SlideShare a Scribd company logo
1 of 14
Download to read offline
Introduction
• Understanding the different types of
hackers, what motivates them, and the
malware they use can help you identify and
defend yourself and your organization.
• Hackers have matured since the days of
pulling juvenile pranks like popup windows
of annoying songs that you couldn’t shut off.
• As computers have evolved into a necessary
part of the economy, hackers have evolved
out of those wide-eyed nerds into an army
of criminals.
Introduction
• Computers are no longer games, and
hackers are no longer playing around.
• Today’s hackers are skilled professionals
with serious jobs.
• They are paid well, have human resource
teams, and take holidays off.
• You may wonder, what are those jobs?
• The hacker employee profile is as diverse as
the ways people earn money or power, but
they fall, roughly, into 10 basic types.
1. The bank robber
Once there were bank robbers who
rode horses and pointed guns as
they stole money from banks,
travelers, merchants and anyone
offering an easy target.
Today's financial hackers ride into
town on ransomware and use fake
invoices, dating scams, fake checks,
fake escrow intermediaries, denial-
of-service attacks, and any other
scam or hack that will help them
steal money from company’s banks
and stock accounts.
2. The nation-state
• Today, most sophisticated nations have tens of thousands of skilled hackers on the payroll.
• Their job? Sneak behind enemy lines at other nations’ military and industrial networks to map assets and install malicious back
doors.
• These are just the big stories. Nation-state hacking happens all the time, mostly quietly, and it isn’t going anywhere.
• The attacking nation certainly won’t do anything to prevent it or punish the hackers because they are soldiers doing their job to
further that country’s objectives.
3. The corporate spy
• For many hackers, a day in the office
involves stealing corporate intellectual
property, either to resell for personal
profit or to further the objectives of the
nation state that employs them.
• A common type of corporate espionage is
to steal secret patents, future business
plans, financial data, contracts, health
data, and even the notes of legal disputes.
• Anything that gives competitors a leg up
on the hacked organization is fair game.
4. The professional hacking group for hire
• This is a relatively recent phenomenon where a group of expert hackers develop, buy or steal powerful malware and
offer advanced-persistent-threat services to target their skills and tools for a fee.
• The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property.
• Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to
resell what the hackers steal.
5. The rogue gamer
• For millions of people, gaming is a serious business.
• It has spawned an industry that’s worth billions of dollars.
• The gaming industry has its own specialized hackers.
• They steal their competitors' credit caches or cause anti-competitive distributed denial-of-service
attacks.
6. Cryptojackers
• Harnessing other people’s computing power is a trick that hackers, and
legitimate endeavors, have used since computers first started landing on a
desk.
• It is where hackers use other people’s hard drives to store large files such
as videos.
7. The hacktivists
• Hackivists use hacking to make
a political statement or
promote social change.
• They either want to steal
embarrassing information from
a victim company, cause
operational issues for the
company, or wreak havoc that
will cost the victim company
money or bring attention to the
hacktivist’s cause.
8. The botnet masters
• Many malware coders create bots to be sent
out into the world to infect as many
computers as they can.
• The goal is to form large botnet armies that
will do their evil bidding.
• Once your computer becomes their minion, it
sits waiting for instruction from its master.
• These instructions usually come from
command-and-control servers.
• The botnet can be used directly by the
botnet creator but more often that master
rents it out to whoever wants to pay.
• According to some experts, one-fifth of the
world’s computers have been part of a
botnet army.
9. The adware spammer
• You’re lucky if your company
is only compromised by a spam malware
program or your browser is only hijacked
by an adware program that is looking to
sell you something.
• Adware works by redirecting your browser
to a site you did not intend to go to.
• Perhaps you were searching for “car
rental” and the adware program sent you
instead to “vacation discounts.”
• Spam and adware might not seem like a
huge threat, but it can be a symptom of a
serious system leak.
10. The thrill hacker
• Most hackers work with a financial goal in mind with malicious motives or are trying to achieve a political goal.
• A class of hacker remains who is in it for the thrill.
• They may want to demonstrate what they can do.
• There are not as many thrill seekers anymore because hacking, whatever the motives, breaks laws and
prosecution is a real possibility.
TAKE ACTION!
With all these threats in the cyber world
you need an experienced cybersecurity
team on your side with artificial
intelligence, behavioral detection, and a
24/7 security operation center, Data
Guard 365 has proven to be the answer
to stopping threats that would otherwise
harm your organization.
Contact Us Today!
Tel: +1 317-967-6767

