{"id":517,"date":"2023-04-12T07:28:42","date_gmt":"2023-04-12T07:28:42","guid":{"rendered":"https:\/\/dataprot.net\/?p=517"},"modified":"2023-07-14T06:48:20","modified_gmt":"2023-07-14T06:48:20","slug":"who-are-cybercriminals","status":"publish","type":"post","link":"https:\/\/dataprot.net\/articles\/who-are-cybercriminals\/","title":{"rendered":"Who Are Cybercriminals? A Short Guide"},"content":{"rendered":"\n

Cybercrime is as old as the internet itself.<\/strong> From leaking the private photos of celebrities to penetrating the computer systems of the CIA and Pentagon, cybercriminals have been causing severe damage for decades, and most of them were never brought to justice<\/strong>. <\/p>\n\n\n\n

They act individually or are organized into groups. So, who are cybercriminals?<\/strong> Let\u2019s take a closer look at who these people are<\/strong>, what they do<\/strong>, and learn how to recognize and protect yourself from potential attacks.<\/strong><\/p>\n\n\n\n

What is Cybercrime? <\/h2>\n\n\n\n

Cybercrime refers to criminal activity using computers or the internet<\/strong>. These illegal operations range from extortion to complete disruption of the computer systems<\/strong>, and hardly anyone is safe: cybercriminals target individuals, businesses, and governments<\/strong>. As computers and the internet became vital elements in everyday life, these attacks have become more common. Experts even predict that around 33 billion accounts will be breached in 2023<\/a>.<\/p>\n\n\n\n

It\u2019s generally wise to work on prevention<\/strong> because the perpetrators are hard to identify once the attack happens. Investing in a reliable antivirus would be a great first step<\/strong>. <\/p>\n\n\n\n

Who Are Cybercriminals?<\/h2>\n\n\n\n

The stereotypical mysterious figure with a hoodie we can see in pop culture is usually a young, introverted man who spends most of his time in front of a computer. However, the actual demographics of cybercriminals are far more diverse<\/strong>. Cybercriminals come from various backgrounds and demographics all around the world<\/strong>. <\/p>\n\n\n\n

Some of the most notorious attackers were teenagers<\/strong>, while others were people over forty. Although men dominate the cybercriminal world<\/strong>, some female hackers are just as impactful<\/strong>, such as Kim Vanvaeck, also known as Gigabyte. <\/p>\n\n\n\n

Their motives are not always money<\/strong>. Many want to gain system access or corporate data at big companies<\/strong>. While sometimes the information they\u2019re after is used for crimes such as espionage<\/strong>, some of them simply want power<\/strong>, glory<\/strong>, and influence<\/strong>. Naturally, there are different types of computer crimes, and we\u2019ll discuss them later in the article. <\/p>\n\n\n\n

The Most Famous Hackers<\/h2>\n\n\n\n

These hackers have been building their reputation for decades. In the beginning, some only wanted to show off their skills<\/strong>, and many were \u2018hacktivists.\u2019<\/strong> A large number of them now have lucrative careers as IT experts or consultants<\/strong>.  Let\u2019s see who they are and what they became famous for.<\/p>\n\n\n\n

    \n
  1. Albert Gonzales<\/strong> – Debit card fraud. Payment card account theft from corporations. <\/li>\n\n\n\n
  2. ASTRA <\/strong>– They have been hacking into the Dassault group for more than five years and have famously stolen the company’s weapon software only to sell it later. ASTRA\u2019s identity remains unknown. <\/li>\n\n\n\n
  3. Kevin Mitnick<\/strong> – Stole computer manuals from Pacific Bell. He hacked the North American Defense Command and the Digital Equipment Corporation. Some say that Mitnick committed these internet crimes only to highlight the system\u2019s weakness.<\/li>\n\n\n\n
  4. Jeanson Jean Ancheta<\/strong> – Wanted to explore bots, so he hacked around 400,000 computers using botnets.<\/li>\n\n\n\n
  5. Michael Calce<\/strong> – Disrupted Amazon, Yahoo, CNN, and Dell using DDoS attacks. <\/li>\n\n\n\n
  6. Richard Pryce and Matthew Bevan<\/strong> – Hacked into military networks. Reason? They wanted to prove aliens exist.<\/li>\n\n\n\n
  7. Kevin Poulsen<\/strong> – Hacked Pentagon and federal computers. Hacked a radio station and made sure he was the 102nd call so he could get a Porsche and prize money.<\/li>\n\n\n\n
  8. Adrian Lamo<\/strong> – Hacked into Yahoo and Reuters, and New York Times. After every computer crime, he would notify the media and those affected.<\/li>\n\n\n\n
  9. Jonathan James<\/strong> – Compromised the network of the US Department of Defense.<\/li>\n<\/ol>\n\n\n\n

