HACKER PROFILES DIFFERENT TYPE


The bad guys behind the latest cyber security attacks get up close and personal with these hacker personalities. Learn to recognize them and protect your cyber-data.

Hacktivist Anonymous
My Motives: Disrupting the status quo, seeking virtual mischief and mayhem to make a point to the governments and large corporations, freeing terrorists, vigilante-ism, boxing, cyber protest, anarchy, fun.
My Boss: Myself and what I believe in, totally decentralized
My comrades: 4chan, Anonymous, Lulzsec, AntiSec
My Tools: Web application attacks using freely available tools
My Favorite Beverage: Energy Drinks
My Methods: I use freely available script kiddie’s tools to launch DDoS attacks or web application attacks to try to hijack a legitimate website or steal data.
My Street Cred: I was responsible for 58% of all data theft in 2011, but in 2012 my fellow hackers foot a bigger piece of the pie
My Hero: Guy Franks, the face of Anonymous hacker group

My Claims to Fame:  Project chorology, Operation payback Arab spring activities, operation HBGary, operation ouraborus, operation Sony operation Megaupload, just to name a few.

CYBER CRIMINAL
My Motives: Identity theft, credit card information, extortion (via ransoware or DDos), click-jacking, pirating software, monetizing computer data in any way possible
My Boss:  My financier, a traditional criminal organization that has decided to recruit tech savvy kids
My comrades: Other cyber criminals in the underground market, where we swap hacking kits
My Tools: Exploit kits sold on underground internet (or darknet) markets and forums and tools I also buy and sell prepackaged botnets and botnet modules
My Favorite Beverage: Vodka
My Methods: I prefer web-based drive-by downloads, ransoware and fakeware, and can even use my victims to attack others
My Street Credit: I took $20.7 billion from consumers last year
My Hero: Albert Gonzalez, who stole over 170 million credit and debit card numbers in two years 
My Claims to Fame: I recently completed a global bank heist, stealing about $45 million from ATMs 

NATIONS STATE CYBER SECURITY
My Motives: Obtaining intelligence form my foes, cyber espionage, stealing secrets from my adversaries, disrupting or damaging an enemy’s military infrastructure, propaganda, distracting an enemy during a real attack
My Boss: My government
My comrades: I only trust a few people within my government organization
My Tools: Customized, advanced malware and toolsets designed for a very specific goal (i.e. Stuxnet, Flame, and Gauss)
My Favorite Beverage: A martini – shaken, not stirred
My Methods: Advanced persistent threats, zero days exploits, rootkit technology, strong encryption, and malware customized for non-traditional computing systems
My Street Cred: IN the Aurora attacks of 2009. I introduced the watering hole attack and hole targeted over 30 large companies including Google
My Hero: UglyGorilla (real name: Jack wang)
My Claims to Fame:  Google Aurora attacks, New York Times hack, and other classified security breaches

Share this

Related Posts

Previous
Next Post »