Anatomy of a Cyber Attacker has been saved
Anatomy of a Cyber Attacker
Cyber criminals are as diverse as their real-world counterparts. In the last five years, there have been cyber attacks targeted at all sorts of organisations. These criminal activities include breaking into private networks, stealing data and installing ransomware, etc. Every individual is responsible for an organisation’s cyber security and it is vital that you know your enemies and implement effective cyber security measures.
3 Types of Cyber Attackers
- White Hats
- White hats are security researchers or hackers who work for organisations such as the government or cyber security firms, etc. E.g. they work to discover vulnerabilities in software and networks to recommend ways to address these gaps.
2. Black Hats
- Black Hats are criminals, who use their ability to plunder individuals or organisations. They explore or develop software deficiencies and attack methods or other malicious tools to break into machines and steal data, such as passwords, email, intellectual property, credit card numbers or bank account credentials.
3. Grey Hats
- Grey Hats fall into the middle ground between the White and Black Hat categories. Often, Grey Hat hackers look to expose vulnerabilities in a system to inform an organisation of the defect or share it with a group of people. Although, these hackers are not usually motivated by personal gain, their actions may be considered illegal or unethical.
Two factors that determine the type of hacker:
- What are their intentions?
- Are their intentions law-breaking?
Four primary motivators:
- Financial Gain
- Ideology or Politics
- Cyber Protection
Not all hackers have malicious intent. Hacking can be used for good and evil, it boils down to the hacker’s intent. In mainstream media, the term “hacker” is usually related to cyber criminals. A hacker could be anyone regardless of intentions or methods. Hacking is not an illegal activity unless their actions compromises a system without an owner’s permission.
Cross Domain Solutions. Types of Cyber Crimes. Retrieved from Cross Domain Solutions: http://www.crossdomainsolutions.com/cyber-crime/
The Guardian. (2017, August 23). Identity fraud reaching epidemic levels, new figures show. Retrieved from The Guardian: https://www.theguardian.com/money/2017/aug/23/identity-fraud-figures-cifas-theft
Channel News Asia. (2017, 19 March). Ethical hackers on the frontline, keeping your home safe from cyber-attacks. Retrieved from Channel News Asia: http://www.channelnewsasia.com/news/singapore/ethical-hackers-on-the-frontline-keeping-your-home-safe-from-cyb-8577866
Make Use Of. (2012, July 13). 5 of the World’s Most Famous And Most Influential White Hat Hackers. Retrieved from Make Use Of: http://www.makeuseof.com/tag/5-worlds-famous-influential-white-hat-hackers/
Express. (2015, September 1). Lizard Squad: The notorious hacking group who brought down UK government website. Retrieved from Express: http://www.express.co.uk/life-style/science-technology/602157/Lizard-Squad-Hacking-Group-Ddos-Attack-PS4-Xbox-NCA
Technotification.com (2014, December 30). Top 10 Black-Hat Hackers in the World. Retrieved from Technotification.com: https://www.technotification.com/2014/12/top-10-best-black-hat-hackers-in-the-world.html
The Guardian. (2016, August 8). The state of cyber security: we’re all screwed. Retrieved from The Guardian: https://www.theguardian.com/technology/2016/aug/08/cyber-security-black-hat-defcon-hacking
The Mental Club. (2015, April 5). Top 5 Black Hat Hackers of the World. Retrieved from The Mental Club: http://thementalclub.com/top-5-black-hat-hackers-world-572
Toptenz.net. (2010, May 24). Top 10 Infamous Hackers. Retrieved from Toptenz.net: http://www.toptenz.net/top-10-infamous-hackers.php
IT World Canada. (2012, January 3). Experts divided om ‘grey hat’ hackers. Retrieved from IT World Canada: http://www.itworldcanada.com/article/experts-divided-on-grey-hat-hackers/45669
Techopedia. Hactivism. Retrieved from Techopedia: https://www.techopedia.com/definition/2410/hacktivism
Express. (2016, May 11). ‘This is just the beginning’ Anonymous hackers take down nine banks in 30-day cyber attack. Retrieved from Express: http://www.express.co.uk/news/world/669346/Anonymous-hackers-take-down-nine-banks-in-30-day-cyber-attack
Entrepreneur.com. (2017, March 2). 4 Easy Ways to Protect Your Company From a Cyber Attack. Retrieved from Entrepreneur.com: https://www.entrepreneur.com/article/289680