Articles by the cybersecurity community

Guest Post - Shelly Mills - Cyber crime - who is committing it?

Thanks to my colleague Shelly Mills  for writing this post on the people behind cybercrime.

Have you ever wondered who is responsible for data breaches, viruses, phishing scams, and so on?  

The people who are responsible for cyber security incidents are called Cyber Threat Actors. And the way in which they get to you is called an Attack Vector (examples of attack vectors include malware, social engineering, vulnerabilities in software – basically, any method Cyber Actors use to access data). 

So, who are the people carrying out cyber crimes?   

A few common cyber threat actors are detailed below.  

Hacktivists 

Who are they? Political activists that capatilise on the capabilities of the internet, and use technology to promote their agenda. Prominent examples are WikiLeaks and Anonymous.
Motivation: political.
Aim: Their aim is usually disruption, broadcasting information, and gaining attention for their cause.
Common attack vectors: Distributed Denial of Service (DDoS), website defacement.  

Nation-State Cyber Actors 

Who are they? Nation-State actors work for governments or receive direction/funding/assistance from nation-states.
Motivation: political, espionage, economic, military.
Aim:  steal industry information or research, gain information on another government/policy plans, disrupt critical infrastructure
Common attack vectors: Spear-phishing, social engineering, targeted malware 

Criminal Cyber Actors 

Who are they? Criminal cyber actors are, simply, criminals. They use the cybers to enable them to commit crime more efficiently and effectively. They may be lone wolves or work in groups, such as organised crime syndicates.
Motivation: financial gain.
Aim: use the internet to assist in committing their crime. 
Common attack vectors: Social engineering, phishing, Business Email Compromise (BEC), password attacks, malware, ransomware, botnets. 

....................................................................................................................................