Hacker Techniques: Clearing Tracks
The final phase of a successful hack attack is ‘clearing the tracks’, getting rid of the trail of breadcrumbs left behind during the break-in. Done correctly, the attacker can cover their tracks to avoid being traced and caught. But what happens when things don’t go according to plan?
What are breadcrumbs?
The subtle breadcrumbs left behind during their hacks may take the shape of IP addresses, suspicious logs, personal information, leftover files/viruses or even a collection of seemingly innocuous metadata that, when added together, paints a picture of who that hacker is and what they’ve done.
Do most hackers leave a trace?
It’s very hard for even the most sophisticated hacker to go completely unnoticed. This is because infecting a target network always involves connecting with that network in some way and modifying it, which usually results in some form of evidence being visible. The weapon of choice for many amateur hackers are keyloggers and botnet worms, which have a very high chance of inadvertent exposure.
"The social experience where you activate your gaming skills as you train like a spy."
- TimeOut
Pulse-racing challenges - crafted with experts from CIA and Special Ops to test your teamwork, agility, collaboration and communication.

SPYSCAPE+
Join now to get True Spies episodes early and ad-free every week, plus subscriber-only Debriefs and Q&As to bring you closer to your favorite spies and stories from the show. You’ll also get our exclusive series The Razumov Files and The Great James Bond Car Robbery!


Gadgets & Gifts
Explore a world of secrets together. Navigate through interactive exhibits and missions to discover your spy roles.
Your Q Type
You will be assigned one of ten Q Types - developed with top spy trainers and psychologists to reveal your hidden potential. Not a personality label - a behavioral map of how you think, lead, and perform when it matters.


Stay Connected
Follow us for the latest
TIKTOK
INSTAGRAM
X
FACEBOOK
YOUTUBE