• Resources
  • Blogs
  • Hackers vs Crackers: Key Differences and Why they are Both Extremely Dangerous

Hackers vs Crackers: Key Differences and Why they are Both Extremely Dangerous

Alex McConnell
Alex McConnell
07/09/18
4 Minute read
Hackers vs Crackers: Key Differences and Why they are Both Extremely Dangerous

Article Contents

    Poor password hygiene aside, the amount of compromised user credentials that are being sold, traded and shared in online forums, file repositories and the Dark Web is astounding. Of course, regular password rotation, combined with not using the same password across multiple websites and web applications will help, but only a minority of internet users adhere to such practices. For the rest, their accounts are at risk and if you’re an online business, you are responsible. Hackers and crackers are waiting for your mistake.

    Hackers vs crackers definition

    Hackers and crackers each pose their own unique threats to businesses and site owners but there are key differences between the two.

    Hackers

    Hackers are able to identify the threats within a system or site organically, generally using their own skills and tools. Some hackers work ethically and use these skills to identify weaknesses and improve them, though unethical hacking is still a prominent concern for businesses.

    Crackers

    Crackers are generally malicious individuals using skills, tools and intelligent software to gain access to systems illegally. Data recovered through these means is often used for exploitative purposes.

    Hackers vs crackers – the difference

    Wikipedia defines the term hacker as “any skilled computer expert that uses their technical knowledge to overcome a problem”.

    Hackers vs crackers – professional hackers with advanced knowledge and skills look down on crackers, thinking of them as less educated versions of themselves. Hackers are very proud of the bespoke hacking tools and utilities they create for their specific attacks and refer to crackers as script kiddies or newbies because they do not create their own attack tools.

    Hackers constantly seek out new vulnerabilities to exploit to achieve whatever malicious activity they are performing, versus crackers continue to exploit the same known vulnerability to access user accounts. The vulnerability is known as the Insufficient Anti-Automation Vulnerability, it presents itself when a web application allows the cracker to automate a process that was originally designated only for manual users.

    Automated ATO tools used by hackers and crackers

    A common method used to gain access to an account is a credential stuffing attack. Easy to use tools like Sentry MBO, OpenBullet or STORM stuff a large number of compromised usernames and password combinations aiming to establish a legitimate match in order to successfully take over an account.

    Credential stuffing/cracking tools are extremely effective against standard security devices such as Web Application Firewalls (WAFs), but, arguably more concerning is how easy they are to operate. Even low-tech criminals can profit from automated attacks with little more than a few mouse clicks. This means anyone with intent could take over your customers’ accounts with little to no knowledge of traditional hacking techniques.

    Former Facebook CSO Alex Stamos, believes password reuse is the single biggest cybersecurity risk to customers and organizations. He thinks crackers can’t go wrong with a credential stuffing tool as they are free, simple to use, efficient, and extremely effective.

    Furthermore, tools such as Sentry MBA, OpenBullet and STORM even have inbuilt capabilities to bypass login form security controls such as IP rate limits and CAPTCHA checks, making it even easier for crackers to take over accounts. There are even services to bypass stronger forms of CAPTCHA at a low price, some using humans to physically pass the check.

    Find out how crackers use tools like OpenBullet to launch credential stuffing attacks in a video demonstration with Netacea’s threat research team.

    Proactive protection from credential stuffing & ATO attacks

    Unfortunately, many organizations can’t distinguish between an automated attack and regular user login activities, some also do not fully appreciate how widespread the problem space is. The Open Web Application Security Project (OWASP) see credential stuffing as one of the most common cyber-attacks and is capable of compromising websites that do not have the traditional security vulnerabilities. Therefore, this puts all at risk; the account owner consumers and the organizations.

    While the development of these automated cracking tools cannot be stopped, you can protect your customer accounts and web login forms to reduce the likelihood of ATO from happening to your organisation.

