{"id":57360,"date":"2024-10-11T14:40:06","date_gmt":"2024-10-11T14:40:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36461\/Meet-The-Team-Paid-To-Break-Into-Top-Secret-Bases.html"},"modified":"2024-10-11T14:40:06","modified_gmt":"2024-10-11T14:40:06","slug":"meet-the-team-paid-to-break-into-top-secret-bases","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/","title":{"rendered":"Meet The Team Paid To Break Into Top Secret Bases"},"content":{"rendered":"<figure readability=\"2\">\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 ejjhCR\">\n<div data-testid=\"hero-image\" class=\"sc-a34861b-1 jxzoZC\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a34861b-0 cOpVbP hide-when-no-script\"><img decoding=\"async\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/d53d\/live\/402e2a00-7be1-11ef-a067-535ff32592e2.jpg.webp\" loading=\"eager\" alt=\"Getty Images Perimeter sign at Dover Air Force Base\" class=\"sc-a34861b-0 efFcac\"><span class=\"sc-a34861b-2 fxQYxK\">Getty Images<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Red Teams try to break into high security facilities<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\" readability=\"24\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">A crack team assembles and breaks into a top secret military base or corporate headquarters &#8211; you&#8217;ve probably seen it in a film or on TV a dozen times. <!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">But such teams exist in the real world and can be hired to test the tightest security. <!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Plenty of firms offer to test computer systems by attempting to remotely hack into them. That&#8217;s called White Hat Hacking.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">But the skills involved in breaching physical security, known as Red Teaming, are rare.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Companies that offer the Red Team service have to assemble staff with very particular skills. <!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Often using former military and intelligence personnel, Red Teams are asked one question.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cHow can you break into this top-secret project?\u201d<!-- --><\/p>\n<\/div>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\" readability=\"46\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Leonardo, the giant defence company, offers such a service. <!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">It says hostile states seeking disruption and chaos are a real threat and sells its Red Team capability to government, critical infrastructure, and defence sector clients.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Its Red Team agreed to speak to the BBC under pseudonyms.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Greg, the team leader, served in the engineering and intelligence arms of the British Army, studying the digital capabilities of potential enemies.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cI spent a decade learning how to exploit enemy communications,\u201d he says of his background.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Now he co-ordinates the five-strong team.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The attack is about gaining access. The objective might be to stop a process from working, such as the core of a nuclear power plant.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The first step for Greg and his team is called passive reconnaissance.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Using an anonymous device, perhaps a smartphone only identifiable by its sim card, the team build a picture of the target.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cWe must avoid raising suspicions, so the target doesn\u2019t know we\u2019re looking at them,\u201d Greg says.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Any technology they employ is not linked to a business by its internet address and is bought with cash.<!-- --><\/p>\n<\/div>\n<figure readability=\"2\">\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 jFCfG\">\n<div data-testid=\"image\" class=\"sc-a34861b-1 jxzoZC\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a34861b-0 cOpVbP hide-when-no-script\"><img decoding=\"async\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/3aae\/live\/53242660-7be5-11ef-b02d-c5f3b724a1ea.jpg.webp\" loading=\"lazy\" alt=\"Getty Images The back of a security gaurd\" class=\"sc-a34861b-0 efFcac\"><span class=\"sc-a34861b-2 fxQYxK\">Getty Images<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Red Teams will look for demotivated security gaurds<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\" readability=\"23\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Charlie spent 12 years in military intelligence, his techniques include studying commercial satellite imagery of a site, and scanning job ads to work out what type of people work there.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cWe start from the edges of the target, staying away. Then we start to move into the target area, even looking at how people who work there dress.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">This is known as hostile reconnaissance. They are getting close to the site, but keeping their exposure low, wearing different clothes every time they show up, and swapping out team members, so security people don\u2019t spot the same person walking past the gates.<!-- --><\/p>\n<\/div>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\" readability=\"38\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Technology is devised by people and the human factor is the weakest point in any security set-up. This is where Emma, who served in the RAF, comes in.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">With a background in psychology Emma happily calls herself \u201ca bit of a nosy people watcher\u201d.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cPeople take shortcuts past security protocols. So, we look for disgruntled people at the site.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">She listens in to conversations at adjacent cafes and pubs to hear where dissatisfaction with an employer surfaces.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cEvery organisation has its quirks. We see what the likelihood of people falling for a suspicious email due to workload and fatigue is.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">An unhappy security guard may get lazy at work. \u201cWe\u2019re looking at access, slipping in with a delivery for instance.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">A high turnover rate evidenced by frequently advertised vacancies also flags up dissatisfaction and a lack of engagement with security responsibilities. Tailgating, spotting people who are likely to hold an access door open for a follower, is another technique.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Using that intelligence, plus a little subterfuge, security passes can be copied, and the Red Team can enter the premises posing as an employee.<!