Skip to main content

A Sneak Peek into the Motivation of a Cybercriminal

  • Chapter
  • First Online:

Abstract

In this chapter we analyze the motivation of cybercriminals by systematizing empirical evidence from hackers’ direct speech. We conjecture that while the hackers of the past were primarily motivated by intellectual curiosity, at the beginning of the 21st century the goals of contemporary cybercriminals shifted toward obtaining financial benefits. We provide a comprehensive topology of cybercriminals as well as their business models. We also consider cybercriminal ecosystems and the way they function. Finally, we consider costs versus benefits of engaging into cybercriminal activity and look at factors which may discourage adversaries from committing unlawful acts.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   37.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See https://hackstory.net/Captain_Zap for more information.

  2. 2.

    See https://www.theregister.co.uk/2003/01/13/chapter_one_kevin_mitnicks_story/ for more detail.

  3. 3.

    Many studies rely on “self-reported” hacker data—i.e., on reports from people who would classify themselves as “hackers”. We wanted to avoid any biases which such self-reported samples could bring and concentrated only on the direct speech of convicted or confirmed (verified) hackers.

  4. 4.

    See https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ for more detail.

  5. 5.

    See https://wccftech.com/australia-us-uk-russia-notpetya/ for more detail.

  6. 6.

    See https://www.bbc.co.uk/news/business-34743185 for more detail.

  7. 7.

    Note that some script kiddies do engage in for-profit hacking, yet the majority of them tend to do this out of intellectual curiosity.

  8. 8.

    See https://archive.org/stream/GuerillaOpenAccessManifesto/Goamjuly2008_djvu.txt for more detail.

  9. 9.

    See https://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/curador.html for more detail.

  10. 10.

    See https://www.zdnet.com/article/hacker-gigabyte-angered-by-stereotypes/ for more detail.

  11. 11.

    See https://www.fbi.gov/investigate/cyber for more detail.

  12. 12.

    See https://www.justice.gov/opa/file/896326/download for more detail.

  13. 13.

    See http://web.mit.edu/smadnick/www/wp/2017-09.pdf for more detail.

  14. 14.

    See http://www.isssource.com/classic-hacker-case-maroochy-shire/.

  15. 15.

    See https://www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon-trump for more detail.

  16. 16.

    See https://www.wired.com/2010/03/jethro-sentencing/ for more detail.

  17. 17.

    See https://www.wired.com/2013/04/stephen-watt-stalked-by-past/ for more detail.

  18. 18.

    See https://www.cnbc.com/2018/09/06/north-korean-hackers-will-be-charged-for-sony-pictures-wannacry-ransomware-attacks.html for more information.

  19. 19.

    This diagram is constructed based on James Verni’s (2010) depiction of the case published in the New York Times magazine: https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html.

  20. 20.

    http://www.nycrimecommission.org/pdfs/guns-prison-campaign.pdf.

  21. 21.

    We omit the case of Captain Zap from the analysis as he was convicted on theft charges, and start with the case of Wondra (from the 414s), who were convicted for phone phreaking.

  22. 22.

    Obviously, potential conviction is not the only cost for cybercriminals. Time and the complexity of the target are also important factors. We will consider these factors later in the book.

  23. 23.

    Hamza Bendelladj (aka BX1, Smiling Hacker) and Alexander Panin (aka Gribodemon) attacked over 50 million computers globally with the RimiG33k virus, which allowed them to steal banking information from infected computers. As a result of their activities, $280 million from compromised accounts were transferred to a number of Palestinian NGOs.

  24. 24.

    Cameron LaCroix (aka camo, cam0, camZero, cmuNNY) is a repeatedly convicted felon who was first detained as a teenager on hacking charges and sentenced to 11 months in a federal juvenile detention facility in 2005. He is primarily known for hacking into the telephone of Paris Hilton, as well as breaking into the systems of LexisNexis.

  25. 25.

    There are 42 hackers on the FBI’s most-wanted list https://www.fbi.gov/wanted/cyber.

  26. 26.

    See https://media.paloaltonetworks.com/lp/ponemon/report.html for more detail.

  27. 27.

    See https://www.internetgovernance.org/research/is-it-time-to-institutionalize-cyber-attribution/.

References

  1. Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists, 72(5), 284–291.

    Article  Google Scholar 

  2. Vatis, M. A. (2000). Statement on Cybercrime before the Senate Judiciary Committee, Criminal Justice Oversight Subcommittee and House Judiciary Committee, Crime Subcommittee. Washington, DC: US Department of Justice, 29.

    Google Scholar 

  3. Denning, D. (2001). Is cyber terror next? Understanding September, 11, 191–197.

    Google Scholar 

  4. Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy (pp. 239, 288). Santa Monica: RAND Corporation.

    Google Scholar 

  5. Coleman, G. (2014, November 4). Hacker, hoaxer, whistleblower, spy: The many faces of anonymous. London and New York: Verso Books.

    Google Scholar 

  6. Denning, D. (2000, Autumn). Cyberterrorism: The logic bomb versus the truck bomb. Global Dialogue, 2(4). Archived from the original on 27 June 2013. Retrieved 20 August 2014.

    Google Scholar 

  7. Holt, T. J., & Schell, B. H. (2010). Corporate hacking and technology-driven crime: Social dynamics and implications (p. 146). Hershey: IGI Global.

    Google Scholar 

  8. Parikka, J. (2007). Digital contagions: A media archaeology of computer viruses (p. 145). New York: Peter Lang.

    Google Scholar 

  9. Salomon, D. (2005). Foundations of computer security (p. 43). London: Springer Verlag. https://doi.org/10.1007/1-84628-341-8.

  10. Bocij, P. (2006). The dark side of the internet (p. 57). Westport, CT: Praeger.

    Google Scholar 

  11. Szor, P. (2005). The art of computer virus research and defense. Reading: Addison-Wesley.

    Google Scholar 

  12. Holt, T. J., & Schell, B. H. (2013). Hackers and hacking: A reference handbook (p. 31). Santa Barbara: ABC-CLIO.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganna Pogrebna .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pogrebna, G., Skilton, M. (2019). A Sneak Peek into the Motivation of a Cybercriminal. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_3

Download citation

Publish with us

Policies and ethics