{"id":13110,"date":"2018-08-15T07:10:03","date_gmt":"2018-08-15T15:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/15\/news-6877\/"},"modified":"2018-08-15T07:10:03","modified_gmt":"2018-08-15T15:10:03","slug":"news-6877","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/08\/15\/news-6877\/","title":{"rendered":"Under the hoodie: why money, power, and ego drive hackers to cybercrime"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 15 Aug 2018 14:00:00 +0000<\/strong><\/p>\n<p>Just one more hour behind the hot grill flipping burgers, and Derek* could call it a day. Under his musty hat, his hair was matted down with sweat, and his work uniform was spattered with grease. He knew he\u2019d smell the processed meat and smoke for the next three days, even after he\u2019d showered. But it was money, he supposed.<\/p>\n<p>\u201cDerek!\u201d His manager slapped him on the shoulder. \u201cA little bird told me you were good with computers. I\u2019ve got a job for you, if you\u2019ll take it.\u201d<\/p>\n<p>The next day, with routers and cables bought and paid for by his manager, Derek networked his boss\u2019 entire home. After one hour of work, he was handed a crisp $100 bill. Derek made a quick calculation: He\u2019d have to put in three full shifts at the burger joint to take home the equivalent.<\/p>\n<p>Unfortunately, not all of Derek\u2019s clients had his manager\u2019s money. Like him, his classmates came from a modest middle-class background, and they often couldn\u2019t afford the latest video games, DVDs, and albums. But Derek had something not even his boss had: the ability to hack.<\/p>\n<p>Mostly, his classmates looked for video game hacks, like unlimited life, or access to boatloads of free music. Sometimes they needed expensive cables to set up LAN parties, and Derek could McGyver a cat-5 so that his friends only had to pay him $10, instead of the $50 they cost at Best Buy.<\/p>\n<p>Sometimes, Derek took on work that was a little more dangerous or challenging\u2014like scamming other scammers to get onto their networks and drop malware or redirecting browser traffic to personal eBay storefronts\u2014and he proved himself adept at this type of problem solving. Everyone knew Derek was the man to go to for these things\u2014and he liked that. What\u2019s not to like? Money, popularity, and a quiet \u201cscrew you\u201d to the man.\u00a0He was proud of his ability to hack into and modify programs built by professionals.<\/p>\n<blockquote>\n<p>\u201cThere was ego involved, of course. It was like, \u2018Ha! Look what I did that I wasn\u2019t supposed to be able to do,\u2019\u201d said Derek, who today works as an engineer at a security company, but sometimes still participates in less-than-legal activities online. \u201cSome 13-year-old kid just beat a 30-year-old programmer.\u201d<\/p>\n<\/blockquote>\n<p>Derek\u2019s hacking hobby soon became more than a pastime. The stars had aligned for him to step into the world of cybercrime.<\/p>\n<h3><strong>What makes a cybercriminal?<\/strong><\/h3>\n<p>Some of Derek\u2019s actions might sound familiar to those who tapped into the early, Wild West-esque days of the Internet. Pirating and counterfeiting music, video games, and DVDs was par for the course in the mid and late 1990\u2019s, until the Napster lawsuit and subsequent shutdown opened the nation\u2019s collective eyes to the fact that these actions were, in fact, unlawful.<\/p>\n<p>Today, we know better. Those who can game the system are called <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/10\/debunking-hacker-stereotypes-who-are-the-real-monsters\/\" target=\"_blank\" rel=\"noopener\">hackers<\/a>, and the term is often used interchangeably with cybercriminals. However, hackers are merely people who know how to use computers to gain access to systems or data. Many hackers do so with altruistic purpose, and they are called white hats.<\/p>\n<p>White hats are considered the good guys. They\u2019re experts in compromising computer systems, and they use their skills to help protect users and networks from a criminal breach. White hats often work as security researchers, network admins, or malware analysts, creating systems to capture and analyze malware, testing programs for vulnerabilities, and identifying weaknesses in companies\u2019 infrastructures that could be exploited and\/or infected. Their work is legal, sanctioned, and compensated (sometimes handsomely). But sometimes, even white hats can find themselves in compromising positions.<\/p>\n<div id=\"attachment_25179\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25179\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/attachment\/img_1938\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938.jpg\" data-orig-size=\"3264,2448\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.2&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;iPhone 5s&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1422705401&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;4.15&quot;,&quot;iso&quot;:&quot;64&quot;,&quot;shutter_speed&quot;:&quot;0.0333333333333&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"IMG_1938\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938-300x225.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938-600x450.jpg\" class=\"size-large wp-image-25179\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938-600x450.jpg\" alt=\"\" width=\"600\" height=\"450\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938-600x450.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/IMG_1938-300x225.