blogs & Things

The Five Types Of Cyber Criminals

blogs & Things
wooden toy

Who Are they, Why The Diffrences Matter & How Your Organisation Can Protect Itself

What are the different types of Cyber Actors and how can you protect against them?

 

Although the term Cyber Criminal gets thrown around a lot most people don’t realise that a Cyber Criminal is only one heading in a much larger category of individuals and groups known as Cyber Actors.

What’s A Cyber Actor?

Cyber Actors can be both individuals or part of a much larger group; normally characterised by the desire to damage a person or organisations computers, devices, systems or networks (in short, not very nice people)!

The broader term of Cyber Actor can be used to stand for them all or often gets broken down into its five, distinct groups; with the different categories being defined by their motivations rather than tactics or tools they use.

Fortunately, that means strong Cyber Security protocols usually work the same against them all.

What Are Cyber Criminals?

The first, and most and common term used is Cyber Criminal.

No doubt you’ll have come across this before, may even have fallen victim to one of their scams in fact.

They tend to be motivated by profit and greed and all Cyber Security experts agree, they pose a very real and present danger to users everywhere.

Common tactics employed by Cyber Criminals involve the selling of illegally obtained data, disrupting systems and holding them for ransom (known as Denial of Service or D.O.S attacks) and other nefarious scams involved with phishing for data such as social engineering, business email compromise (BEC), botnets, brute force password attacks, exploit kits, malware, ransomware and unfortunately a lot, lot more.

What’s A Malicious Insider?

A malicious insider is at once the easiest and hardest of the categories to protect your organisation against.

They tend to be disgruntled (or just malicious) ex-employees, contractors, agencies or anyone else who may have had access to your systems, networks or data.

A Malicious Insider is best defined as someone who intentionally misuses or exceeds the access you’ve granted them, either for personal profit or in an attempt to hurt your organisation.

It should be pointed out that there is a clear difference between a ‘Malicious Insider’, acting in the full knowledge of what they’re doing, and an ‘Unwitting Insider’ accidently clicking on a link in a dodgy email.

 

Steps to combat against Malicious Insiders usually involve governance that instantly revokes the credentials of anyone after their business with your organisation is done as well as the changing of any joint passwords they may have had access to (although preferably your organisation wouldn’t have any joint passwords in the first place).

What Are Nation State Actors?

The vast majority of people need not worry about Nation State Actors as you’re unlikely to ever come to their attention, although in recent years you may have read in the news about Nation State Actors on social media trying to influence foreign elections and the like.

However, depending on the size of your organisation or it’s prominence within a geographic/political territory, you may wish to make specific Cyber Security plans against Nation State Actors as they can be very well funded, with a lot of resources at their disposal.

A Nation State Actor can be most easily recognised by their targeting of public and private sector networks in an attempt to compromise, steal, change or otherwise destroy data (espionage in other words) and being motivated by, political, economic or military ideologies.

They can be both a direct department of a nation state or just receive covert funding, direction or technical advice from one.

 

Some Cyber Security experts still use the term Nation State Actor interchangeably with Advanced Persistent Threats (APT’s) but APT tends to refer to a specific type of activity which can be conducted by a variety of different Cyber Actors as it’s normally defined as someone who’s gained long-term access to your system or network.

What’s A Hacktivist?

Hacktivists are individuals or groups that tend to have a lot of self-taught cyber skills behind them and can be best defined as ideologically motivated Cyber Criminals.

Rather than doing what they do out of a desire for personal gain though; they do it from a standpoint of political, social or ideological motivation; targeting both individuals or organisations whom they feel deserve their wrath.

Common methods used by Hacktivists will include Denial of Service attacks, doxing (the practice of researching and then publicly broadcasting private or identifying information about an individual or organization) and website defacements.

If your organisation works in a sector that inspires a lot of extreme feelings, on either side of the fence, then it’s well worth considering Hacktivist attacks in your Cyber Security strategies.

What Are Cyber Terrorists?

The final category of Cyber Actors are Cyber Terrorists.

Sometimes confused with Hacktivists, in reality a Cyber Terrorist is just another word for a terrorist. Whilst cyber attacks by terrorist organisations are become more common, their primary motivation online currently remains the dissemination of their ideologies and goals as well as the recruitment of new members.

 

The talent, knowledge, abilities and resources of the various different types of Cyber Actors can vary wildly, as can their motivations for targeting your organisation.

As part of your Cyber Security strategy you need to consider what you do, why you do it and what kind of Cyber Actor that may encourage to try and attack your organisation.

From there you can take steps in protecting your systems, networks and sensitive data.

If your primary goal is profit led, it stands to reason you’re more likely to attract the attention of a Cyber Criminal.

If you’re a Non-Profit organisation it may be you attract more hacktivist attacks.

 

All these things need to be considered when putting (or updating) your Cyber Security Protocols in place.

More blogs & Things

More blogs & Things


James Crossland in NonProfit

AI + Automation: Reducing Donor Churn & Maintaining Sponsor Interest

Churn management is a vital element of any marketing strategy, and the NonProfit sector is no exception. Knowing what to track and having a joined up view of all your donations data is vital for getting this right, and also opens the door to building innovative data-driven campaigns.   At our recent DataScience and Transformation in Charities […]


James Crossland in NonProfit

Dynamics 365 In NonProfit’s

Charities have unique funding concerns, and an obligation to spend as much as possible on their chosen cause. However, an investment in technology can offer ROI in the form of more than just improved fundraising. Dynamics 365 can help rework complex business processes, ensure compliance with stringent safeguarding and financial regulations, as well as consolidate […]


James Crossland in Tech

8 Ways Your Business Can Increase Turnover With Big Data

Understand how Big Data and Data Science can transform your business…   Big Data is the phrase that’s used to categorise any data that’s too large, complex, cumbersome or complicated to be managed and processed by conventional technology. To put that into a relatable context; being able to recommend your customers content, products or offers based […]


James Crossland in NonProfit

How To Reduce Donor Churn In NonProfits

Reducing Donor Churn doesn’t have to be a big task but does need to be a fundamental part of a NonProfit’s day to day processes   What Is Donor Churn? Donor Churn is the likelihood of an individual stopping their donations to a charitable cause for a variety of different reasons resulting in the non-profit organisation […]


James Crossland in Tech

Agile: Cutting Costs, Improving Quality & Accessing Talent

After using Agile to develop software products for several years, we thought we’d share the challenges we encountered at the start, what we did to change and the results we saw (which were ultimately uplifts in quality and efficiency)…   My development team has been using Agile to develop software product since 2007. Personally, I’ve seen many […]


James Crossland in Tech

UI VS UX

What’s the difference between UI and UX?   Simply put UI (or User Interface) are the pages, screens, buttons, icons and any other visual aspects of a website or App that let you interact with it… or to expand on that into the non-virtual world… UI is how you experience using something – For instance in opening a fridge, […]


Send us a Message






    Call cloudThing
    0121 393 4700
    DEVELOP • DYNAMICS • DEVOPS • DATA
    By pressing send you agree to our Terms & Conditions