SlideShare a Scribd company logo
1 of 14
Download to read offline
Introduction
• Understanding the different types of
hackers, what motivates them, and the
malware they use can help you identify and
defend yourself and your organization.
• Hackers have matured since the days of
pulling juvenile pranks like popup windows
of annoying songs that you couldn’t shut off.
• As computers have evolved into a necessary
part of the economy, hackers have evolved
out of those wide-eyed nerds into an army
of criminals.
Introduction
• Computers are no longer games, and
hackers are no longer playing around.
• Today’s hackers are skilled professionals
with serious jobs.
• They are paid well, have human resource
teams, and take holidays off.
• You may wonder, what are those jobs?
• The hacker employee profile is as diverse as
the ways people earn money or power, but
they fall, roughly, into 10 basic types.
1. The bank robber
Once there were bank robbers who
rode horses and pointed guns as
they stole money from banks,
travelers, merchants and anyone
offering an easy target.
Today's financial hackers ride into
town on ransomware and use fake
invoices, dating scams, fake checks,
fake escrow intermediaries, denial-
of-service attacks, and any other
scam or hack that will help them
steal money from company’s banks
and stock accounts.
2. The nation-state
• Today, most sophisticated nations have tens of thousands of skilled hackers on the payroll.
• Their job? Sneak behind enemy lines at other nations’ military and industrial networks to map assets and install malicious back
doors.
• These are just the big stories. Nation-state hacking happens all the time, mostly quietly, and it isn’t going anywhere.
• The attacking nation certainly won’t do anything to prevent it or punish the hackers because they are soldiers doing their job to
further that country’s objectives.
3. The corporate spy
• For many hackers, a day in the office
involves stealing corporate intellectual
property, either to resell for personal
profit or to further the objectives of the
nation state that employs them.
• A common type of corporate espionage is
to steal secret patents, future business
plans, financial data, contracts, health
data, and even the notes of legal disputes.
• Anything that gives competitors a leg up
on the hacked organization is fair game.
4. The professional hacking group for hire
• This is a relatively recent phenomenon where a group of expert hackers develop, buy or steal powerful malware and
offer advanced-persistent-threat services to target their skills and tools for a fee.
• The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property.
• Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to
resell what the hackers steal.
5. The rogue gamer
• For millions of people, gaming is a serious business.
• It has spawned an industry that’s worth billions of dollars.
• The gaming industry has its own specialized hackers.
• They steal their competitors' credit caches or cause anti-competitive distributed denial-of-service
attacks.
6. Cryptojackers
• Harnessing other people’s computing power is a trick that hackers, and
legitimate endeavors, have used since computers first started landing on a
desk.
• It is where hackers use other people’s hard drives to store large files such
as videos.
7. The hacktivists
• Hackivists use hacking to make
a political statement or
promote social change.
• They either want to steal
embarrassing information from
a victim company, cause
operational issues for the
company, or wreak havoc that
will cost the victim company
money or bring attention to the
hacktivist’s cause.
8. The botnet masters
• Many malware coders create bots to be sent
out into the world to infect as many
computers as they can.
• The goal is to form large botnet armies that
will do their evil bidding.
• Once your computer becomes their minion, it
sits waiting for instruction from its master.
• These instructions usually come from
command-and-control servers.
• The botnet can be used directly by the
botnet creator but more often that master
rents it out to whoever wants to pay.
• According to some experts, one-fifth of the
world’s computers have been part of a
botnet army.
9. The adware spammer
• You’re lucky if your company
is only compromised by a spam malware
program or your browser is only hijacked
by an adware program that is looking to
sell you something.
• Adware works by redirecting your browser
to a site you did not intend to go to.
• Perhaps you were searching for “car
rental” and the adware program sent you
instead to “vacation discounts.”
• Spam and adware might not seem like a
huge threat, but it can be a symptom of a
serious system leak.
10. The thrill hacker
• Most hackers work with a financial goal in mind with malicious motives or are trying to achieve a political goal.
• A class of hacker remains who is in it for the thrill.
• They may want to demonstrate what they can do.
• There are not as many thrill seekers anymore because hacking, whatever the motives, breaks laws and
prosecution is a real possibility.
TAKE ACTION!
With all these threats in the cyber world
you need an experienced cybersecurity
team on your side with artificial
intelligence, behavioral detection, and a
24/7 security operation center, Data
Guard 365 has proven to be the answer
to stopping threats that would otherwise
harm your organization.
Contact Us Today!
Tel: +1 317-967-6767