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Good guys (and girl): The Malwarebytes intel team<\/em><\/p>\n<\/div>\n<p>Jared* got his start in IT as a technician, working at a mom-and-pop shop that he had frequented often when putting together his own machine. \u201cI was a computer hobbyist,\u201d he said. \u201cI bought and built my first one, and I kept going to the same store for parts. Eventually, I ended up working there.\u201d<\/p>\n<p>Jared built up his skills working in the shop, eventually moving up to enterprise work at a larger chain store. It was there that he was introduced to a software developer that was making an anti-malware product designed to rip spyware out of people\u2019s machines. He was hired on to add definitions (the code that helps antivirus programs detect malicious software).<\/p>\n<p>But soon, Jared started to sense that something was off. Despite the fact that the company owners kept departments siloed\u2014the user interface (UI) people didn\u2019t know what the product development people were doing, and none of them knew what the marketing people were up to\u2014Jared started asking uncomfortable, ethical questions in meetings that made him rather unpopular.<\/p>\n<blockquote>\n<p>\u201cI had the horse blinders on. I knew that there was stuff taking place that I was not comfortable with, and I chose to ignore it because it wasn\u2019t the product I was working on,\u201d he said. \u201cBut, that mental gymnastics got harder and harder and harder, until I finally realized that some aspects of the company I was working for were super scummy.\u201d<\/p>\n<\/blockquote>\n<p>What Jared came to realize after moving into a Q\/A position was that he was, in fact, working for a potentially unwanted program (PUP) maker\u2014a product created mostly to rip people off. He might not have been trying to participate in cybercrime, but he was complicit.<\/p>\n<p>Despite trying to fight the corruption from the inside, Jared was stuck. He needed this job to stay financially afloat. Finally, after six years at the company, he was actively looking for a new job in IT when he was approached by a legitimate security company\u2014and that\u2019s where he is today. His bosses at the PUP maker, however, knew exactly what they were doing. And that\u2019s why they\u2019re considered black hats.<\/p>\n<p>Black hats are the bad guys; the cybercriminals. They use a similar skill set as white hats, but their intentions are not to protect systems. Instead, they look to cause damage to their targets, whether that\u2019s stealing personal data for monetary gain or coordinating attacks on businesses for revenge. Black hats\u2019 criminal activity ranges from targeting individuals for state-sponsored espionage to widespread corporate breaches, and their efforts may be conducted from outside an organization or embedded within as an insider threat.<\/p>\n<p>But the world is not black and white. A third set of hackers exists between opposite ends of the moral spectrum, and they are known as gray hats. They may not be trying to cause intentional harm, but they\u2019re often operating outside the law. Gray hats might identify as cybervandals or rogue researchers, publicly announcing vulnerabilities to bring attention to a problem. For example, a gray hat could compromise a system without an organization\u2019s permission, but then inform the organization after the fact in order to help them fix the problem. You might consider Jared a gray hat during his tenure at the PUP maker, even though he entered and left the establishment with the best of intentions.<\/p>\n<p>What sets a cybercriminal apart from a security researcher, then, comes down to motive. Ethical hackers look to improve the security of software programs to protect users and their online experiences, whereas cybercriminals seek to undermine the integrity of those systems and programs for their own gain. It\u2019s <em>why<\/em> people hack that shapes the nature of their being.<\/p>\n<h3><strong>Putting together the profile <\/strong><\/h3>\n<p>Without knowing the identity of cybercriminals (as most do a good job of covering their tracks), criminal profiling becomes a useful tool to begin drawing more accurate pictures of the people behind the proverbial hoodies.<\/p>\n<p>Criminal profiling is a psychological assessment that includes personality and physical characteristics. &#8220;Fitting the profile&#8221; doesn&#8217;t necessarily mean a person committed the crime, but it can help narrow the field of suspects and exclude others from suspicion. Profilers use both inductive profiling (statistical data involving known behavioral patterns and demographic traits) and deductive profiling (common sense testing of hypotheses related to forensics, crime scene evidence, and victimology) to create personas of criminals. They are then able to identify criminals based on an analysis of their behavior while they engage in the crime.<\/p>\n<p>Online, however, gathering this type of data can be <a href=\"http:\/\/www.newsecuritylearning.com\/index.php\/archive\/150-the-need-for-a-comprehensive-methodology-for-profiling-cyber-criminals\" target=\"_blank\" rel=\"noopener\">nearly impossible<\/a>. How can criminal profilers identity the crime scene, for example, when a victim might not even know how, when, or where he was infected?<\/p>\n<p>According to <a href=\"http:\/\/www.cio.in\/article\/profile-cyber-criminal\" target=\"_blank\" rel=\"noopener\">an article in CIO<\/a>, criminal profiling has a success rate of 77 percent in assisting traditional investigations. Unfortunately, no such headway has been made for cybercrime. Instead, both corporate and individual would-be victims rely on a combination of cybersecurity awareness (aka street smarts for computers) and technologies to prevent the crime from happening in the first place. These technologies include firewalls, encryption, two-factor authentication, antivirus, and other more advanced forms of cybersecurity software.