What are the different stages of Hacker Chatter?

Created by Charley Downey, Modified on Fri, 22 Mar at 1:04 PM by Charley Downey

There are three stages of Hacker Chatter that we monitor.


Reconnaissance: Indications that a hacker is planning an attack, potentially weeks, months, or even years in advance.


Active: Instances where a hacker actively attempts an attack, which may include boasting about exploiting vulnerabilities or discussing the use of stolen credentials.


Post-Attack: Situations where a hacker has executed an attack, often publicising their success through evidence of system infiltration or data compromise.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article