More Related Content

Similar to 10 types of_hackers

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and CybercriminalsAshikur Rahman
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 

Similar to 10 types of_hackers (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

10 types of_hackers

  • 1.
  • 2. Introduction • Understanding the different types of hackers, what motivates them, and the malware they use can help you identify and defend yourself and your organization. • Hackers have matured since the days of pulling juvenile pranks like popup windows of annoying songs that you couldn’t shut off. • As computers have evolved into a necessary part of the economy, hackers have evolved out of those wide-eyed nerds into an army of criminals.
  • 3. Introduction • Computers are no longer games, and hackers are no longer playing around. • Today’s hackers are skilled professionals with serious jobs. • They are paid well, have human resource teams, and take holidays off. • You may wonder, what are those jobs? • The hacker employee profile is as diverse as the ways people earn money or power, but they fall, roughly, into 10 basic types.
  • 4. 1. The bank robber Once there were bank robbers who rode horses and pointed guns as they stole money from banks, travelers, merchants and anyone offering an easy target. Today's financial hackers ride into town on ransomware and use fake invoices, dating scams, fake checks, fake escrow intermediaries, denial- of-service attacks, and any other scam or hack that will help them steal money from company’s banks and stock accounts.
  • 5. 2. The nation-state • Today, most sophisticated nations have tens of thousands of skilled hackers on the payroll. • Their job? Sneak behind enemy lines at other nations’ military and industrial networks to map assets and install malicious back doors. • These are just the big stories. Nation-state hacking happens all the time, mostly quietly, and it isn’t going anywhere. • The attacking nation certainly won’t do anything to prevent it or punish the hackers because they are soldiers doing their job to further that country’s objectives.
  • 6. 3. The corporate spy • For many hackers, a day in the office involves stealing corporate intellectual property, either to resell for personal profit or to further the objectives of the nation state that employs them. • A common type of corporate espionage is to steal secret patents, future business plans, financial data, contracts, health data, and even the notes of legal disputes. • Anything that gives competitors a leg up on the hacked organization is fair game.
  • 7. 4. The professional hacking group for hire • This is a relatively recent phenomenon where a group of expert hackers develop, buy or steal powerful malware and offer advanced-persistent-threat services to target their skills and tools for a fee. • The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property. • Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to resell what the hackers steal.
  • 8. 5. The rogue gamer • For millions of people, gaming is a serious business. • It has spawned an industry that’s worth billions of dollars. • The gaming industry has its own specialized hackers. • They steal their competitors' credit caches or cause anti-competitive distributed denial-of-service attacks.
  • 9. 6. Cryptojackers • Harnessing other people’s computing power is a trick that hackers, and legitimate endeavors, have used since computers first started landing on a desk. • It is where hackers use other people’s hard drives to store large files such as videos.
  • 10. 7. The hacktivists • Hackivists use hacking to make a political statement or promote social change. • They either want to steal embarrassing information from a victim company, cause operational issues for the company, or wreak havoc that will cost the victim company money or bring attention to the hacktivist’s cause.
  • 11. 8. The botnet masters • Many malware coders create bots to be sent out into the world to infect as many computers as they can. • The goal is to form large botnet armies that will do their evil bidding. • Once your computer becomes their minion, it sits waiting for instruction from its master. • These instructions usually come from command-and-control servers. • The botnet can be used directly by the botnet creator but more often that master rents it out to whoever wants to pay. • According to some experts, one-fifth of the world’s computers have been part of a botnet army.
  • 12. 9. The adware spammer • You’re lucky if your company is only compromised by a spam malware program or your browser is only hijacked by an adware program that is looking to sell you something. • Adware works by redirecting your browser to a site you did not intend to go to. • Perhaps you were searching for “car rental” and the adware program sent you instead to “vacation discounts.” • Spam and adware might not seem like a huge threat, but it can be a symptom of a serious system leak.
  • 13. 10. The thrill hacker • Most hackers work with a financial goal in mind with malicious motives or are trying to achieve a political goal. • A class of hacker remains who is in it for the thrill. • They may want to demonstrate what they can do. • There are not as many thrill seekers anymore because hacking, whatever the motives, breaks laws and prosecution is a real possibility.
  • 14. TAKE ACTION! With all these threats in the cyber world you need an experienced cybersecurity team on your side with artificial intelligence, behavioral detection, and a 24/7 security operation center, Data Guard 365 has proven to be the answer to stopping threats that would otherwise harm your organization. Contact Us Today! Tel: +1 317-967-6767