<\/p>\n<p>And while technology has been the main defense against cyberattacks, <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/the-art-of-profiling-cybercriminals\/d\/d-id\/1136783\" target=\"_blank\" rel=\"noopener\">experts say<\/a> a better understanding of the psychological, criminological, and sociological side of the equation can help fortify protection and possibly catch thieves in the act.<\/p>\n<blockquote>\n<p>\u201cThose that get caught never invest in sensible growth funds or get their families out of the country. They buy sports cars,\u201d said William Tsing, Head of Intel Operations at Malwarebytes, whose work includes coordinating with law enforcement to take down cybercriminals. \u201cFlorida has had success getting people with outstanding warrants by the classic giveaways of sports cars and boats. These men have very specific ideas of who they\u2019re \u2018supposed\u2019 to be, and buying expensive toys plays to their ego. They steal what they think they deserve.\u201d<\/p>\n<\/blockquote>\n<p>That being said, only <a href=\"http:\/\/www.cio.in\/article\/profile-cyber-criminal\" target=\"_blank\" rel=\"noopener\">5 percent<\/a> of cybercriminals are actually apprehended.<\/p>\n<p>To better understand their psychological, criminological, and sociological motives, former police officer and IT professional <a href=\"https:\/\/www.techrepublic.com\/blog\/it-security\/profiling-and-categorizing-cybercriminals\/\" target=\"_blank\" rel=\"noopener\">Deb Shinder<\/a> put together a set of characteristics she says that most cybercriminals exhibit. These include:<\/p>\n<ul>\n<li>Some measure of technical knowledge<\/li>\n<li>Disregard for the law or rationalization about why particular laws are invalid or should not apply to them<\/li>\n<li>High tolerance for risk or the need for a &#8220;thrill factor&#8221;<\/li>\n<li>\u201cControl freak\u201d nature, enjoyment in manipulating or outsmarting others<\/li>\n<li>A motive for committing the crime\u2014monetary gain, strong emotions, political or religious beliefs, sexual impulses, or even just boredom or the desire for fun<\/li>\n<\/ul>\n<p>A generic cybercriminal profile, therefore, might look like this: \u201cMale, under 25, history of anxiety, angry, sustained difficulties with in-person interaction, and distrustful of anything outside of science or tech,\u201d said Tsing, who qualifies that it applies to North American and Chinese black hats only\u2014Russian black hats likely fit a different profile.<\/p>\n<div id=\"attachment_25176\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25176\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/attachment\/surfer-who-saved-world-from-wannacry-attack-prepares-for-next-wave\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1.jpg\" data-orig-size=\"1024,683\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;9&quot;,&quot;credit&quot;:&quot;Bloomberg via Getty Images&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark IV&quot;,&quot;caption&quot;:&quot;Marcus Hutchins, digital security researcher for Kryptos Logic, poses for a photograph on Tunnels Beaches in Ilfracombe, U.K., on Tuesday, July 4, 2017. Hutchins, the 23-year-old who saved the world from a devastating cyberattack in May was asleep in his bed in the English seaside town of Ilfracombe last week after a night of partying when another online extortion campaign spread across the globe. Photographer: Chris Ratcliffe\/Bloomberg via Getty Images&quot;,&quot;created_timestamp&quot;:&quot;1499167053&quot;,&quot;copyright&quot;:&quot;u00a9 2017 Bloomberg Finance LP&quot;,&quot;focal_length&quot;:&quot;135&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.005&quot;,&quot;title&quot;:&quot;Surfer Who Saved World From WannaCry Attack Prepares For Next Wave&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Surfer Who Saved World From WannaCry Attack Prepares For Next Wave\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1-300x200.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1-600x400.jpg\" class=\"size-large wp-image-25176\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1-600x400.jpg\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1-600x400.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/hutchins-1.jpg 1024w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Marcus Hutchins, a 23-year-old security researcher for Kryptos Logic, stopped a deadly ransomware attack in May 2017. Three months later, he was detained and charged with creating the Kronos malware. Photographer: Chris Ratcliffe\/Bloomberg via Getty Images<\/em><\/p>\n<\/div>\n<p>Additional research <a href=\"https:\/\/venturebeat.com\/2013\/02\/22\/profile-of-a-cyber-criminal-infographic\/\" target=\"_blank\" rel=\"noopener\">conducted by online payment company Jumio<\/a> finds that three-quarters of cybercriminals are male, and they work in organized groups, half of which have six or more members. (Though this is not to be confused with organized crime, which cybercriminals have, surprisingly, <a href=\"https:\/\/duo.com\/decipher\/the-mafia-doesnt-control-cybercrime\" target=\"_blank\" rel=\"noopener\">little connection with<\/a>.) And they live all over the world, but are found especially in Asia, most notably China, Russia, and Indonesia.<\/p>\n<p>As there as so many different forms of cybercrime, so too are there different profiles. Those who participate in online piracy have different traits from those who are scam artists, as well as those who are involved in human trafficking or child pornography.