Security Experts:

Connect with us

Hi, what are you looking for?



Competitive Advantage: Hacking Isn’t Just For The Bad Guys

Recently, my wife introduced me to my new favorite show, Drunk History. If you haven’t yet seen it – and you have a sense of humor – you should seek out this hilarity immediately.

Recently, my wife introduced me to my new favorite show, Drunk History. If you haven’t yet seen it – and you have a sense of humor – you should seek out this hilarity immediately.

In one of the better episodes, the inebriated guests and host taught me something no sober teacher ever did: Alexander Graham Bell likely stole the idea for the telephone from one of his main competitors by way of insider theft and data exfiltration at the patent office.

It seems that even before the computer or networks were invented, the enabling techniques we now most associate with cybercrime were alive and well.

Corporate Espionage HackingIn a successful business, a competitive advantage is something that makes you better than the competition. More desirable, affordable or maybe even trendier. It’s that new twist on an old product or a new product altogether – somehow at a cheaper price.

Whatever it may be, it gives you an edge and the other guys want it.

Nowadays, they’re quite often able to take it. And, due the pandemic immaturity of cyber defenses that exists across the business landscape, they can pull it off more easily and anonymously than ever before using the tools and tricks of the ubiquitous cybercriminal.

In fact, hacking the competition is more commonplace than publicly acknowledged or reported. From the NFL to Major League Baseball teams and companies in just about every industry sector, it’s happening a lot. As if the “traditional” cyber bad guys weren’t hard enough to defend against, right?

Just take a look at sampling of recent headlines:

Who Leaked The Astros’ Hacked Data, And Why?

Mercedes Sues Ferrari-Bound F-1 Engineer for Data Theft

New Hampshire Company Pleads Guilty to Hacking Into a Competitor’s Computer System for Commercial Advantage

Leaked Ashley Madison Emails Suggest Execs Hacked Competitors

Chinese man charged with hack of Boeing, Lockheed Martin aircraft data

And, as if Deflategate wasn’t bad enough, the NFL’s New England Patriots were accused of gaining a literal competitive advantage for themselves:

Steelers accuse Patriots of hacking into headsets in Week 1

The list above could easily contain dozens more reported events just in 2015 alone – and, worse yet, thousands of undetected, unreported events.

It would seem that hacking is everyday business for organizations just as much as it is for the cybercriminal. Intellectual property, proprietary designs, financial reports, personnel information, customer data and much more are all center-mass targets for other companies seeking a leg up over yours.

Companies use all the same techniques as the bad guys too. From malware to social engineering, corporate hackers prove each week what the bad guys already know –  it’s much easier to attack than defend.

What’s more, they don’t even have to engage in these dirty activities themselves.

With the emergence of the Dark Web as cybercrime’s illicit marketplace, hacking tools and cyber “hit man” services can be bought to launch everything from spear-phishing attacks, malware-laden spam campaigns and DDOS hits on a rival.

In one of the most famous recent cases that goes all the way back to 2011, the head of Russian payment processing company Chronopay hired a hacker to DDoS his main rival in order to win a contract award due to perceived instability and performance issues.

The Case for Cyber Threat Intelligence (and Counterintelligence too!)

Combine all this corporate hacking for competitive advantage with all the “regular” hacking going on out there each week and cyber defense for most all businesses becomes a kind of Gordian Knot proposition.

But just as with that famous knot, using some “outside the loop” approaches can help companies cut through the binds.

These days, most businesses that even do cybersecurity at all still do what they’ve always done, buy what they’ve always bought and hire who they’ve always hired. Against what appears to be an unsolvable cyber problem, these overwhelmingly tactical defense activities are viewed as, well, all you can do.

Enter cyber threat intelligence and a better level of situational awareness.

Just as is performed by most state-level security and intelligence organizations, corporate cyber threat intelligence is just a flavor of the same sorts of things they too use to know their enemy, know their own risk profiles and prepare and plan for (and respond to!) existing and emerging threats.

As some businesses are starting to learn, getting strategic about cybersecurity and cyberdefense is becoming just as much a key part of their operations as it is to get strategic about finances, product development, hiring, marketing or sales.

Corporate hacking activities highlight this fact even more, as their targeting is more direct, more fundamentally meaningful to the success (or failure) of your business. In other words, they’re purposefully trying to steal your competitive advantage and put you out of business.

By committing to always knowing what you are as a target and what threats map to those vulnerable areas, it’s possible to be better prepared over the long term and make better use of all those pricey tactical defenses.

In short, cyber threat intelligence is decision support.

The sharp rise of cybercrime has taught us that it’s not possible to stop the hits from coming, it’s only possible to detect them as quickly as possible and react not only to limit the damage but to learn more about your adversary and yourself from the incidents as they occur. Developing cyber intelligence functions yourself or leveraging the services of those who provide the expertise enables you to do so.

Now, with the equally sharp rise in corporate hacking, executives also need intelligence to rely on in their tactical and strategic decision-making just as the leaders of nations do.

With cyber correctly being seen now by the most forward-thinking companies as a business problem versus a purely technical one with real impacts that can be felt throughout the corporation, it partners and customers, it’s time to learn that cyber intelligence is just competitive intelligence by another name.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...