    Famous Hacking Groups<\/h3>\n\n\n\n

    There were many notorious active hacking groups, some of which still act today. Most of them have only become known after some of their members got arrested<\/strong>. The following are some of the most infamous hacking collectives. Working in groups makes it easier to organize attacks and cover tracks<\/strong>, so different types of cybercriminals often join forces in penetrating some of the world\u2019s most secure systems.<\/p>\n\n\n\n

    The Legion Of Doom<\/h4>\n\n\n\n

    According to many, this is one of the most impactful groups in the history of hacking<\/strong>. It is most well-known for publishing the Hacker manifesto<\/strong>, which set standards for hackers worldwide and greatly influenced hacking culture<\/strong>. The movie Hackers<\/a> broadly referenced this manifesto. Some of the original members were Unknown Soldier, Lex Luthor, and King Blotto.<\/p>\n\n\n\n

    Anonymous<\/h4>\n\n\n\n

    Anonymous is perhaps the most famous hacking group today<\/strong>. Although they\u2019re very different from the Legion Of Doom, they enjoy a fair bit of popular support<\/strong>. Many people, however, consider them terrorists. Anonymous primarily targets politicians, governments, media outlets, and religious groups<\/strong>. They claim that their digital crimes are necessary to raise awareness of specific social justice issues. <\/p>\n\n\n\n

    The group launches attacks when they do not approve of political decisions or views of specific people or organizations<\/strong>. Anonymous mostly opt for DDoS (distributed denial-of-service) attacks, and they are decentralized with no clear command structure, making it harder for authorities to dismantle this group. By the time the victims report the online crime, they\u2019ve deleted their traces, and it is often too late to repair the damage. <\/p>\n\n\n\n

    One of the most influential Anonymous members was Hector \u2018Sabu\u2019 Monsegur, who was also one of the co-founders of LulzSec. This group cooperated with Anonymous several times and worked on its own for years, too. They were also involved with Julian Assange. <\/p>\n\n\n\n

    Masters of Deception<\/h4>\n\n\n\n

    This was another legendary group from New York<\/strong>, mostly known for hacking the phone companies<\/strong>. They decided on the name Masters Of Deception as a parody of Legion of Doom. It is believed that they disapproved of the direction in which LOD went. <\/p>\n\n\n\n

    The group strongly advocated the idea that people need to earn their stripes. Those who joined were required to demonstrate their hacking skills. Many members got arrested by the FBI after hacking the phone companies<\/strong>. So who are the cybercriminals behind this group? The original members were Julio Fernandez, Paul Stira, John Lee, Mark Abene, and Elias Ladopoulos. <\/p>\n\n\n\n

    The Chaos Computer Club <\/h4>\n\n\n\n

    CCC is Europe\u2019s most prominent hacking organization. They believe in free access to computers for everyone and work on pushing the governments to be more transparent<\/strong>. They are not known for large-scale wars. Instead, the point of their attacks is to expose computer systems’ flaws so that people can be more educated on this matter. Notable members were Wau Holland, Bernd Fix, Tim Pritlove, and Harald Welte. <\/p>\n\n\n\n

    Lizard Squad<\/h4>\n\n\n\n

    This black-hat<\/a> collective claimed that they launched a successful cyber attack on Malaysia Airlines. Moreover, they claim they once crashed Facebook<\/strong>. The group\u2019s main aim is to target game servers, usually through DDoS attacks<\/strong>. Some of the famous companies that fell prey to Lizard Squad were Playstation Networks, Xbox Live, League of Legends, and Destine. This group also claimed they temporarily disabled the internet in North Korea<\/strong>. Some of their known members were Vinnie Omari, Julius Kivim\u00e4ki, Bradley Jan Willem van Rooy, and Zachary Buchta.<\/p>\n\n\n\n

    Types of Attacks <\/h2>\n\n\n\n

    Specific attacks are launched depending on what kind of data is required from the victims. There are four most common attacks, some of which have sub-categories. <\/p>\n\n\n\n

    Cross-Site Request Forgery and Scripting<\/strong><\/h3>\n\n\n\n

    Cross-Site Request Forgery<\/strong> is done by taking the user\u2019s credentials, such as the IP address, and carrying out illegal activities while using a hidden identity. <\/p>\n\n\n\n

    Cross-site scripting<\/strong> works by injecting a code into the website’s pages<\/a>, which allows the attackers to compromise the machines and perform illegal activities such as cyber fraud or data breaches.<\/p>\n\n\n\n