-- --><\/p>\n<\/div>\n<figure readability=\"2\">\n<div data-component=\"image-block\" class=\"sc-18fde0d6-0 jFCfG\">\n<div data-testid=\"image\" class=\"sc-a34861b-1 jxzoZC\"><img decoding=\"async\" src=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" class=\"sc-a34861b-0 cOpVbP hide-when-no-script\"><img decoding=\"async\" sizes=\"(min-width: 1280px) 50vw, (min-width: 1008px) 66vw, 96vw\" srcset=\"https:\/\/ichef.bbci.co.uk\/news\/240\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 240w, https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 320w, https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 480w, https:\/\/ichef.bbci.co.uk\/news\/640\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 640w, https:\/\/ichef.bbci.co.uk\/news\/800\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 800w, https:\/\/ichef.bbci.co.uk\/news\/1024\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 1024w, https:\/\/ichef.bbci.co.uk\/news\/1536\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp 1536w\" src=\"https:\/\/ichef.bbci.co.uk\/news\/480\/cpsprodpb\/434c\/live\/fc92a6a0-871f-11ef-a6b7-b52734d846cc.jpg.webp\" loading=\"lazy\" alt=\"Katsuhiko TOKUNAGA Eurofighter Typhoon aircraft under construction\" class=\"sc-a34861b-0 efFcac\"><span class=\"sc-a34861b-2 fxQYxK\">Katsuhiko TOKUNAGA<\/span><\/div>\n<\/div>\n<p><figcaption class=\"sc-8353772e-0 cvNhQw\">Leonardo is best known for its work on big defence projects like the Eurofighter<!-- --><\/figcaption><\/p>\n<\/figure>\n<div data-component=\"text-block\" class=\"sc-18fde0d6-0 dlWCEZ\" readability=\"52\">\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Once inside the site Dan knows how to open doors, filing cabinets and desk drawers. He\u2019s armed with lock pick keys known as jigglers, with multiple contours that can spring a lock open.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">He\u2019s searching for passwords written down, or will use a plug-in smart USB adaptor to simulate a computer keyboard, breaking into a network.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">The final step in the so-called kill chain, is in the hands of Stanley.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">A cyber security expert, Stanley knows how to penetrate the most secure computer systems, working on the reconnaissance report from his colleagues.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cIn the movies it takes a hacker seconds to break into a system, but the reality is different.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">He prefers his own \u201cescalatory approach\u201d, working through a system via an administrator\u2019s access and searching for a \u201cconfluence\u201d, a collection of information shared in one place, such as a workplace intranet.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">He can roam through files and data using the administrator\u2019s access. One way a kill chain concludes is when Stanley sends an email impersonating the chief executive of the business via the internal, hence trusted, network.<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">Even though they operate with the approval of the target customer they are breaking into a site as complete strangers. How does this feel?<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">\u201cIf you\u2019ve gained access to a server room that is quite nerve-wracking,\u201d says Dan, \u201cbut it gets easier the more times you do it.\u201d<!-- --><\/p>\n<p class=\"sc-eb7bd5f6-0 fYAfXe\">There is someone at the target site who knows what\u2019s going on. \u201cWe stay in touch with them, so they can issue an instruction \u2018don\u2019t shoot these people,\u2019\u201d Charlie adds.<!-- --><\/p>\n<\/div>\n<div data-component=\"links-block\" class=\"sc-18fde0d6-0 jVHuOl\">\n<div class=\"sc-93223220-0 sc-46222299-0 ctbOlq hmFIuq\"><span data-testid=\"links-title\" class=\"sc-46222299-2 gdGcRT\">More Technology of Business<\/span><\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36461\/Meet-The-Team-Paid-To-Break-Into-Top-Secret-Bases.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57361,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9133],"class_list":["post-57360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusacyberwarmilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-11T14:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Meet The Team Paid To Break Into Top Secret Bases\",\"datePublished\":\"2024-10-11T14:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/meet-the-team-paid-to-break-into-top-secret-bases.png\",\"keywords\":[\"headline,hacker,government,usa,cyberwar,military\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/\",\"name\":\"Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/meet-the-team-paid-to-break-into-top-secret-bases.png\",\"datePublished\":\"2024-10-11T14:40:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/meet-the-team-paid-to-break-into-top-secret-bases.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/meet-the-team-paid-to-break-into-top-secret-bases.png\",\"width\":160,\"height\":90},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/meet-the-team-paid-to-break-into-top-secret-bases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,cyberwar,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusacyberwarmilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Meet The Team Paid To Break Into Top Secret Bases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/","og_locale":"en_US","og_type":"article","og_title":"Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-11T14:40:06+00:00","og_image":[{"url":"https:\/\/www.bbc.com\/bbcx\/grey-placeholder.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Meet The Team Paid To Break Into Top Secret Bases","datePublished":"2024-10-11T14:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/"},"wordCount":904,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/meet-the-team-paid-to-break-into-top-secret-bases.png","keywords":["headline,hacker,government,usa,cyberwar,military"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/","url":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/","name":"Meet The Team Paid To Break Into Top Secret Bases 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/meet-the-team-paid-to-break-into-top-secret-bases.png","datePublished":"2024-10-11T14:40:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/meet-the-team-paid-to-break-into-top-secret-bases.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/meet-the-team-paid-to-break-into-top-secret-bases.png","width":160,"height":90},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/meet-the-team-paid-to-break-into-top-secret-bases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,cyberwar,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusacyberwarmilitary\/"},{"@type":"ListItem","position":3,"name":"Meet The Team Paid To Break Into Top Secret Bases"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57360"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57360\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57361"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}