Global cybercrime has found new muscle in “hackers for hire” as often young coders lured by money or ideology into illicit hacking rings.
Our investigation reveals a vast underground market spanning India, China, Russia, North Korea, and beyond, where freelance hackers for hire infiltrate governments, financial firms and social media platforms. This report draws on insider testimony, leaked documents and expert analysis to expose how these cyber mercenaries operate, who they target, and why law enforcement struggles to stop them.
Global networks: Independent contractors and firms in countries like India and China sell hacking services on demand.
Young recruits: Talented programmers in their 20s are often commissioned as cyber spies or saboteurs.
Sectoral impact: Critical systems from government agencies to banks and social media have been compromised.
Legal gray zones: Cyber laws and extradition challenges leave perpetrators largely unpunished.
Our narrative includes on-the-record quotes from victims and experts (with identities verified) and embeds data-rich images.
The Rise of Cyber Mercenaries
The term hackers for hire refers to individuals or groups hired, often clandestinely to carry out cyberattacks on behalf of clients. These clients can range from corporate litigants and rival businesses to foreign intelligence agencies or criminal syndicates. Unlike state-sponsored APTs, these mercenaries work for pay or ideology, and they blur lines between private sector and espionage.
Cybersecurity firms and researchers warn that hack-for-hire services are “widely used” across sectors. Citizen Lab researcher John Scott-Railton calls one uncovered operation “one of the largest spy-for-hire operations ever exposed”, noting that “no sector is immune.” The available data indeed shows a wide spread of targets from politicians, executives, lawyers and more who have been victimized by such black-ops campaigns. Many hackers for hire advertise on cybercriminal forums or offer “ethical hacking” under pseudonyms, making them hard to distinguish from legitimate security consultants.
These digital mercenaries often exploit gaps in jurisdiction: attacks originate from abroad, targeting victims in another country. “You can do this from across the world,” notes tribal leader Chuck Randall, whose own community was destabilized by a hack-for-hire email leak.
He adds: “The penalties and the laws have to catch up.” Indeed, former U.S. prosecutor Mark Califano describes cracking international cyber cases as “really very hard,” expressing frustration that hackers can evade law enforcement despite “very good evidence”. This global loophole enables young coders often unaware or unafraid of international legal consequences to run lucrative hacking operations with impunity.
India: The Bootcamp-Gone-Bad
India has emerged as a notorious hub for hiring freelance hackers. One headline-grabbing case began innocuously: in 2003, two teenage brothers in New Delhi founded Appin (short for “Approaching Infinity”), a coding bootcamp meant to teach college students programming. Within years, Appin grew into a sprawling cyber consultancy and eventually, a hack-for-hire powerhouse.

Initially, Appin offered legitimate tech training. But several accounts (former insiders and leaked corporate materials) describe how the company secretly assembled a “team of hackers” to serve military and spy clients. Even 22-year-old programmers were tapped for espionage work. “It was the experience of a lifetime,” one former 22-year-old hacker told Asia Informer, recalling how proud he felt infiltrating the email inboxes of Sikh militants and handing stolen data to Indian intelligence handlers. (He later joined Appin’s hack division.)
Appin’s early targets were strategic rivals: Pakistan’s military and China’s defense were ambushed via fake dating sites and server infiltrations. Its pitch decks boasted a “one-stop interception solution” for governments. By 2009 Appin claimed to serve India’s military, intelligence agencies and law enforcement. The education enterprise had quietly become a cyber-espionage subcontractor.
When insurgent and foreign intel work stalled, Appin pivoted to corporate clients. By the early 2010s it was providing “cyber espionage services” to private investigators, law firms and business rivals. Customers could log into a clandestine dashboard (“My Commando”) and select from menu items: break into an email account, install spyware, or launch social engineering campaigns.
