{"id":17977,"date":"2025-08-20T11:07:47","date_gmt":"2025-08-20T15:07:47","guid":{"rendered":"https:\/\/joindeleteme.com\/?p=17977"},"modified":"2025-09-02T15:58:02","modified_gmt":"2025-09-02T19:58:02","slug":"forget-code-these-teens-are-hacking-minds","status":"publish","type":"post","link":"https:\/\/joindeleteme.com\/blog\/forget-code-these-teens-are-hacking-minds\/","title":{"rendered":"Forget Code: These Teens Are Hacking Minds"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The ultimate cybersecurity wake-up call<\/h2>\n\n\n\n<p>At DEFCON 33, the world\u2019s biggest hacking conference, I saw a scene you may not picture when you think of a hacker convention: average-looking humans (some of them wearing costumes) in competition with each other. The goal: to trick real companies into giving away sensitive information without writing a single line of code.&nbsp;<\/p>\n\n\n\n<p>Maybe you think of teenagers first. Many people do, and that\u2019s because many hackers started their careers in parent-sponsored (as opposed to state-sponsored) settings: a messy bedroom, a basement play area, an attic.<\/p>\n\n\n\n<p>This year, DeleteMe was sponsoring the Social Engineering Community Village at DEFCON, and I was excited to have a front row seat. But I wasn\u2019t prepared to see teenagers barely old enough to vote among the contestants&#8217; ranks. These hackers weren\u2019t engaged in credential stuffing or cracking passwords. There was no malware. They were picking up phones in a soundproof booth, calling real employees at real companies, and convincing them to share details that could later be used to break into a system. No code required. Just confidence, psychology, and the right script.&nbsp;<\/p>\n\n\n\n<p>Watching them at work, it underscored an old truth in the realm of cybersecurity: the human element is still the biggest vulnerability any of us face.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"On Our Podcast This Week:\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Zr8khMVjurs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Teenagers at a hacker convention was novel, but their presence underscored an important situation. If skilled communicators can talk their way into getting information that can be used to hack an established company with cybersecurity protocols and systems, then nothing is safe.&nbsp;<\/p>\n\n\n\n<p>One participant\u2013not one of the teenagers, but not an oldster either\u2013explained his strategy bluntly: He called businesses in the South because, in his words, \u201cpeople there are nicer and will stay on the line.\u201d It worked. He got further into conversations simply by exploiting cultural psychology.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"On Our Podcast This Week:\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/x1Fd3-zbwzc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>That moment stuck with me. It was all about people. And it reminded me that threat actors succeed because humans, under pressure or distracted, tend to react instead of responding to stimuli.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"On Our Podcast This Week:\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/K69HR1fNh8A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Psychology scales faster than technology<\/h1>\n\n\n\n<p>Security teams globally spend billions of dollars on firewalls, intrusion detection, and AI defenses.&nbsp;<\/p>\n\n\n\n<p>But all it takes is one phone call to a helpful employee willing to share something about the way a company does business, and the whole system unravels. Threat actors know this fact well.&nbsp;<\/p>\n\n\n\n<p>They don\u2019t need to out-code your company\u2019s engineers. They just need to get someone who works there talking long enough to build trust.&nbsp;<\/p>\n\n\n\n<p>As I watched those teenagers, I gained a new appreciation for just how fast these skills can be learned and weaponized.&nbsp;<\/p>\n\n\n\n<p>What happened in that soundproof booth is happening right now in offices, customer service departments, via LinkedIn DM, and in your inbox. In the weird world of social engineering, the helpful IT tech and the frustrated CEO are straight out of central casting. Ditto the IT compliance officer who just needs to \u201cconfirm a few details.\u201d&nbsp;<\/p>\n\n\n\n<p>Human vulnerability is universal. If a teenager can exploit it under pressure in front of an audience, so can a criminal who has all the time in the world.&nbsp;<\/p>\n\n\n\n<p>Awareness is everything. The moment you see how easy it is for a threat actor to extract and weaponize something as seemingly trivial as the waste management service used at a company, you can\u2019t unsee it. You realize how data points are like so many breadcrumbs guiding threat actors in the commission of crime, one that could be an extinction-level cybersecurity failure.&nbsp;<\/p>\n\n\n\n<p>And that realization\u2014that human trust can be hacked more readily than any machine\u2014is the first step in protecting yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DEFCON 33 Post-Mortem: The Social Engineering Community Village<\/p>\n","protected":false},"author":37,"featured_media":17984,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-17977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/17977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/comments?post=17977"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/17977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/17984"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=17977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/categories?post=17977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/tags?post=17977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}