<\/p>\n<h3><strong>Types of cybercrime<\/strong><\/h3>\n<p>The various types of cybercrime committed by black hat hackers are highly influenced by technical skill, though socio-economic factors also play a part. Those who are able to participate in cybercrime that requires higher technical expertise often come from fairly comfortable, middle-class backgrounds.\u00a0Yes, there are savants\u2014your Good Will Huntings who come from extreme poverty and are self-taught\u2014but for the majority of cybercriminals, a base level competence in computer science is acquired at home, with private access to a computer, and at school.<\/p>\n<p>\u201cIn high school, I took computer science classes. That was actually my first exposure to cybercrime and the dark world,\u201d said Derek. As a freshman, he was in class with seniors who were already involved with less-than-legal activities, and they taught Derek how to grow his own abilities, whether that was by finding better content or achieving faster download speeds.<\/p>\n<p>Personal preference and opportunity certainly play a role, but technical skill is the major factor that separates the scammers from the ransomware authors. We separate types of cybercrime (and criminals) into categories as follows:<\/p>\n<p><strong>Online piracy: <\/strong>We\u2019ve covered this fairly well with Derek\u2019s actions, but online piracy involves illegally copying and sharing copyrighted material, such as movies, video games, and music. In the US, this is an infringement on the <a href=\"https:\/\/www.copyright.gov\/legislation\/dmca.pdf\" target=\"_blank\" rel=\"noopener\">Digital Millennium Copyright Act (DMCA)<\/a>, which was enacted in 1998. It doesn\u2019t require much technical skill to do the copying and sharing of files, but it does require some basic know-how to find torrent sites that won&#8217;t infect your own machine and stay under the radar enough to avoid fines.<\/p>\n<p><strong>Malware\/PUP writing: <\/strong>To write programs that deploy malicious code generally requires a much higher level of technical prowess, whether that\u2019s authoring a program that can discover vulnerabilities in other software and escort malware through the door (exploits) or creating ransomware that can seize and encrypt a system\u2019s files, holding them hostage.<\/p>\n<p>Creators of potentially wanted programs also fit under this umbrella, as they require the requisite programming skills of any software maker, with the added bonus knowledge of dark design\u2014e.g. sneaking pre-checked boxes into end-user license agreements (EULAs) or creating extra search bars that obfuscate their true purpose, which is to redirect users to sites out of their control.<\/p>\n<p>One caveat: A lot of malware creation can now be conducted by those with lesser technical capabilities, such as script kiddies, or people that use existing computer scripts or code to hack into computers. Malware-as-a-service, then, has popped up as a profitable form of cybercrime, where black hats actually write and sell code to other black hats in place of or in addition to participating in their own attacks.<\/p>\n<p><strong>Scamming\/fraud\/extortion: <\/strong>Scamming requires little in the way of technical skill, but does rely on knowledge of classic social engineering techniques, such as exploiting fear, carelessness, or a variety of other emotions to manipulate users. Scamming in the cyberworld includes phishing attacks that seek credentials, such as usernames and passwords and technical support scams, which dupe users into pay fake technicians to \u201cfix\u201d an issue in their computer that either doesn\u2019t exist or that the technician has actually caused himself.<\/p>\n<p>Those that write malware often look down upon the scammers for their lack of technical skill, and sometimes infiltrate scammer networks and drop their own viruses or worms.<\/p>\n<p>\u201cI liked causing pain to people who were trying to screw over grandma,\u201d said Derek. \u201cIn the land of the blind, the one-eyed man is king.\u201d<\/p>\n<p>However, socio-economics probably has the largest impact on this subset of criminals. Massive caller banks have been set up in states and nations where poverty runs rampant, including Florida and India, where scammers target the mentally ill or the elderly for low-end technical support scams and vendor fraud. While seemingly vile, it puts much-needed money in the pockets of the poor.<\/p>\n<p><strong>Cyberterrorism\/state-sponsored espionage: <\/strong>Here live those with top-of-the-line hacking aptitude, such as the ability to reverse engineer malicious code or break military-grade encryption. Once cybercriminals become good enough at their trade, they\u2019re often snatched up by nation-states that participate in this type of cyberwarfare. (Though there are those hacktivists that work independently from their governments.) In the US, those with a background in cybercrime are not invited to the cyber table, so to speak, but they are often courted and hired by private companies as security researchers<\/p>\n<p><strong>Child pornography\/human trafficking: <\/strong>Sure, yes, technical skill is involved to some degree when you\u2019re talking about this type of deviant behavior, but mostly you\u2019re dealing with the soulless and sociopathic, here. When it comes to the deep end of this criminal pool, psychological motive is the factor that separates the truly sick from the opportunists.<\/p>\n<h3><strong>\u00a0<\/strong><strong>What motivates a cybercriminal? <\/strong><\/h3>\n<p>Indeed, motive is the most fascinating and also most illuminating factor that ultimately determines the full psychological profile of a cybercriminal. And while cybercriminals often have more than one motive for doing what they do, these motives can tell us the all-important <em>why<\/em> behind the hacking, as well as which type of cybercrime they\u2019ll likely participate in.