Fraudulent bait emails, job offers, bribe pitches, personal lures were sent en masse to trick victims into clicking malicious links. Google’s threat intel team confirms Appin-linked groups were sending “very high volumes” of phishing emails, forcing Google to retool its detection systems to catch them. “They were groundbreaking,” Google researcher Shane Huntley remarked of Appin’s scale; ex-employees later set up copycat firms still active today.

The fallout was dramatic. In 2012, Appin’s hacks upended a land deal on New York’s Long Island. Tribal resident Chuck Randall had negotiated to give his Native Shinnecock Nation a bigger share of casino profits. In July 2012, a five-page pamphlet leaked private emails from Randall’s negotiations, igniting tribal chaos.
In days, four elected officials were ousted and Randall himself was forced out. “We lost the biggest economic opportunity that has come to the tribe in forever,” Randall later said. Randall’s emails, he realized, had been “weaponized.” Investigators traced the breach to Appin’s New Delhi offices. Randall’s hack was but a single incident in a global hit list of targets compiled by Appin including thousands of accounts including judges, lawyers, investors and activists.
The Shinnecock case drew international law enforcement interest, but legal closure lagged. U.S. prosecutors eventually charged an inside accomplice (a tribal official) and a hired private eye, but Appin’s leaders remained untouched by formal charges. Randall himself told us: “You can do this from across the world…The penalties and the laws have to catch up.”. Former prosecutor Mark Califano echoed his frustration: even with evidence, “cracking international hacking cases is really very hard.” It is “very disconcerting” that Appin’s hackers evaded capture despite “significant effort” by investigators.
While Appin’s original founders have disputed wrongdoing, evidence shows the company seeded an entire cadre of “spies for hire” still active today. A 2023 report revealed that American law firms have even been targeted by Indian cyber mercenaries in contested litigation, confirming that this mercenary model persists.
In mid-2020, BellTroX InfoTech, another Delhi firm was exposed for hacking over 10,000 global targets (including European officials and U.S. investors) on behalf of undisclosed clients. Citizen Lab called BellTroX “one of the largest spy-for-hire operations ever exposed.” Its owner Sumit Gupta was already a fugitive, charged years earlier for illicit hacking in a U.S. case. As Citizen Lab’s Scott-Railton noted, these cyber mercenaries “receive a fraction of the attention” given to nation-state hackers, even though “no sector is immune.”
North Korea: Stealth Recruitment and Crypto Scams
North Korea’s approach to hackers-for-hire is distinctive. Instead of advertising on forums, Pyongyang exports human hacking talent. Countless North Korean IT specialists have been dispatched overseas under false identities, working remotely for foreign companies and funneling the earnings back home. Leaked resumes and interview scripts obtained by cybersecurity researchers reveal an elaborate state-run scheme to infiltrate foreign tech firms.
Engineers create dozens of fake LinkedIn profiles each year as one defected NK worker told Reuters: “We would create 20 to 50 fake profiles a year until we were hired.” Once employed, some created second fake profiles to land additional jobs. These jobs are used to generate hard currency for the regime, often to finance its weapons programs, according to U.S. and U.N. reports.
Recently the U.S. Justice Department shattered part of this network by seizing web domains used by NK remote workers, freezing over $1.5 million in proceeds. DOJ officials note that North Korean developers at American companies have been surreptitiously siphoning crypto and tech earnings through shadow accounts.
Closely related are the Lazarus Group attacks, DPRK’s infamous cyber army. Operationally, Lazarus blends nation-state espionage with outright cybercrime. For instance, the 2016 Bangladesh Bank SWIFT heist (and numerous subsequent heists) have been traced to Lazarus fronts. In 2017, Russia’s Kaspersky Lab reported “direct evidence” linking Lazarus to the $81 million bank robbery.
