What Motivates Cyber Criminals?

It is clear that most hackers are driven by financial gain. However, recent reports have revealed some contrasting findings in terms of how ‘big’ a gain they are either chasing or able to secure.

According to ‘Flipping the Economics of Attacks’ by Palo Alto Networks and the Ponemon Institute 67% of UK hackers admitted that money is their main incentive for their criminality, although the same research revealed that the average UK cyber-criminal makes just over £20,000 per year (an average of £8600 per attack). These are not excessive amounts of money and are lower than expected, especially when you consider a cybersecurity professional can earn up to four-times that much. This suggests that cyber-hackers are more likely to focus their efforts on quick, easy targets with realistic financial payouts.

After all, more than half (54%) of UK respondents said that it takes less than 24 hours for an experienced criminal to plan and carry-out an attack against an organization with a ‘typical’ IT security structure, with 60% admitting that if the time it takes to perform an attack were to increase by less than two days (40 hours), they would be deterred and move onto another target. Here are our first clues into how hackers work: they are opportunists who like to act quickly to target organizations with weak IT security infrastructures.

The Financial Times reporting a recent upsurge in the number of cyber-attacks carried out against the very wealthy and those who manage their own finances. According to the report, security group Kroll discovered hackers are using networking sites such as LinkedIn to search and identify people with significantly well-paid jobs and then targeting them with malicious attacks to trick them into transferring money.

This suggests a shift in technique, with hackers abandoning traditional mass-phishing exercises and focusing on specific targets. A possible reason for this is that it is becoming more common for people, especially pensioners, to have full access to their finances.

David Flower, MD EMEA, Carbon Black, told Infosecurity:
“It’s fair to say that both high net worth individuals and those that manage their wealth are at a significant risk from hackers. The individuals themselves will always represent an attractive target, particularly for phishing attacks on their endpoints. If a hacker gains access, they could find themselves with a wealth of blackmail material, or information that could let them gain access to funds, so they will always be an attractive and potentially weaker target – particularly if they hit their home server or desktop.”

Kroll investigated attacks that ranged in value from a few thousand pounds to multimillion-pound scams, with cyber-crime estimated to have cost the national economy in excess of £30 billion, figures that significantly contrast those put forward in ‘Flipping the Economics of Attacks’. So, here we have another insight into the minds of cyber-criminals which suggests that far from being satisfied with targeting simple IT infrastructures for small, quick profits many do harbor a desire to secure the elusive ‘big pay out’.
 
Whilst Flower agrees that the very wealthy are a key target for cyber-criminals, he also comments on risks surrounding the wider sphere of financial influence, explaining that brokers, financial advisors, and even personal assistants are also potential targets.

He says:
“By targeting non-executive staff within the wealth chain, whether a broker, or admin assistant, with a malicious email or similar, cyber-criminals can potentially gain access to a server and by extension, millions of pounds worth of financial data.”

One thing that both reports do is to highlight two specific targets that hackers seem to be focusing on.

Firstly, findings from ‘Flipping the Economics of Attacks’ clearly show that because cyber-criminals are so concerned with how long an attack takes to carry-out, organizations whose security infrastructure is deemed to be ‘less mature’ are at greater risk as they can be breached quicker. In contrast, companies that take active steps to share threat intelligence with peers, adopt a prevention-first approach and invest in appropriate technologies that slow the progress of cyber-breaches are far more likely to avoid becoming victims of an attack.

Moving on to the article by the Financial Times, we can also see that hackers are using inventive techniques to pinpoint wealthy individuals, often cloning their email addresses and fraudulently instructing for money to be moved from one account to another. Therefore, people working within board-level roles should be mindful of the amount of information they share on sites like LinkedIn.

Whatever their motivation, cyber-hackers are becoming more sophisticated in their techniques and the prevalence of attacks appears to be on the rise.
 
Flower added:
“It is safe to say that this is a battle that isn’t going to be won any time soon but if cyber-criminals are able to exploit human vulnerabilities for ‘quick wins’, IT needs to step in and provide safeguards that allow for human weakness.”

InforSecurity: http://bit.ly/20QaVy2

« The Blockchain Will Change The Property Business
Barely A Third of Energy Companies Track Cyber Threats »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.