    Social Engineering<\/h3>\n\n\n\n

    Social Engineering<\/strong> is a criminal activity in which the attacker deceives the user into giving them essential information. This can be done through regular conversation<\/strong>, email <\/strong>or SMS phishing<\/strong> (also known as smishing), or drive-by downloads<\/strong>. <\/p>\n\n\n\n

    Spear phishing<\/h4>\n\n\n\n

    While regular phishing attacks target many users<\/strong>, spear phishing is a focused attack on a particular person<\/strong>. Attackers study the victim, send emails impersonating their associates and simply ask for the information. If the victim doesn\u2019t check if that\u2019s someone they work with and simply hands over the data, it is often too late to do anything about it. You can end up being a victim of cyber theft quite easily these days<\/strong>. Luckily, spear phishing is typically reserved only for high-value targets such as company SEOs and upper management<\/strong>.<\/p>\n\n\n\n

    Drive-by Downloads<\/h4>\n\n\n\n

    Drive-by downloads<\/strong> end up on your computer while you\u2019re on a malicious website without you even knowing it or clicking on anything. This downloaded malware may lead to further hacking efforts and expose machines to long-term risk<\/strong>.<\/p>\n\n\n\n

    Malware<\/h3>\n\n\n\n

    Malware usually ends up on someone\u2019s computer as a seemingly ordinary file they want to download<\/strong>. Once your computer is infected, the perpetrator can change or delete files from the computer or even completely control it. Many cybercrime examples are based on malware<\/strong>, and there are several types of it built for different purposes.<\/p>\n\n\n\n

    For example, ransomware is a widespread type of online threat. It\u2019s malware that encrypts your files, and you won\u2019t be able to access them until you pay the required ransom<\/strong>. Very often, even after payment, the data might not be restored, so experts advise never paying cybercriminals and finding alternative ways of retrieving your data.<\/p>\n\n\n\n

    SQL Injection <\/h3>\n\n\n\n

    In this case, the attackers use SQL (Structured Query Language) code which gives them access to your device<\/strong>, where they can amend or delete data<\/strong>. This type of hacking usually involves giving users fake logins to fill out, at which point the hacker will get access to the system.<\/p>\n\n\n\n

    How To Protect Yourself<\/h2>\n\n\n\n

    If you fall prey to any sort of attack on the internet and your data is compromised, report the cybercrime to the authorities as soon as you can<\/strong>. Better still, do the following steps so that a hack will not happen in the first place:<\/p>\n\n\n\n

      \n
    • Back up your important data,<\/li>\n\n\n\n
    • Never disclose your personal information,<\/li>\n\n\n\n
    • Make sure to prevent others from accessing your devices without authorization,<\/li>\n\n\n\n
    • Train yourself to spot phishing attempts,<\/li>\n\n\n\n
    • Keep your PC up to date,<\/li>\n\n\n\n
    • Never use weak passwords or one-fits-all,<\/li>\n\n\n\n
    • Invest in anti-malware tools,<\/li>\n\n\n\n
    • Secure your systems with encryption.<\/li>\n<\/ul>\n\n\n\n

      Conclusion<\/h2>\n\n\n\n

      Cybercriminals are highly skilled<\/strong>, and part of their job is to hide their identities the best they can. Although they frequently go after specific individuals, groups, or governments, standard phishing and other malware attacks are often carried out on many users, so you can easily become a victim if you’re not careful<\/strong>. <\/p>\n\n\n\n

      Also, remember that answering the question \u201cWho are the best cybercriminals in the world?\u201d is, in a sense, impossible; the best of the best were never caught<\/strong>, so we have no idea who they might be.<\/p>\n","protected":false},"excerpt":{"rendered":"

      […]<\/p>\n","protected":false},"author":20,"featured_media":518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[3],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide.png",1280,720,false],"thumbnail":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide-150x150.png",150,150,true],"medium":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide-300x169.png",300,169,true],"medium_large":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide-768x432.png",768,432,true],"large":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide-1024x576.png",1024,576,true],"1536x1536":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide.png",1280,720,false],"2048x2048":["https:\/\/dataprot.net\/wp-content\/uploads\/2023\/04\/Who-Are-Cybercriminals-A-Short-Guide.png",1280,720,false]},"uagb_author_info":{"display_name":"Nikolina Cveticanin","author_link":"https:\/\/dataprot.net\/author\/nikolina-cveticanin\/"},"uagb_comment_info":0,"uagb_excerpt":"[…]","_links":{"self":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/517"}],"collection":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":2,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/517\/revisions"}],"predecessor-version":[{"id":2473,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/posts\/517\/revisions\/2473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/media\/518"}],"wp:attachment":[{"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/media?parent=517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/categories?post=517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dataprot.net\/wp-json\/wp\/v2\/tags?post=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}