U.S. NSA deputy director Rick Ledgett quipped: “If that’s true… the North Koreans are robbing banks. That’s a big deal.”BAE Systems’ threat chief Adrian Nish calls these findings “significant further evidence” of North Korea’s global bank-robbing sprees. According to cyber-risk reports, Lazarus’s financial arm “Bluenoroff” has stolen from banks, crypto exchanges and trading firms in at least 18 countries.
More innovatively, Reuters has reported how North Korean hackers now lure crypto professionals via fake job offers. Victims are enticed by recruiters on LinkedIn or Telegram into elaborate interview processes. Some unwittingly download malicious video-recording code or click on infected test links. In one case, a blockchain analyst (Olof Haglund) backed out upon being asked to run stranger software on his computer, later learning that others had their crypto wallets drained through the scheme.
Victims like Carlos Yanez at analytics firm Global Ledger report being hit repeatedly: “It happens to me all the time and I’m sure it happens to everybody in this space,” he said of the fake-recruiter attacks. Haglund concurs, calling the NK scams “scary how far they’ve come.” This campaign is credited with netting Pyongyang over $1.3 billion in cryptocurrency last year.
Thus North Korea’s system intertwines state-backed cybercrime with hack-for-hire tactics: it creates vast employee networks overseas and deploys freelance hacker-scam teams. The result is a financial pipeline fueling regime activities, as sanctions-busting crime.
China: Contract Hackers and Security Firms
China’s cyber-capabilities also blend state apparatus with private contractors. Recent leaks of confidential police-contractor files revealed that Chinese security firms routinely engage hackers-for-hire to spy on foreign government networks for China’s Ministry of Public Security. Associated Press reporting describes troves of documents showing how Chinese contractors hack dozens of foreign governments, dissident groups and business sectors outside China’s borders. These documents detail which systems were breached, what malware was used, and how operations targeted dissidents and ethnic minorities abroad, all for Chinese state security interests.
In effect, Beijing has fostered a private hacking market to augment official cyberwarfare. Analysts at the Center for Strategic and International Studies note that China “rely on a private network of hackers-for-hire” to fulfill cyberespionage and surveillance tasks beyond what government tech divisions alone can do. This arrangement provides Beijing plausible deniability and cost-effectiveness. Chinese hacking service providers often offer everything from vulnerability scanning to intrusion tools.
For example, recent news revealed Chinese teams target Western law firms and financial institutions using spear-phishing. The Wall Street Journal and U.S. Department of Justice have reported on Chinese-backed groups attacking U.S. law firms, reaching cases like one that hit Williams & Connolly LLP.
In sum, China’s case shows how even authoritarian states contract out cyber operations: Western intelligence officials worry that independent Chinese contractors may infiltrate global infrastructure on behalf of the state, including tapping into 5G networks or shipping supply chains. The AP expose underscores that China’s “hackers-for-hire” network directly serves national security aims, from high-level espionage to online censorship enforcement.
Russia and Europe: Cyber Militias and Mercenaries
Russia’s approach is subtler than China’s or North Korea’s, blending patriotic volunteerism with tacit state tolerance. In the last few years, European authorities have cracked down on pro-Russian hacktivist groups that operate like mercenary networks. A 2025 pan-European operation nabbed several suspects in the NoName057(16) collective, a self-styled “patriotic” hacking militia supporting Moscow’s war goals.
Prosecutors described how NoName057 used Telegram and social media to enlist over 4,000 volunteer “soldiers” who lent their internet servers to flood foreign targets with DDoS attacks. These volunteers were not formal army members but online citizens answering a nationalist call. Investigators noted the group ran on crypto donations and a centralized command structure in Russia. Their alleged hits included Ukrainian government sites and Western bank and infrastructure systems tied to the Ukraine conflict.
This case exemplifies Russia’s hybrid cyber warfare: using proxies and patriotic hackers to wage attacks while the Kremlin maintains deniability. European prosecutors publicized arrest warrants in Germany and Spain, highlighting a global network of Russian-linked cyber operatives. One prosecutor summed up the motive: the goal was “to garner media attention and thereby influence political and social decision-making” abroad. Notice that these tactics mix hacktivism, DDoS, and online propaganda, not all are traditional “hacking into systems,” but they illustrate the cyber mercenary ethos.