<\/p>\n<blockquote>\n<p>\u201cI didn\u2019t brute force FTP servers as a kid because I was poor,\u201d said Tsing. \u201cI did it because I was bored, powerless, depressed, and smart enough to try it.\u201d<\/p>\n<\/blockquote>\n<p>Some of the main motives for different types of cybercrime break down as follows:<\/p>\n<p><strong>For fun\/the challenge: <\/strong>According to a <a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/publications\/791-pathways-into-cyber-crime\/file\" target=\"_blank\" rel=\"noopener\">2017 report from the National Crime Agency<\/a>, 61 percent of cybercriminals begin before the age of 16. The young age of the offenders can be attributed to their access to technology and the perception that it\u2019s a victimless crime.<\/p>\n<p>\u201cThere\u2019s a little bit of a Robin Hood complex there. I\u2019m not saying it\u2019s right, but I would say that for the most part, what I did was victimless crime,\u201d said Derek of his video game hacking enterprise. \u201cIf anything, it was cheap marketing because they played the game and gave out reviews and loved the hell out of it.\u201d<\/p>\n<p>Shinder believes that many cybercriminals hack not out of malicious intent or financial benefit, but simply because they can. \u201cThey may do it to prove their skills to their peers or to themselves, they may simply be curious, or they may see it as a game,\u201d she said.<\/p>\n<div id=\"attachment_25174\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25174\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/attachment\/john_draper_lee_felsenstein_roger_melen_2013\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013.jpg\" data-orig-size=\"3117,2246\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;3.4&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot ELPH 520 HS&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1364943714&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;4&quot;,&quot;iso&quot;:&quot;800&quot;,&quot;shutter_speed&quot;:&quot;0.0166666666667&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"John_Draper,_Lee_Felsenstein,_Roger_Melen_(2013)\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013-300x216.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013-600x432.jpg\" class=\"size-large wp-image-25174\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013-600x432.jpg\" alt=\"\" width=\"600\" height=\"432\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013-600x432.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/John_Draper_Lee_Felsenstein_Roger_Melen_2013-300x216.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>John Draper, aka Captain Crunch (left), is one of the early pioneers of hacking.<\/em><\/p>\n<\/div>\n<p><a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/publications\/791-pathways-into-cyber-crime\/file\" target=\"_blank\" rel=\"noopener\">One subject interviewed by the NCA<\/a> said that illicit hacking made them popular, and they looked up to users with the best reputations. The NCA study also found that curiosity and a desire to increase skills were the most common factors that led to cybercrime. This assessment is corroborated by a recent report by Nuix, which found that 86 percent of surveyed threat actors said that they liked the challenge of hacking and hacked to learn. Additionally, 35 percent said they did it for the entertainment value or to make mischief.<\/p>\n<p>If having fun or looking for a challenge is the main motive, then the buck likely stops for these budding cybercriminals at sharing copyrighted music and movies, defacing websites, or other low-impact crimes. If you combine this motive with others, however, the severity of the crime begins to increase.<\/p>\n<p><strong>Financial: <\/strong>Money can account for the motive behind almost all forms of cybercrime, from online piracy on down to scams and human trafficking. According to the Nuix report, 21 percent of surveyed respondents hacked for financial gain.<\/p>\n<p>What pushes cybercriminals to continue down their path often amounts to putting more <a href=\"https:\/\/www.bromium.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic\/\" target=\"_blank\" rel=\"noopener\">expendable cash<\/a> in their pockets. As cybercriminals age, their financial needs change. What started as a yearning for new video games grows into wanting more cash to buy a car, date girls, and buy drinks at the bar. And often, criminals discover that their side hacking jobs pay way more than entry-level jobs in fast food or retail.<\/p>\n<blockquote>\n<p>\u201cThe first time I started thinking about [hacking] for money was when I first started caring about money,\u201d said Derek. \u201cAt 15, I started wondering how I was going to buy a car. [I was] making more than I should have been at 16-years-old\u2014probably a couple grand a year. It was a lot more than my real job at the mall. At that point, I wasn\u2019t thinking of stopping. Money talked.\u201d<\/p>\n<\/blockquote>\n<p>Cybercrime paychecks often stack up much higher against career IT jobs. For example, Jared made $45,000 a year while working for the PUP maker, which was much more than a basic computer technician could expect to make in his location and during the time he worked there. For those that are at the top of their crime field, the earnings are even higher. According to an <a href=\"https:\/\/www.scribd.com\/document\/377159562\/Into-the-Web-of-Profit-Bromium-Final-Report\" target=\"_blank\" rel=\"noopener\">April 2018 study by Dr. Mark McGuire<\/a>, the highest-earning cybercriminals can make more than $166,000 per month, middle earners can make more than $75,000 a month, and the lowest-earning cybercriminals can still rake in more than $3,500 a month.