    Password rotation and multi-factor authentication

    Enforcing a password rotation policy is an effective way to improve security and ensure previously compromised credentials cannot be re-used. Likewise, Two-Factor Authentication (2FA) is an effective defence against attacks. However, such controls are typically only used in personal banking or corporate environments as there are high deployment costs and usability impacts which make them unsuitable for online shopping and gambling customers.

    Login history tracking and limiting login attempts

    Allowing your applications to store the history of a given user’s addresses, locations, devices, cookies and browsers can help identify compromised accounts. These data-driven insights can also trigger challenges of login requests where the attempt does not match the user’s known data profile.

    You can also limit the number of failed login attempts, although even trustworthy customers may need more attempts if they have forgotten a password. Limiting login attempts will not help protect against credential stuffing where the hacker cycles through one email address with one password.

    IP and user agent black listing

    Many businesses can blacklist IP Addresses and User Agents if malicious behaviour is identified. Unfortunately, crackers have become savvy to this tactic and now rotate IP ranges constantly, even using residential IP proxies to appear as trusted users.

    Rate limiting

    Monitoring network traffic for spikes in requests from a single IP Address or IP Range can be used to identify simple credential cracking behaviour. However, sometimes these ATO attacks can take the form of a ‘low and slow attack’, with login attempts spanning several days or even weeks, making rate limiting difficult.

    Dedicated bot identification & ATO prevention against hackers and crackers

    Over 50% of all website traffic is made up of automated traffic. Standard security solutions and practices are no longer robust enough to protect against sophisticated malicious bots and cracking tools.

    Dedicated bot management solutions leverage the power of shared intelligence, specialist data scientists, customised rules and machine learning to stay one step ahead. Deploying these solutions will help your business identify and tackle ATO and, protect you against many of the other issues caused by a much wider range of non-human traffic.

    Introducing Netacea – the world’s most advanced bot protection & Account takeover prevention solution

    Radically different from traditional ‘black box’ solutions, Netacea is an agile and intelligent new layer of security that adapts to evolving threats. No matter whether you’re attacked by hackers, crackers or the other way round, your websites, apps and API’s will remain secure in real-time.

    The Netacea layer of protection should be your first line of defence. It complements existing controls, such as WAF rulesets, rate limiting and threat databases to enhance edge security.

    It provides deep, actionable analysis of all internet traffic, web reconnaissance, automated bots and legitimate website visitors and manages those journeys accordingly in real time.

    Learn more about our bot protection software here and discover how we stop account takeover attacks with a demo from our experts.

    Block Bots Effortlessly with Netacea

    Book a demo and see how Netacea autonomously prevents sophisticated automated attacks.
    Book

    Related Blogs

    Cryptocurrency fraud
    Blog
    Alex McConnell
    |
    18/07/24

    Follow the Crypto Part 2: Tools and Techniques for Investigating Cryptocurrency Transactions

    Discover the practical aspects of cryptocurrency investigations. Explore the techniques and tools used to uncover fraudulent transactions in the crypto world.
    cost of bots blog banner image
    Blog
    Alex McConnell
    |
    11/07/24

    The Financial Burden of Bots on Streaming Services

    Stay one step ahead of automated attacks targeting your streaming service. Learn how to build your business case for advanced bot protection.
    Bitcoin
    Blog
    Alex McConnell
    |
    04/07/24

    Follow the Crypto Part 1: Why Fraud Teams Should Investigate Crypto Transactions

    Discover the importance of cryptocurrency investigations in 2024. Learn why fraud teams need cryptocurrency investigation capabilities.

    Block Bots Effortlessly with Netacea

    Demo Netacea and see how our bot protection software autonomously prevents the most sophisticated and dynamic automated attacks across websites, apps and APIs.
    • Agentless, self managing spots up to 33x more threats
    • Automated, trusted defensive AI. Real-time detection and response
    • Invisible to attackers. Operates at the edge, deters persistent threats

    Book a Demo

    Address(Required)