Cybercriminals have different goals and operate different methods. In some cases, the user may not realize that an unauthorized person has access to his computer. But what does this stranger want? What is the point of getting into someone else’s computer?
Money is what the vast majority of hackers do their black work for. 99% of viruses, trojans, interceptors and phishing sites are created solely for profit. Hackers don’t need your photos or correspondence, their goal is your passport details, account and card information, access to accounts related to money transactions, sms interception etc.. All this can be obtained by finding saved document scans on your computer, correspondence with the bank or finding a password to your personal cabinet.
To steal money, a hacker will not break the bank – there is too good a security system, an attempt to implement it threatens to be instantly exposed. Instead, he will crack several ordinary users and transfer money from their accounts. It is almost impossible to prove later that it was not you who performed the operation. And it is not difficult to bypass the confirmation of login via SMS, which many people rely on: it is enough to deceptively install an interceptor program on the user’s phone, which will forward to the hacker messages that come to you with an access code.
Some hackers only do this by stealing data and then selling it to other attackers. So if you are hacked, it is likely that the hacking did not happen today but a few months ago.
2. the test
A hacker is not necessarily a person who acts for financial gain. For some individuals it is vital to prove to the world what they are capable of. This is how famous actors, military leaders, athletes and… hackers are born. The hacker environment is also characterized by competition. Hacking into security is a kind of eSports or sports programming. For some people it is to write unique software, for others – to pull off a successful scam. But in all cases, the goal is the same – to do a certain action first. In a sense, there is a benefit from hackers: if it wasn’t for hackers with high CSVs, organizations wouldn’t know about security holes in time. However, this, of course, does not exempt from criminal responsibility.
3. revenge and the desire to expose
Anonymous, LulzSec, Lizard Squad and Fancy Bears are hacker groups that position themselves as fighters for justice. Their actions are aimed mainly at large organizations.
In 2015, the group, which introduced itself as The Impact Team, stole email addresses and credit card data from Ashley Madison website users. The site is dedicated to providing short, confidential meetings for married men and married women. The stolen data has been publicly reprimanded on DarkNet.
In 2016, Fancy Bears has stolen and published the data of medical records of athletes in order to expose those who use drugs in competitions. There is speculation that Fancy Bears are associated with the Russian security services, and their operation was a revenge for the admission of Russian athletes to competitions because of a doping scandal.
In the same 2016, a former Citibank employee was fined $80,000 and sent to prison after he removed nearly 90 percent of the company’s data. The offender himself, 38-year-old Lennon Ray Brown, admitted he did it after receiving negative feedback on his job from a senior manager.
Everyone has heard about mining, many people know that this activity requires expensive computer equipment. The more powerful it is, the more money it will earn. Not everyone can afford to buy expensive processors and video cards, so it is easier to use someone else’s machine than to collect your own. The malware introduced in your computer can use its power for mining, only the income will be generated by an unauthorized person. At the same time you will see the constant “brakes” and 100% CPU load.
You do not have to be an important person to be a victim of hacking. So how do you protect yourself? The safest way is to cut the Internet cable, disconnect your smartphone and never go online again. Well, seriously, once in the age of the Internet, we can’t live without communication, we must constantly keep ourselves informed about new schemes of fraud and not to disregard the security advice.