Loading...

Cyber Criminals, Spies and Activists – Know the Enemy

June 30, 2015 by Michael Bruemmer

Cyber-crooks-hackers-activists

Who are behind cybercrimes? When it comes to these thieves behind computers, not all perpetrators are the same, and how they ply their attacks can vary greatly, too. To effectively protect your organization from cybercrime, it’s vital to understand the many ways in which it occurs, and the many types of cyber criminals who perpetrate it.

In 2014, the total cost of cybercrime in the United States was approximately $12.69 billion, according to the Ponemon Institute. What’s more, the costs and frequency of cybercrime continue to rise. Although the methods that cyber crooks employ are almost as numerous as the criminals themselves, some types of attacks and attackers are most common.

Hacks and hackers

A hacker is anyone who breaks into a network, database or system they are not authorized to access. Their motivations vary widely. Some do it just for thrills. Others hack for monetary gain. Hacking occurs in many ways, from high tech to mundane. For example, a hacker may simply steal or guess at a password that gains them access to a network or data base. Or, they may use specially created software to exploit vulnerabilities in a system’s security protocols.

Hacktavists

Another type of hacker commits their crimes with an agenda. Hacktavists use traditional hacking methods to aggressively promote their cause or issue. They’re not hacking for money, information or thrills, but rather to draw attention to an issue or embarrass an organization. Back in 2011, hacktavists accounted for 58 percent of all data theft, WatchGuard Security Center reports. Today, most hacking occurs for profit.

Spies and spyware

Corporate espionage has been around about as long as corporations have, and corporate spies have embraced the digital age. Cyber spies may work on behalf of the government, a corporation or themselves. They infiltrate networks and databases to steal massive amounts of information. What they do with the stolen data varies, but some may sell information to identity thieves, others use it to undermine a corporation’s business, and still others leverage stolen data for political gains.

Phishers and scammers

The folks who perpetrate online scams or cast phishing emails into the great sea of the Internet usually have fairly easy-to-understand motivations: they’re out for money. They may steal money directly from consumers by tricking them into giving up financial account information that the scammers can then use to access and clean out the account. Or they may even convince victims to send them money directly. Others steal identifying information that they then use to open new credit accounts in the victim’s name. In December 2014, RSA estimated phishing attacks cost about $453 million globally.

While these are some common types of cybercrime, new forms emerge every year. Regardless of the type of crime, the results can be devastating for corporations and the consumers who do business with them. The continued growth of cybercrime means organizations must be vigilant about prevention, prepared to detect attacks quickly, and have a solid plan in place for dealing with the aftermath of a data breach or other form of cyberattack.