More Related Content

Similar to 10 types of_hackers

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and CybercriminalsAshikur Rahman
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 

Similar to 10 types of_hackers (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

10 types of_hackers

  • 1.
  • 2. Introduction • Understanding the different types of hackers, what motivates them, and the malware they use can help you identify and defend yourself and your organization. • Hackers have matured since the days of pulling juvenile pranks like popup windows of annoying songs that you couldn’t shut off. • As computers have evolved into a necessary part of the economy, hackers have evolved out of those wide-eyed nerds into an army of criminals.
  • 3. Introduction • Computers are no longer games, and hackers are no longer playing around. • Today’s hackers are skilled professionals with serious jobs. • They are paid well, have human resource teams, and take holidays off. • You may wonder, what are those jobs? • The hacker employee profile is as diverse as the ways people earn money or power, but they fall, roughly, into 10 basic types.
  • 4. 1. The bank robber Once there were bank robbers who rode horses and pointed guns as they stole money from banks, travelers, merchants and anyone offering an easy target. Today's financial hackers ride into town on ransomware and use fake invoices, dating scams, fake checks, fake escrow intermediaries, denial- of-service attacks, and any other scam or hack that will help them steal money from company’s banks and stock accounts.
  • 5. 2. The nation-state • Today, most sophisticated nations have tens of thousands of skilled hackers on the payroll. • Their job? Sneak behind enemy lines at other nations’ military and industrial networks to map assets and install malicious back doors. • These are just the big stories. Nation-state hacking happens all the time, mostly quietly, and it isn’t going anywhere. • The attacking nation certainly won’t do anything to prevent it or punish the hackers because they are soldiers doing their job to further that country’s objectives.
  • 6. 3. The corporate spy • For many hackers, a day in the office involves stealing corporate intellectual property, either to resell for personal profit or to further the objectives of the nation state that employs them. • A common type of corporate espionage is to steal secret patents, future business plans, financial data, contracts, health data, and even the notes of legal disputes. • Anything that gives competitors a leg up on the hacked organization is fair game.
  • 7. 4. The professional hacking group for hire • This is a relatively recent phenomenon where a group of expert hackers develop, buy or steal powerful malware and offer advanced-persistent-threat services to target their skills and tools for a fee. • The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property. • Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to resell what the hackers steal.
  • 8. 5. The rogue gamer • For millions of people, gaming is a serious business. • It has spawned an industry that’s worth billions of dollars. • The gaming industry has its own specialized hackers. • They steal their competitors' credit caches or cause anti-competitive distributed denial-of-service attacks.
  • 9. 6. Cryptojackers • Harnessing other people’s computing power is a trick that hackers, and legitimate endeavors, have used since computers first started landing on a desk. • It is where hackers use other people’s hard drives to store large files such as videos.
  • 10. 7. The hacktivists • Hackivists use hacking to make a political statement or promote social change. • They either want to steal embarrassing information from a victim company, cause operational issues for the company, or wreak havoc that will cost the victim company money or bring attention to the hacktivist’s cause.
  • 11. 8. The botnet masters • Many malware coders create bots to be sent out into the world to infect as many computers as they can. • The goal is to form large botnet armies that will do their evil bidding. • Once your computer becomes their minion, it sits waiting for instruction from its master. • These instructions usually come from command-and-control servers. • The botnet can be used directly by the botnet creator but more often that master rents it out to whoever wants to pay. • According to some experts, one-fifth of the world’s computers have been part of a botnet army.
  • 12. 9. The adware spammer • You’re lucky if your company is only compromised by a spam malware program or your browser is only hijacked by an adware program that is looking to sell you something. • Adware works by redirecting your browser to a site you did not intend to go to. • Perhaps you were searching for “car rental” and the adware program sent you instead to “vacation discounts.” • Spam and adware might not seem like a huge threat, but it can be a symptom of a serious system leak.
  • 13. 10. The thrill hacker • Most hackers work with a financial goal in mind with malicious motives or are trying to achieve a political goal. • A class of hacker remains who is in it for the thrill. • They may want to demonstrate what they can do. • There are not as many thrill seekers anymore because hacking, whatever the motives, breaks laws and prosecution is a real possibility.
  • 14. TAKE ACTION! With all these threats in the cyber world you need an experienced cybersecurity team on your side with artificial intelligence, behavioral detection, and a 24/7 security operation center, Data Guard 365 has proven to be the answer to stopping threats that would otherwise harm your organization. Contact Us Today! Tel: +1 317-967-6767