<\/p>\n<p>Still, money isn\u2019t the only incentive for many threat actors, who prefer the anonymity and isolation of working in cybercrime over the human interaction required to work in a traditional office.<\/p>\n<p>\u201cThe stated motive is always money. But that\u2019s not necessarily true,\u201d said Tsing. \u201cIt\u2019s just that legit avenues to earn don\u2019t appeal for various reasons. Often times, low level guys will make peanuts, but it\u2019s peanuts where you don&#8217;t have to interact with others with respect, don&#8217;t have to be around women, and can take time off if you&#8217;re crippled with depression or anxiety. So, they go with $40\u2013$60,000 selling DDoS or launching phishing attacks rather than take $75,000 in an office.\u201d<\/p>\n<p><strong>Emotional:<\/strong> Shinder believes that the most destructive cybercriminals act out of emotion, whether that\u2019s rage, revenge, &#8220;love,&#8221; or despair. This category includes ex-spouses, disgruntled or fired employees, dissatisfied customers, and feuding neighbors, to name a few. Cybercriminals motivated by emotion can often be found getting angry in forums, comments sections, and social networking groups, \u201ctrolling\u201d users by baiting them with overly offensive, intentionally contrary content.<\/p>\n<p>The emotional motive might be most personally destructive to the victims of lovers spurned. These criminals use their technical competence to cyber stalk their victims, access their accounts without authorization, or use Internet of Things (IoT) devices to <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/iot-domestic-abuse-can-stop\/\" target=\"_blank\" rel=\"noopener\">commit domestic abuse<\/a>, such as locking their loved ones inside the house via smart locks or cranking the heat up in the middle of the summer using Internet-controlled thermostats.<\/p>\n<p>The malicious insider is another common subtype impacted by emotion. They are often upset about being overlooked for a promotion or raise, or are frustrated by a perceived injustice, which can send them on a critical path that includes defacement of company websites, DDoS attacks, stealing or destroying company data, or exposing confidential company information.<\/p>\n<p>\u201cAs for the malicious insider, predispositions and professional dissatisfaction or a sense of being slighted in his job can serve as a trigger,\u201d said certified forensic psychologist Dr. Harley Stock in <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/the-art-of-profiling-cybercriminals\/d\/d-id\/1136783\" target=\"_blank\" rel=\"noopener\">an article for Dark Reading<\/a>. \u201cThey move from a psychological sense of not being treated fairly to developing justification responses, giving themselves excuses to do bad behavior.&#8221;<\/p>\n<p><strong>Ego: <\/strong>For those involved in a variety of cybercrime, but especially social engineering attacks, shoring up a weak ego is a motivation that combines several psychological provocations, including insecurity, financial woes (and gains), and emotional turmoil into one powerful punch. In fact, if you ask Tsing, he believes ego is at the root of all cybercrime evil.<\/p>\n<p>\u201cI\u2019d say the one overarching motive is emotional if I wanted to troll\u2014they tend to go on at length about how they don\u2019t have emotions. But it\u2019s probably ego or power,\u201d he said. \u201cIt gets confused as money, because they use money as a means to power. I think if it were actually money, though, we&#8217;d see a lot more of these folks leaving their countries of origin.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25164\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/attachment\/alexsey-belan\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan.png\" data-orig-size=\"1400,1182\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"alexsey-belan\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan-300x253.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan-600x507.png\" class=\"aligncenter size-large wp-image-25164\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan-600x507.png\" alt=\"\" width=\"600\" height=\"507\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan-600x507.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan-300x253.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/alexsey-belan.png 1400w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Cybercriminals driven by a weak ego and lacking the technical skill to drop malware on their chosen targets tend to have more visibility into and interaction with their victims, and they validate those actions by convincing themselves they\u2019re actually on the defensive, attacking \u201cback\u201d at those who put them in the position in the first place.<\/p>\n<p>\u201cThey have such a shaky sense of self that they feel constantly under assault by essentially everyone,\u201d said Tsing. \u201cSo, it\u2019s not that they don\u2019t care [about hurting others], it\u2019s that they&#8217;re \u2018getting back\u2019 what\u2019s theirs.\u201d<\/p>\n<p>Poor grandma. She must have been a real jerk to deserve having her identity stolen, or to field a phone call from a fake, desperate granddaughter who needed money to bail her out of jail (a real scam scenario).