Cybercriminals have different goals and methods of action. In some cases, the user may not realize that an unauthorized person has access to his or her computer. But what does this intruder want? What is the point of getting into someone else’s computer?

1. Money

Money is what the vast majority of hackers do their black work for. 99% of viruses, Trojans, interceptors and phishing sites are created solely for profit. Hackers do not need your photos or correspondence, their goal is your passport data, account and card information, access to accounts related to money transactions, sms interception, etc. All this can be obtained by finding saved document scans on your computer, correspondence with the bank or finding a password to your personal cabinet.

To steal money, the hacker will not break the bank – there is too good a security system, an attempt to introduce it threatens to be instantly exposed. Instead, he will crack a few simple users and transfer money from their accounts. It is almost impossible to prove later that it was not you who did the operation. And it’s not difficult to bypass the confirmation of login via SMS, which many people rely on: it’s quite a deceptive way to install an interceptor program on the user’s phone, which will forward messages to the hacker that come to you with an access code.

Some hackers only steal data and then sell it to other attackers. So if you are hacked, it is likely that the hacking didn’t happen today but a few months ago.

2. Trial

A hacker is not necessarily a person who acts for financial gain. For some individuals, it is vital to prove to the world what they can do. This is how famous actors, warlords, athletes and… hackers are born. Hacking environments are also competitive. Hacking into defense is a kind of cybersport or sports programming. For some people it’s about writing unique software, for others it’s about pulling off a successful scam. But in all cases, the goal is the same – to do a certain action first. In a sense, there is a benefit from hackers: if it was not for hackers with high CSVs, organizations would not know in time about security holes. However, this, of course, does not exempt from criminal liability.

3. Revenge and the desire to expose

Anonymous, LulzSec, Lizard Squad and Fancy Bears are hacker groups that position themselves as fighters for justice. Their actions are mainly directed at large organizations.

In 2015, the group, which introduced itself as The Impact Team, stole email addresses and credit card data from Ashley Madison website users. The site provides short, confidential meetings for married men and married women. The stolen data was publicly reprimanded on DarkNet.

In 2016, Fancy Bears stole and published medical records of athletes in order to expose those who use drugs in competitions. It is believed that Fancy Bears are associated with the Russian security services, and their operation was a revenge for allowing Russian athletes to compete because of a doping scandal.

In 2016, a former Citibank employee was fined $80,000 and sent to prison after he removed almost 90% of the company’s data. The offender himself, 38-year-old Lennon Ray Brown, confessed to having done so after receiving negative feedback on his job from a senior manager.

4. Sync by honeybunny

Everyone has heard about mining, many people know that this activity requires expensive computer equipment. The more powerful it is, the more money it will earn. Not everyone can afford to buy expensive processors and video cards, and therefore it is easier to use someone else’s machine than to collect their own. Implemented in your computer malware can use its power for mining, only the income will be earned by someone else. At the same time, you will see the constant “brakes” and CPU load at 100%.

You do not have to be an important person to be a victim of hacking. So how do you protect yourself? The safest way is to cut the Internet cable, disconnect your smartphone and never go online again. Well, seriously, once in the age of the Internet, we can not live without communication, we must constantly keep ourselves informed of new schemes of shenanigans and do not disregard the advice on security.

WARNING! All links in the articles may lead to malicious sites or contain viruses. Follow them at your own risk. Those who purposely visit the article know what they are doing. Do not click on everything thoughtlessly.


0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments

Do NOT follow this link or you will be banned from the site!
Would love your thoughts, please comment.x

Spelling error report

The following text will be sent to our editors: