What Motivates Cyber Criminals?

It is clear that most hackers are driven by financial gain. However, recent reports have revealed some contrasting findings in terms of how ‘big’ a gain they are either chasing or able to secure.

According to ‘Flipping the Economics of Attacks’ by Palo Alto Networks and the Ponemon Institute 67% of UK hackers admitted that money is their main incentive for their criminality, although the same research revealed that the average UK cyber-criminal makes just over £20,000 per year (an average of £8600 per attack). These are not excessive amounts of money and are lower than expected, especially when you consider a cybersecurity professional can earn up to four-times that much. This suggests that cyber-hackers are more likely to focus their efforts on quick, easy targets with realistic financial payouts.

After all, more than half (54%) of UK respondents said that it takes less than 24 hours for an experienced criminal to plan and carry-out an attack against an organization with a ‘typical’ IT security structure, with 60% admitting that if the time it takes to perform an attack were to increase by less than two days (40 hours), they would be deterred and move onto another target. Here are our first clues into how hackers work: they are opportunists who like to act quickly to target organizations with weak IT security infrastructures.

The Financial Times reporting a recent upsurge in the number of cyber-attacks carried out against the very wealthy and those who manage their own finances. According to the report, security group Kroll discovered hackers are using networking sites such as LinkedIn to search and identify people with significantly well-paid jobs and then targeting them with malicious attacks to trick them into transferring money.

This suggests a shift in technique, with hackers abandoning traditional mass-phishing exercises and focusing on specific targets. A possible reason for this is that it is becoming more common for people, especially pensioners, to have full access to their finances.

David Flower, MD EMEA, Carbon Black, told Infosecurity:
“It’s fair to say that both high net worth individuals and those that manage their wealth are at a significant risk from hackers. The individuals themselves will always represent an attractive target, particularly for phishing attacks on their endpoints. If a hacker gains access, they could find themselves with a wealth of blackmail material, or information that could let them gain access to funds, so they will always be an attractive and potentially weaker target – particularly if they hit their home server or desktop.”

Kroll investigated attacks that ranged in value from a few thousand pounds to multimillion-pound scams, with cyber-crime estimated to have cost the national economy in excess of £30 billion, figures that significantly contrast those put forward in ‘Flipping the Economics of Attacks’. So, here we have another insight into the minds of cyber-criminals which suggests that far from being satisfied with targeting simple IT infrastructures for small, quick profits many do harbor a desire to secure the elusive ‘big pay out’.
 
Whilst Flower agrees that the very wealthy are a key target for cyber-criminals, he also comments on risks surrounding the wider sphere of financial influence, explaining that brokers, financial advisors, and even personal assistants are also potential targets.

He says:
“By targeting non-executive staff within the wealth chain, whether a broker, or admin assistant, with a malicious email or similar, cyber-criminals can potentially gain access to a server and by extension, millions of pounds worth of financial data.”

One thing that both reports do is to highlight two specific targets that hackers seem to be focusing on.

Firstly, findings from ‘Flipping the Economics of Attacks’ clearly show that because cyber-criminals are so concerned with how long an attack takes to carry-out, organizations whose security infrastructure is deemed to be ‘less mature’ are at greater risk as they can be breached quicker. In contrast, companies that take active steps to share threat intelligence with peers, adopt a prevention-first approach and invest in appropriate technologies that slow the progress of cyber-breaches are far more likely to avoid becoming victims of an attack.

Moving on to the article by the Financial Times, we can also see that hackers are using inventive techniques to pinpoint wealthy individuals, often cloning their email addresses and fraudulently instructing for money to be moved from one account to another. Therefore, people working within board-level roles should be mindful of the amount of information they share on sites like LinkedIn.

Whatever their motivation, cyber-hackers are becoming more sophisticated in their techniques and the prevalence of attacks appears to be on the rise.
 
Flower added:
“It is safe to say that this is a battle that isn’t going to be won any time soon but if cyber-criminals are able to exploit human vulnerabilities for ‘quick wins’, IT needs to step in and provide safeguards that allow for human weakness.”

InforSecurity: http://bit.ly/20QaVy2

« The Blockchain Will Change The Property Business
Barely A Third of Energy Companies Track Cyber Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.