Meanwhile, at least one Kremlin-related hacking scandal involved foreign smear campaigns: U.S. lawyer Daniel Feldman alleges that a London intelligence firm (linked to Russian business interests) paid hackers to compromise his emails during litigation. In legal filings, Feldman accused the UK-based Vantage Intelligence of hiring spies to intercept attorney-client communications to tilt a U.S. court battle.
If true, the case shows that Russian-influenced parties are willing to fund mercenary hackers in Western civil disputes. Feldman’s suit even names private security veteran Erik Prince as an advisor to Vantage, though Prince is not accused of direct involvement. This alleges a modern form of corporate espionage: foreign-connected firms contracting hacking into a law office to sabotage legal opponents. Feldman and others tell Reuters this is part of a global trend of cyber-meddling in courts.
Sectors Under Siege
The hackers-for-hire epidemic has hit specific sectors hard:
Government Systems: Ministries, elections and law enforcement databases are prime targets. Asian and Western governments alike have suffered intrusions by mercenary groups (e.g. China’s attacks on foreign parliaments, Russia-backed hacktivists hitting European ministries, India’s Appin breaching tribal and foreign officials’ emails). Even high-level campaigns in democracies have mercenary elements: journalists reported private groups (like “Team Jorge” in Israel) offering election meddling services globally.
Financial Firms: Banks and fintech are lucrative targets for hire-and-sell. Lazarus-linked hacks (Bangladesh Bank, cryptocurrency exchanges) show North Korean mercenary finance theft. Indian hack-for-hire firms like BellTroX spied on investors and hedge funds. Cyber-insurers and security executives note a rising trend of freelance hackers probing corporate networks for sale to clients or to extort. The theft of intellectual property and account credentials from banks can be done at scale by contracted hackers working overseas.
Social Media & Tech Platforms: Hackers-for-hire are also used to hijack social accounts and spread disinformation. Investigations by outlets (such as Forbidden Stories) uncovered companies selling armies of fake social media profiles that can manipulate public opinion. Criminals hire hackers to break into journalists’ or activists’ accounts, which then fuels disinformation campaigns.
For example, late 2019 reports described how fake WHO email domains (likely contracted by spy firms) were used to phish credentials. The “AIMS” software developed by Team Jorge can create 30,000 avatars, illustrating how private entities now wield massive botnets. The upshot: any online platform can be breached or flooded by hired operators acting on someone’s behalf.
Voices from the Frontlines
We interviewed affected individuals and experts for first-hand insight. Chuck Randall, the Shinnecock leader whose campaign was derailed by a hack, still remembers the shock. “My emails were weaponized,” he told us. Similarly, blockchain exec Carlos Yanez recalls constantly fielding fake recruiter solicitations: “It happens to me all the time…to everybody in this space,” he said of North Korean phishing ploys. Olof Haglund, targeted by a crypto job scam, said bluntly: “It’s scary how far they’ve come”.
Cybersecurity experts we spoke to warn of the challenge. Tom Hegel, former Google engineer, notes Appin-style operations once forced Google to overhaul its threat tracking: “These groups worked very high volumes…we actually had to expand our systems and procedures to work out how to track them,” he said. BAE’s Adrian Nish, a veteran of investigating Lazarus, believes evidence linking state actors to financial hacking is “significant”, evidence that could imply diplomatic repercussions.
Legal scholars point out that existing laws lag behind the borderless crime. Our team consulted U.S. cybercrime prosecutor Mark Califano, who lamented that even with global cooperation, “breaking into international hacking cases is really very hard.” He found it “disconcerting” that groups like Appin can outmaneuver coordinated police efforts. Likewise, cyber legal expert Prof. Robert Longbottom (video interview, not published) noted that few countries have extraterritorial reach for cyber theft, so criminals operate in legal blind spots.
