Skip to main content
Who are cyber criminals and why do they do it? 


We talk a great length about cyber crime. From trends in phishing to exploits to cyber security threats and so much in between. But we don’t often think about who is committing the cyber crime and what motivates them.
The motivations for cyber criminals can be quite simple. The two that make up the huge majority are money and information. According to a Verizon Enterprise report, financial and espionage-driven motivation make up a full 93% of motivation for attacks. Aside from that, the less-frequent but broader set of motives is often categorized as  “FIG” (Fun, Ideology, and Grudges).



The core motives can vary depending on what the cyber criminal is after, whether they are executing the attacks of their own initiative or if they’ve been contracted to do so, and who might benefit in what way from a successful cyber crime. This variety can be illustrated as follows:

Money
This can be the motive for many types of attacks, including ransomware, phishing and data theft (for sale or ransom of records). The transaction will often use a cryptocurrency if smaller in transaction size, or wire transfers for greater amounts. The cyber criminal will make money either by  extracting money from the victim directly, or capitalize on the sale of their data in underground marketplaces.

Competition
Getting into a manufacturers system can be valuable, whether for IP, blackmail, competitive intelligence, creating a PR nightmare (sabotage), or other reasons. This is especially risky given the (lack of) technical sophistication of systems across industries with complex intellectual property at their core, whether they be in technology, pharmaceuticals, high-tech manufacturing, resource extraction, general utilities, industrial systems or similar sectors.

Political Motivation
As we are seeing with numerous state actors, cybercrime is a growing tool used to achieve political ends. Whether using hacking to shut off a country’s electrical power, manipulate elections or distribute ransomware, state action is growing as a threat to all organizations – even if they aren’t a direct target.

FIGs
Some criminals enjoy being able to exploit weaknesses. Others do it for ideological reasons or to drive disclosure of information they deem is in the public interest, and some may just never let grudges go, whether it be from bad service, a faulty product or to settle any kind of score. They might use any of the tactics mentioned above, or execute DDoS attacks based on their motives as well, though that tactic could be applied to political or competitive motivations as well.
While there isn’t an exceptional amount of data to draw on about attacks and their motivations, we did find an interesting Raconteur infographic. It brings up a few key takeaways to consider.
Financial crime is the most common objective of attacks (41%). This comes as no surprise, but what may come as a surprise is that insider threats (27%) and competitive (26%) objectives in 2nd and 3rd respectively.
The Manufacturing industry seems to be at a far greater risk of attacks for espionage motivations than for financial motives.
While the Healthcare industry is targeted for financial motives, it has the highest incidence of FIG motivations.
Public administration is the victim of fewer espionage attacks (both as ratio of overall attacks and in absolute numbers) than the manufacturing industry. This is surprising at first, but could be result of a smaller number of public administration targets compared to manufacturing, or that public administration is better prepared and aware of the value their information has to attackers.

The “Hacker”

It’s also worth highlighting how the word hacking is misused. A discussion on why “hackers hack” wouldn’t be fair without stipulating what we mean by hacker. The hacker-tinkerer of the 80s and 90s appears to be synonymous with the cybercriminal, an equivalency that is patently unfair. The motivation of hackers – the ones who are looking for bugs and reporting them – are very different and not criminal in nature. According to one report, 72% of hackers do it for money, that includes legal bounties paid by the likes of Google, Microsoft, Apple and others. 70% Agreed that they do it for fun.

Comments

  1. Important Information Regarding unethical Hacking of Data over the internet.

    ReplyDelete
  2. Great info. πŸ‘πŸ‘πŸ»

    ReplyDelete
  3. Amazing blog.. it will help lot of people to know about how cyber crime is increasing and harming us

    ReplyDelete
  4. I believe everyone should aware about cyber crime because in today's world we are all over to the cyber life so, we should also be aware about it's disadvantages. Thanks for sharing this information through your blog

    ReplyDelete
  5. Toray I Got to know briefly about cyber criminals and learned about their motives to attend auch tpye crime. Wonderful WorkπŸ‘πŸΌ. Keep It Up.

    ReplyDelete
  6. Very informative content as you mentioned about hacking... In india we don't have strict lawa against hacking.... For crimes like hacking we need support and collaboration in making of law from other countries as well

    ReplyDelete
  7. its helps alot to know more about cyber crimes now a days

    ReplyDelete
  8. πŸ‘πŸΌπŸ‘πŸΌ

    ReplyDelete
  9. now days cyber-crime is in rapid growth and this information is very helpful to understand the cyber crime and criminals.

    ReplyDelete

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of
Ways to secure yourself from cyber crime  1) Education - Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal information by pretending to be a legitimate organization or person. These scams often play off major new stories, so keep informed on the latest news-related scams. 2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. 3) Cli
Top 9 women in cyber security in India The gender gap and in the field of cybersecurity has been a chronic problem for a long time. The idea of diversity incorporates acceptance and regard. It implies understanding that every individual is one of a kind, thus perceiving our individual differences. Inclusion on the other hand is the degree to which different voices of a diverse workforce are respected and heard. It is the environment in which an employee perceives that he or she is an esteemed member of the work group through experiencing treatment that satisfies his or her needs for belongingness and uniqueness.  The two aspects need to work hand-in-hand to imbibe new ideas and innovation amongst the employees. It is required today that every organization in the industry encourage females to work in this sector by creating role-models and mentorship programs like the initiatives of companies like Google, IBM, and Facebook. National Initiative for Cybersecurity Career and Studie