<\/p>\n<p><strong>Political\/religious: <\/strong>According to the Nuix report<strong>, <\/strong>six percent of respondents said they hacked for social or political motives. Often associated with cyber activism\/terrorism, hacktivism, and nation-state supported cybercrime, those with political or religious motivations hack with the intent to take down foreign adversaries. Shinder asserts that this particular motive is closely related to the emotional category, as people\u2019s political and religious beliefs are often intertwined with their personal feelings. \u201cPeople get very emotional about their political and religious beliefs, and are willing to commit heinous crimes in their name,\u201d she said.<\/p>\n<p><strong>Sexual impulses\/deviant behavior:<\/strong> Cyberpsychologist <a href=\"https:\/\/www.theguardian.com\/technology\/2015\/nov\/03\/hackers-gonna-hack-but-why-maybe-freud-has-the-answer\" target=\"_blank\" rel=\"noopener\">Mary Aiken<\/a>, whose work was the inspiration for the TV show \u201cCSI: Cyber,\u201d famously joked in a 2015 Web Summit conference about the Freudian impulse that drives people to hack as \u201ca cyber-sexual urge to penetrate.\u201d While meant as a tongue-in-cheek poke at psychologists\u2019 attempts to understand cybercriminals, there does exist a group in the darkest corners of the web to whom sexual compulsion and deviant behavior apply.<\/p>\n<p>Although also related to emotion, those with sexual impulses are some of the most violent cybercriminals, as they commit heinous crimes using the Internet as a tool to lure in their victims. Rapists, sexual sadists, pedophiles, and even serial killers either use their own skill or hire those lacking a moral compass to help aid in their sexual predatory behaviors. Child pornographers and human traffickers also fit into this category, or they may be merely exploiting the sexual impulses of others for profit.<\/p>\n<blockquote>\n<p>\u201cI can tell you that there are people out there who just want to do harm and cause chaos. I saw some really messed up shit and decided I didn\u2019t want to be part of it,\u201d said Derek, who witnessed hitmen for hire, human trafficking, and bioengineering attack schemes while conducting research. \u201cThere are guys and girls out there who are ready to break people. They turn a human being\u2019s psyche into a math problem and then subsequently solve the problem.&#8221;<\/p>\n<\/blockquote>\n<p>Sometimes, a bad apple is just a bad apple.<\/p>\n<h3><strong>What would make a cybercriminal reform? <\/strong><\/h3>\n<p>Armed with the knowledge of what drives a cybercriminal to do what he does, we ask the question: How can we get black hats to turn into white hats? The answer shouldn\u2019t surprise you: It\u2019s likely the same things that made them hack in the first place. Of course, there are those that are psychopathic by nature\u2014generally one in 100 people\u2014and they just want to wreck the place. But others could be swayed by the following:<\/p>\n<p><strong>Money:<\/strong> Pay a cybercriminal well enough to work as a malware analyst, and they won\u2019t be able to justify to the IRS where all this extra cash from cybercriminal side jobs is coming from. If you tip the balance of the risk\/reward ratio, you can court many of those whose motivations are financial to the side of the light.<\/p>\n<p>According to <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Certified_Ethical_Hacker_(CEH)\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale.com<\/a>, the median salary of an ethical hacker is around $72,000 a year and consultants can expect to be paid $15,000 to $45,000 per assignment. However, as discovered by the recent <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/white-hat-black-hat-emergence-gray-hat-true-costs-cybercrime\/\" target=\"_blank\" rel=\"noopener\">Osterman report<\/a>, medium-sized companies aren\u2019t offering their security teams enough money right now. Salaries and retention numbers lag because their starting salaries average only $3,000 more than small companies, but $17,000 less than enterprises. In fact, the Osterman survey found that nearly 60 percent of security pros think that black hats make more money than security professionals.<\/p>\n<p>How can companies fix the imbalance? Malwarebytes\u2019 CEO Marcin Kleczynski said, \u201cWe need to up-level the need for proper security financing to the executive and board level discussions. This also means properly recognizing and rewarding the best and brightest security pros.\u201d<\/p>\n<p><strong>Challenge:<\/strong> While money is a major factor for attracting cybercriminals to white hat positions, providing them with interesting and challenging work, and surrounding them with other talented researchers can keep them there.<\/p>\n<p>\u201cWhat really made me turn the corner was when a select group of people in the company who were known as the smartest took notice of me and the abilities I had shown, and invited me to mess around with a target,\u201d said Derek, whose white hat work includes actively searching out criminal activity to stymie. \u201cBeing in the white hat community, I was exposed to many more skilled people. It was really good for me because it pushed me to learn so much more.\u201d<\/p>\n<div id=\"attachment_25163\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25163\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/attachment\/lamo-mitnick-poulsen\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen.png\" data-orig-size=\"928,628\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Lamo-Mitnick-Poulsen\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen-300x203.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen-600x406.png\" class=\"size-large wp-image-25163\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen-600x406.png\" alt=\"\" width=\"600\" height=\"406\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen-600x406.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen-300x203.