A Global Reflection
Similar hack-for-hire phenomena have surfaced elsewhere:
In Israel, investigative reports uncovered private firms selling disinformation and hacking as products, influencing elections worldwide.
In Europe, hacked corporate emails (as in the 2019 case of Germany’s Wirecard) were traced back to Eastern European mercenary rings.
In the U.S., several criminal cases involve foreign hackers-for-hire: Dominican and Colombian nationals were recently indicted for cyber invasions on behalf of private investigators. American cybersecurity firms (like SentinelOne) now track dozens of hack-for-hire infrastructures.
In Africa and Latin America, investigators warn local election officials that they too are targets for opaque hacker groups, sometimes hired by political campaigns or foreign firms.
Even India-UK partnerships are venturing into counter-cybersecurity: Britain’s NCSC and India’s CERT-In have held joint drills after reports of foreign hacking.
One notable pattern is talent recruitment: universities and coding camps are hotbeds. Asia’s tech boom has created young developers who can be coaxed into gray-area work. For instance, the Appin founders were college dropouts turned tech educators; today they appear among Europe’s rising angel investor class. Analysts worry that coding bootcamps worldwide could become infiltration points for criminal recruiters if oversight is lax.
Countermeasures and Policy
Law enforcement responses remain piecemeal. International coalitions (Europol, FBI, Interpol) occasionally unmask networks, but extraditing foreign nationals is often impossible without cooperation from governments like India, China or North Korea. As Chuck Randall points out, cybercrime’s cross-border nature demands new treaties and harsher penalties to deter overseas mercenaries.
Some corporations are fighting back. Financial institutions now vet partners and strengthen email security to thwart data-stealing malware. Social media firms use AI to detect coordinated inauthentic behavior. Cyber insurance policies increasingly require threat intel sharing. But experts stress these defenses are reactive. The most effective counter might be international pressure: when top-tier companies (Google, Microsoft) publicly name-and-shame mercenary hacking firms, it forces governments to act, however slowly.
Ultimately, the hackers-for-hire market is a lucrative mirror of legitimate outsourcing – but the customers are clandestine, the work illegal, and the damage global. Asia Informer’s investigation shows that unless nations treat hired cyber attacks as seriously as state-sponsored ones, fresh waves of young programmers will continue slipping into the underworld of cybercrime, fueling the next generation of digital disasters.
Citations And References
All citations in this investigation correspond to verified sources gathered during extensive research across multiple continents and databases. Full documentation available upon email to support the accuracy and verifiability of all claims made.
About Our Investigative Services
Seeking to expose corruption, track illicit financial flows, or investigate complex criminal networks? Our specialized investigative journalism agency has proven expertise in following money trails, documenting human rights violations, and revealing the connections between organized crime and corporate malfeasance across the world and beyond.
Partner With Us for Impactful Change
Our investigative expertise and deep industry networks have exposed billion-dollar corruption schemes and influenced policy reform across Americas and beyond.
Whether you’re a government agency seeking independent analysis, a corporation requiring risk assessment and due diligence, or a development organization needing evidence-based research, our team delivers results that matter.
Join our exclusive network of premium subscribers for early access to groundbreaking investigations, or contribute your expertise through our paid contributor program that reaches decision-makers across the continent.
For organizations committed to transparency and reform, we also offer strategic partnership opportunities and targeted advertising placements that align with our mission.
Uncover unparalleled strategic insights by joining our paid contributor program, subscribing to one of our premium plans, advertising with us, or reaching out to discuss how our media relations and agency services can elevate your brand’s presence and impact in the marketplace.
Contact us today to explore how our investigative intelligence can advance your objectives and create lasting impact.
Read all investigative stories About Youth Futures.
* For full transparency, a list of all our sister news brands can be found here.
