hacker1
Security

Carl Leonard (Global) - The Cybercrime 'Five': Are All Hackers the Same? Part 1

The Cybercrime ‘Five' is a five-part series that will be published every Wednesday alongside our dailly post. 

Hacker is a term used to mean a variety of things over the years, and as a catch all name for ‘bad guys' perpetrating cybercrimes it's pretty well accepted. Most people are unaware that different meanings exist when we say hacker, and it would be reasonable to ask why should you care? However, in understanding the motivation and objective behind your ‘hacker' - you may be in a better position to plan an appropriate defence. Malicious hackers can be broken down in to 5 broad classifications, which we will explore in a series of ongoing posts. The first type we are going to explore is ‘Script kiddies'.

Script kiddies

filmclapWho: This group want in on the action. They are usually thought of as barely shaving malodorous teens, hacking late in to the night, drinking pop and eating giant bags of crisps. Remember the film "War Games"? Despite the fact that it's nearly 30 years later the resemblance is just as popular as ever. Often they break into computers using programs written by others, with very little knowledge about the way they work, other times they are flexing their newly formed cyber muscles.

Why: Because they can. These are not the hardened criminals of the cyber world - their primary motivation is not money - it's bragging rights. It's all about proving they have the skills or hacking for the sheer thrill of doing something naughty. At best they're a nuisance, at worst they are honing their CV for a future career in cybercrime.

What: In 2009 an 18-year-old hacker hijacked high-profile Twitter accounts, including Barack Obama, and Britney Spears. He gained entry to Twitter's administrative control panel by pointing an automated password-guesser at the account of a member of Twitter's support staff, giving him the ability to access any Twitter account by resetting the password. Realizing he hadn't used a proxy to hide his IP address, potentially making him traceable, he shared the knowledge with fellow hackers so they could hack the accounts instead.

We'll continue to look at other types of hackers in future posts. Stay tuned for more insights in the coming days.

By Carl Leonard, Senior Security Researcher, Websense Security Labs

 

PREVIOUS ARTICLE

« Wolfgang Nagele (Middle East) - Net Performance Prohibits Lack of Peering

NEXT ARTICLE

Hannah Bae (South Korea) - How Safe are Our Defenses Against North Korean Hackers? »

Recommended for You

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Amazon Cloud looms over China: Bezos enters Alibaba home ground

Lewis Page gets down to business across global tech

Poll

Do you think your smartphone is making you a workaholic?