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/Lamo-Mitnick-Poulsen.png 928w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Adrian Lamo, Kevin Mitnick, and Kevin Lee Poulsen: three former black hatters who reformed. Photographer: Matthew Griffiths<\/em><\/p>\n<\/div>\n<p><strong>Age:<\/strong> Many simply grow out of this behavior. There\u2019s a reason why security is on average older than any other IT field: It\u2019s mostly composed of those who\u2019ve seen the error of their ways or are looking for more stability.<\/p>\n<p>\u201cThe ones that seem to think that cybercrime is victimless tend to be very young\u2014generally, under 25, which is when the good judgement part of the brain finishes forming,\u201d said Tsing. \u201cYou don\u2019t see the consequences in front of you, therefore there aren\u2019t any. Eventually, a huge amount of these guys age out of the profile and start acting like humans.\u201d<\/p>\n<p>In addition, the longer they go, the more skilled they become. The more skilled they become, the deeper waters in which they wade. Eventually, those whose consciences are alive and well will find themselves in uncomfortable positions. They\u2019ve seen too much.<\/p>\n<blockquote>\n<p>\u201cIn the wrong hands, these skills can be used to do some seriously scary shit,\u201d said Derek. \u201cI met a guy who had hypothesized targeting a primate gene that would effectively reset the world clock. One guy, through this tech, had the capability of watching the world burn, if he so chose\u2026I like to think that at my core, I make the right decisions. I\u2019m comfortable with me having the knowledge, but I know there are people out there who have a very different moral compass.\u201d<\/p>\n<\/blockquote>\n<p><strong>Flipping the system: <\/strong>A paradigm shift in education might be one of the most difficult changes to achieve, but it also could help thwart teens with technical capability from participating on the fringes of society in the first place. Give your outside-the-box thinkers the platform to use their skills in a positive way, and they won\u2019t be so tempted to go after the low-hanging, unscrupulous fruit.<\/p>\n<p>Educational reform has been hard pressed to include 21<sup>st<\/sup> century learning initiatives, at least in the US, where many public schools in the K\u201312 system use barely-functioning tech\u2014a single, shared iPad on a decrepit, crumbling network\u2014and avoid topics such as digital citizenship and literacy in favor of standardized testing. For the kids already hacking video games, their classroom experience is, in Tsing\u2019s words, \u201cstifling and borderline traumatic.\u201d<\/p>\n<p>\u201cAt 19, I was going to community college and thought it was a joke. College was to show that you could complete a project start to finish and to build a network of people,\u201d said Derek. \u201cI had already learned to do that in high school with my enterprising.\u201d<\/p>\n<p>In addition, if the US government could get over their aversion to hiring former cybercriminals, there\u2019d be a place for many more skilled individuals to do some good, especially as cybersecurity continues to be a concern surrounding our elections and infrastructure.<\/p>\n<p>*******************************************************************************************<\/p>\n<p>There\u2019s a razor thin line separating the white hats from the black. Cybercriminals are equally passionate and skilled at what they do, but the lens through which the view the world may be blurred by socio-economic circumstances or psychological hang-ups. There are those that may be beyond hope, but there are also those who are simply too young or too insecure to work a system that feels like it\u2019s set up to watch them fail.<\/p>\n<p>Give them an off-ramp from the treadmill and hand them the tools sooner for doing some good online. Then we just might be able to hold out hope that we can, in fact, make the Internet a safer place to be, without having to clutch our passwords tight.<\/p>\n<p><em>*Names have been changed to protect the anonymity of the cybercriminals interviewed for this piece.<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/\">Under the hoodie: why money, power, and ego drive hackers to cybercrime<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 15 Aug 2018 14:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/' title='Under the hoodie: why money, power, and ego drive hackers to cybercrime'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/profileofcybercriminal.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/criminal-profile\/\" rel=\"tag\">criminal profile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime\/\" rel=\"tag\">cybercrime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercriminals\/\" rel=\"tag\">cybercriminals<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hackers\/\" rel=\"tag\">hackers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/psychological-profile\/\" rel=\"tag\">psychological profile<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/' title='Under the hoodie: why money, power, and ego drive hackers to cybercrime'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/\">Under the hoodie: why money, power, and ego drive hackers to cybercrime<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19215,4503,14011,6272,19216,10510],"class_list":["post-13110","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-criminal-profile","tag-cybercrime","tag-cybercriminals","tag-hackers","tag-psychological-profile","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13110"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13110\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}