
(as a tool, a target, and a threat) are changing. We also explored the
HACKING MOTIVATIONS
unexpected path into the world of hardware hacking.
Here are three major takeaways from the research:
HARDWARE HACKING
Hacking is a
viable income
source. AI is the
Hardware new normal.
The majority (90%) of hackers hacking
are Gen-Z or millennials.
Younger generations are
is on the rise. AI is making hackers faster and
more accurate and is overall
HACKERS AND AI
flocking to hacking and making hacking more fun. It’s
Hardware is everywhere, and
reaping the benefits. 61% cited also making hacking more
even more is being created to
that hacking helped them accessible. 77% of hackers use
support the infrastructure needs
find a job. 59% are hacking AI to hack and 86% say it has
of AI. Hardware vulnerabilities
fewer than 14 hours per week, fundamentally changed their
are on the rise, and they have
making hacking the flexible approach to hacking. But AI isn’t
major implications. 81% of
income source that is so just a tool—it’s a target. AI is a
hardware hackers encountered a
desirable right now, especially new attack vector that 82% of
vulnerability type they had never
considering it can be done at hackers believe is evolving too
seen before in the past 12 months.
home (or anywhere else in the rapidly to adequately secure.
Hackers are up for the challenge,
world, for that matter).
partially due to the increased
accessibility of hardware hacking
tools and educational materials.
For as long as humans write code and Your security team will be unstoppable.
deploy the systems that power the But you know who won’t be unstoppable?
internet—and for as long as humans The threat actors waiting at your
have reason to maliciously attack these perimeters. Let’s keep them out, shall we?
33
HACKER DEMOGRAPHICS
Content Gallery
Chow down on more hearty stories from Bugcrowd below
HACKING MOTIVATIONS
REPORT GUIDE
HARDWARE HACKING
Gain a Better Understanding The Basics of AI Security
of the Evolving, Nuanced + Ways to Prevent Attacks
Role of the CISO Against AI Systems
HACKERS AND AI
DATA SHEET DATA SHEET
Engineered Discover
Hacker Trust CrowdMatch
34
HACKER DEMOGRAPHICS
Glossary
This year’s edition of Inside the Mind of a Hacker has 9,594 words!
That’s a lot of foundational security terms, emerging AI lingo, hidden pop
culture references so our Gen-Z social media manager thinks we’re still
HACKING MOTIVATIONS
relevant, and even the occasional buzzword (we’re only human).
ck out the
We’ve defined a few here, but che I, Robot: A 2004 science Safe Harbor: A provision
nsive list of
Bugcrowd Glossary for an exte fiction action movie where from an organization that
s.
definitions and additional resource highly intelligent robots fill hackers engaged in good
public service positions faith security research
Data Poisoning: A form throughout the world. and ethical disclosure are
AI Bias: Systematic
authorized to conduct
HARDWARE HACKING
of adversarial attack Internet of Things
errors in the output of
involving the intentional such activity and will not
an AI system resulting (IoT): Any device
manipulation of training be subject to legal action
from underlying biases (often called a smart
data in machine from that organization.
in the training data or or connected device)
learning systems to that connects to and Scope: Outlines the
algorithm design.
produce incorrect or exchanges information rules of engagement
AI Red Teaming: A biased outcomes. over the internet. for a bounty program.
technique used to test
Disclosure: The practice This includes a clearly
the security of machine Large Language Model
of reporting security defined testing parameter
learning models. It (LLM): An AI algorithm
HACKERS AND AI
flaws in computer to inform researchers
involves simulating that uses deep learning
software or hardware. what they can and
attacks on the model to to understand language
cannot test, as well as
identify vulnerabilities Fault Injection: A from vast datasets.
the payout range for
and weaknesses. technique used to LLMs can summarize,
accepted vulnerabilities.
evaluate a system's translate, predict, and
Autonomous Vehicles:
dependability by generate human-like text, Side Hustle: A secondary
A vehicle capable of
intentionally introducing making them powerful job or project pursued
sensing its environment
faults to observe tools for natural language outside of one's primary
and operating without
how it reacts. processing tasks, such employment, often for
human involvement.
as machine translation, additional income or
Firmware: A form of
Brat Summer: A social question answering, and personal fulfillment.
microcode or program
media trend during creating contextually
embedded into hardware The Crowd: The global
the summer of 2024, relevant content.
devices to help them community of white hat
originated from the
operate effectively. OWASP: The Open Web hackers on the Bugcrowd
themes of Charli
Application Security platform who compete
XCX's album, Brat. Generative AI: Generative
Project (OWASP) is a to find vulnerabilities in
AI is a type of artificial
Bug Bash: In-person, non-profit organization bug bounty programs.
intelligence technology
1-2 day events that that works to improve
that can produce various Vulnerability Rating
bring hackers and the security of web
types of content, including Taxonomy (VRT):
customers together in applications.
text, imagery, audio and The official standard
a high-intensity, highly
synthetic data in response Phreak: A subculture of used by Bugcrowd for
collaborative, bug
to prompts. Generative hacking that started in assessing, prioritizing, and
bounty-style program
AI models learn the the 1970s. These hackers benchmarking the severity
managed by Bugcrowd.
patterns and structures focused on manipulating of security vulnerabilities.
CTF Events: A Bugcrowd of their input training and exploiting
Capture the Flag (CTF) data, and then generate telephone networks.
event is a collaborative new data that have Prompt Injection: The
hacking challenge where similar characteristics. malicious act of inserting
ITMOAH 2024
35
I N S I D E T H E M I N D O F A H AC K E R 2 024