Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Digital Shadows Report: Competitions on English-Language Cybercriminal Forums

How Continous Is Continous Monitoring?
May 5, 2020

In contrast to the competitions on Russian-language forums profiled previously by Digital Shadows, competitions on English-language forums are generally more innocent in nature. However, Digital Shadows has observed instances of increased prize values and competitions that require the use of real “hacking skills,” tactics similar to what a cybercriminal would use in the wild. 

There are few cases of English-language forums with a tradition of hosting regular competitions, and it’s difficult to detect any clear, streamlined development of a distinct English-language forum competition model - with a few exceptions, says the Digital Shadows Photon Research Team. Soon after its creation in 2012, the BitsHacking forum started hosting regular competitions with its most recent competition announced in late 2018. This example provides the analysts with a certain amount of insight into the somewhat-fluid evolution of competitions - but because BitsHacking seems to be the exception rather than the rule, as an individual case, it is not enough to draw any substantiated conclusions, says the analysts. 

Even though the forums that have recently organized competitions have not individually done so long enough for any historical patterns to appear, there are plenty of discrete cases of English-language forums hosting contests out in the wild. 

Observed Characteristics

When analyzing some of the English-language forums, the analysts observed the following characteristics:

  • More often than not, competitions tend to be forum-wide contests with prizes varying from small cash or non-cash prizes (such as tokens added to the winner’s profile banner) to short-term VIP subscriptions.
  • The competitions are almost exclusively arranged by the forum administrator and staff, rather than individual members.
  • In cases where the competition has been set up by a single forum user, the competition and its organizer must be officially approved by the administrator beforehand.

The events are usually innocent competitions with simple formats that require minimum effort from the forum administrators, claim the analysts. Most of the following examples, add the analysts, might not be considered “competitions” in the traditional sense - but can be viewed as a way of getting members to compete against each other without going through the effort of organizing large, more complex competitions that require more oversight and resources:

  • Member of the Month: Cracked TO, Nulled, and several other forums host monthly awards in which members have to nominate and then vote for a user to become “Member of the Month” and receive either a small cash prize or a token on their profile banner.
  • Achievements: RaidForums and others have incorporated an awards system in which members can win or request tokens for various achievements, such as creating a set number of threads on the forum or sharing a certain amount of breached data.
  • Capture the Flag: The high-profile forum Torum allows members to engage in “capture the flag” team challenges (attacking the other team’s system) organized by a high-ranking forum member, but there are no actual prizes to win. Although such challenges might require the participants to have some specific skills, several new members without much experience have participated, using them as hands-on, "fun" learning experiences.

According to the research team, BitsHacking is one of the odd ones out in the group, being one of the few forums to have hosted more traditional competitions regularly over an extended period, including:

  • Monthly contests for new members
  • Referrals competitions, to acquire as many referrals as possible within a given time frame
  • Graphics competitions, to design various logos

Different Competition Types

Despite similarities, there have been indications of a divide in terms of the type of competitions seen on smaller, up-and-coming forums and those hosted on higher-profile sites, claims the research team. Smaller forums, they say, tend to use competitions as a way of acquiring and keeping new members, as exemplified by the referral competitions and monthly newcomer competitions on BitsHacking, and the Member of the Month awards on Cracked TO and Nulled. Such competitions potentially allow forums to acquire new users, and winning these types of contests on smaller forums also enables users to gain a reputation quickly, subsequently giving them more reason to stay, say the analysts. 

Higher-profile forums, such as RaidForums and Torum, don’t seem to have intentions of using competitions to acquire new members and build reputation; they likely feel they’re already well-known enough, notes the research team. Instead, they use challenges or awards systems to maintain their membership, enhance a sense of community, and award users for "good behavior".

 

English vs Russian-language Cybercriminal Forums

Russian-language forum competitions have, as mentioned, gone from being small-scale competitions hosted by individual members with small cash prizes or symbolic awards to forum-wide, highly renowned contests requiring skill and knowledge to participate, where winning these competitions not only means receiving a significant cash prize but involves a lot of prestige. 

According to the analysts, there have been some recent developments to this model, as the Russian-language cybercriminal forum XSS announced on April 27, 2020 that they would end their regular article competitions, and instead pay users to submit “original, high-quality” articles for publication on the forum.

On English-language forums, either due to short life span, or downtime and sporadic inactivity, forum administrators are hosting easy competitions that are open to all forum members, have small prizes, and make use of simple competition formats requiring minimum effort and the focus seems to be on simple and easy entertainment, rather than prestige, money, and harnessing skills, say the researchers. 

Initially,say the researchers, it’s likely more important for the forum administrators to use and control competitions as a way of acquiring new members and creating a sense of community. When the forums later become more established, such as Nulled, which recently hit the three-million-member mark, they might be more prone to let members they trust host contests, as a way to enhance the sense of community.

 

Future of English-language Cybercriminal Competitions

The analysts says it’s difficult to say what the road ahead will be like for competitions on English-language forums, but that they will most likely not follow the Russian-language forum competitions’ trajectory, and rather stick to the current competition model they have, for the foreseeable future. The smaller forums will probably be more prone to hosting "fun" competitions to attract members and feed community spirit, say the researchers, and the more established and high-profile forums will likely stick to simpler formats of award systems and easy challenges to maintain their membership.

For more detailed findings, including images, visit https://www.digitalshadows.com/blog-and-research/competitions-english-language-cybercriminal-forums/

KEYWORDS: cyber security Dark Web hacking information security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hacktivist

    Digital Shadows research: Escrow systems on cybercriminal forums

    See More
  • Big data

    Digital Shadows report: Which cybercriminal forum is on top?

    See More
  • Revised NIST Cyber Security Framework - Security Magazine

    Digital Shadows Report: How COVID-19 is Impacting Cybercriminal Activity

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!