What Motivates Cyber Criminals?

It is clear that most hackers are driven by financial gain. However, recent reports have revealed some contrasting findings in terms of how ‘big’ a gain they are either chasing or able to secure.

According to ‘Flipping the Economics of Attacks’ by Palo Alto Networks and the Ponemon Institute 67% of UK hackers admitted that money is their main incentive for their criminality, although the same research revealed that the average UK cyber-criminal makes just over £20,000 per year (an average of £8600 per attack). These are not excessive amounts of money and are lower than expected, especially when you consider a cybersecurity professional can earn up to four-times that much. This suggests that cyber-hackers are more likely to focus their efforts on quick, easy targets with realistic financial payouts.

After all, more than half (54%) of UK respondents said that it takes less than 24 hours for an experienced criminal to plan and carry-out an attack against an organization with a ‘typical’ IT security structure, with 60% admitting that if the time it takes to perform an attack were to increase by less than two days (40 hours), they would be deterred and move onto another target. Here are our first clues into how hackers work: they are opportunists who like to act quickly to target organizations with weak IT security infrastructures.

The Financial Times reporting a recent upsurge in the number of cyber-attacks carried out against the very wealthy and those who manage their own finances. According to the report, security group Kroll discovered hackers are using networking sites such as LinkedIn to search and identify people with significantly well-paid jobs and then targeting them with malicious attacks to trick them into transferring money.

This suggests a shift in technique, with hackers abandoning traditional mass-phishing exercises and focusing on specific targets. A possible reason for this is that it is becoming more common for people, especially pensioners, to have full access to their finances.

David Flower, MD EMEA, Carbon Black, told Infosecurity:
“It’s fair to say that both high net worth individuals and those that manage their wealth are at a significant risk from hackers. The individuals themselves will always represent an attractive target, particularly for phishing attacks on their endpoints. If a hacker gains access, they could find themselves with a wealth of blackmail material, or information that could let them gain access to funds, so they will always be an attractive and potentially weaker target – particularly if they hit their home server or desktop.”

Kroll investigated attacks that ranged in value from a few thousand pounds to multimillion-pound scams, with cyber-crime estimated to have cost the national economy in excess of £30 billion, figures that significantly contrast those put forward in ‘Flipping the Economics of Attacks’. So, here we have another insight into the minds of cyber-criminals which suggests that far from being satisfied with targeting simple IT infrastructures for small, quick profits many do harbor a desire to secure the elusive ‘big pay out’.
 
Whilst Flower agrees that the very wealthy are a key target for cyber-criminals, he also comments on risks surrounding the wider sphere of financial influence, explaining that brokers, financial advisors, and even personal assistants are also potential targets.

He says:
“By targeting non-executive staff within the wealth chain, whether a broker, or admin assistant, with a malicious email or similar, cyber-criminals can potentially gain access to a server and by extension, millions of pounds worth of financial data.”

One thing that both reports do is to highlight two specific targets that hackers seem to be focusing on.

Firstly, findings from ‘Flipping the Economics of Attacks’ clearly show that because cyber-criminals are so concerned with how long an attack takes to carry-out, organizations whose security infrastructure is deemed to be ‘less mature’ are at greater risk as they can be breached quicker. In contrast, companies that take active steps to share threat intelligence with peers, adopt a prevention-first approach and invest in appropriate technologies that slow the progress of cyber-breaches are far more likely to avoid becoming victims of an attack.

Moving on to the article by the Financial Times, we can also see that hackers are using inventive techniques to pinpoint wealthy individuals, often cloning their email addresses and fraudulently instructing for money to be moved from one account to another. Therefore, people working within board-level roles should be mindful of the amount of information they share on sites like LinkedIn.

Whatever their motivation, cyber-hackers are becoming more sophisticated in their techniques and the prevalence of attacks appears to be on the rise.
 
Flower added:
“It is safe to say that this is a battle that isn’t going to be won any time soon but if cyber-criminals are able to exploit human vulnerabilities for ‘quick wins’, IT needs to step in and provide safeguards that allow for human weakness.”

InforSecurity: http://bit.ly/20QaVy2

« The Blockchain Will Change The Property Business
Barely A Third of Energy Companies Track Cyber Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.

7AI

7AI

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats.

RySec

RySec

RySec specialize in affordable cybersecurity solutions designed to protect your business from today’s ever-evolving threats.