Abstract
In this chapter we analyze the motivation of cybercriminals by systematizing empirical evidence from hackers’ direct speech. We conjecture that while the hackers of the past were primarily motivated by intellectual curiosity, at the beginning of the 21st century the goals of contemporary cybercriminals shifted toward obtaining financial benefits. We provide a comprehensive topology of cybercriminals as well as their business models. We also consider cybercriminal ecosystems and the way they function. Finally, we consider costs versus benefits of engaging into cybercriminal activity and look at factors which may discourage adversaries from committing unlawful acts.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See https://hackstory.net/Captain_Zap for more information.
- 2.
See https://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story/ for more detail.
- 3.
Many studies rely on “self-reported” hacker data—i.e., on reports from people who would classify themselves as “hackers”. We wanted to avoid any biases which such self-reported samples could bring and concentrated only on the direct speech of convicted or confirmed (verified) hackers.
- 4.
- 5.
See https://wccftech.com/australia-us-uk-russia-notpetya/ for more detail.
- 6.
See https://www.bbc.co.uk/news/business-34743185 for more detail.
- 7.
Note that some script kiddies do engage in for-profit hacking, yet the majority of them tend to do this out of intellectual curiosity.
- 8.
See https://archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt for more detail.
- 9.
See https://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/curador.html for more detail.
- 10.
See https://www.zdnet.com/article/hacker-gigabyte-angered-by-stereotypes/ for more detail.
- 11.
See https://www.fbi.gov/investigate/cyber for more detail.
- 12.
See https://www.justice.gov/opa/file/896326/download for more detail.
- 13.
See http://web.mit.edu/smadnick/www/wp/2017-09.pdf for more detail.
- 14.
- 15.
- 16.
See https://www.wired.com/2010/03/jethro-sentencing/ for more detail.
- 17.
See https://www.wired.com/2013/04/stephen-watt-stalked-by-past/ for more detail.
- 18.
- 19.
This diagram is constructed based on James Verni’s (2010) depiction of the case published in the New York Times magazine: https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html.
- 20.
- 21.
We omit the case of Captain Zap from the analysis as he was convicted on theft charges, and start with the case of Wondra (from the 414s), who were convicted for phone phreaking.
- 22.
Obviously, potential conviction is not the only cost for cybercriminals. Time and the complexity of the target are also important factors. We will consider these factors later in the book.
- 23.
Hamza Bendelladj (aka BX1, Smiling Hacker) and Alexander Panin (aka Gribodemon) attacked over 50 million computers globally with the RimiG33k virus, which allowed them to steal banking information from infected computers. As a result of their activities, $280 million from compromised accounts were transferred to a number of Palestinian NGOs.
- 24.
Cameron LaCroix (aka camo, cam0, camZero, cmuNNY) is a repeatedly convicted felon who was first detained as a teenager on hacking charges and sentenced to 11 months in a federal juvenile detention facility in 2005. He is primarily known for hacking into the telephone of Paris Hilton, as well as breaking into the systems of LexisNexis.
- 25.
There are 42 hackers on the FBI’s most-wanted list https://www.fbi.gov/wanted/cyber.
- 26.
See https://media.paloaltonetworks.com/lp/ponemon/report.html for more detail.
- 27.
References
Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists, 72(5), 284–291.
Vatis, M. A. (2000). Statement on Cybercrime before the Senate Judiciary Committee, Criminal Justice Oversight Subcommittee and House Judiciary Committee, Crime Subcommittee. Washington, DC: US Department of Justice, 29.
Denning, D. (2001). Is cyber terror next? Understanding September, 11, 191–197.
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy (pp. 239, 288). Santa Monica: RAND Corporation.
Coleman, G. (2014, November 4). Hacker, hoaxer, whistleblower, spy: The many faces of anonymous. London and New York: Verso Books.
Denning, D. (2000, Autumn). Cyberterrorism: The logic bomb versus the truck bomb. Global Dialogue, 2(4). Archived from the original on 27 June 2013. Retrieved 20 August 2014.
Holt, T. J., & Schell, B. H. (2010). Corporate hacking and technology-driven crime: Social dynamics and implications (p. 146). Hershey: IGI Global.
Parikka, J. (2007). Digital contagions: A media archaeology of computer viruses (p. 145). New York: Peter Lang.
Salomon, D. (2005). Foundations of computer security (p. 43). London: Springer Verlag. https://doi.org/10.1007/1-84628-341-8.
Bocij, P. (2006). The dark side of the internet (p. 57). Westport, CT: Praeger.
Szor, P. (2005). The art of computer virus research and defense. Reading: Addison-Wesley.
Holt, T. J., & Schell, B. H. (2013). Hackers and hacking: A reference handbook (p. 31). Santa Barbara: ABC-CLIO.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Pogrebna, G., Skilton, M. (2019). A Sneak Peek into the Motivation of a Cybercriminal. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-13527-0_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-13526-3
Online ISBN: 978-3-030-13527-0
eBook Packages: Business and ManagementBusiness and Management (R0)