5 Hacker Motivations

In our digitally connected world, the Internet of Things (IoT) and its lack of security are continually hitting headlines around the world. Security attacks and breaches are increasing in complexity and severity, with technology driving different methods of attack, and sophisticated threats rising.

 

In order to secure the IoT, we must consider what motivates hackers who are orchestrating the attacks. A hackers’ methods and motivations can escalate from the benign to the malicious, from the ethical hacktivist to the money-motivated criminal.

 

1. Curiosity

Small time tech-savvy people may want to begin hacking to understand how a device or network operates. With this curiosity, individuals may hack everyday mundane objects simply because they can. They may be able to gain access into a small item such as a digital photo frame, and alter the photos within it. Attacks like this allow amateur hackers to enhance their skills and try out new techniques. By testing out new hacking methods, small time hackers can use these for bigger, more serious targets.

 

 2. Bragging

Amateur hackers may commit cyberattacks for bragging rights. A 17-year-old who hacked TalkTalk in 2015 claimed he only committed the crime to boast to his friends. By using hacking tool software, he identified vulnerabilities on TalkTalk’s website, and managed to access over 150,000 customers’ personal data including bank account numbers and sort codes.

 

3. Ethical Hacking / Moral Compass

Now, more than ever businesses are actively seeking cyber-security professionals to keep up with the growing number of evolving threats in the IoT. Yet, despite the rise in security breaches most companies lack the security needed to keep networks safe.

 

Ethical hackers, or ‘White hat’ hackers are trained to discover system weaknesses by exposing vulnerabilities and faults. These types of hackers may aim to help companies protect themselves rather than being motivated by a monetary reward.

 

4. Financial Gain

The potential for rewards means hackers are willing to devote more time and resources to creating and implementing ever more complex and well planned attacks.

 

Hackers have access to increasingly sophisticated software and an array of cyber weapons to help them potentially reap financial benefits. The cyber criminals can gain financial rewards through either their own means or by being hired by nation states to protect and seek out potential threats and faults in networks.

 

5. Retaliation

Distributed Denial-of-Service (DDoS) attacks are a hacking technique that can disrupt access to Internet services or websites. Certain services allow people to ‘rent’ a DDoS attack for low prices that can last for as little as a minute.

 

Users can flood websites with unwanted data in order to crash them and prevent legitimate users from accessing them. These types of attacks are among the most common cyber threats businesses face. Incidents like these may be launched in retaliation. People can use DDoS on business competitors and can threaten the safety of internal systems.

 

Urgent action is needed to improve the security of vulnerable devices. Considerations such as users’ data privacy are falling by the wayside, as there is an increasing rush for technology growth. Although some attacks are minor, a serious cyber-attack could result in a complete power shutdown of the National Grid, causing economic and financial disruption.

 

To find out more about what motivates hackers and the challenges involved with IoT security, please download our report in partnership with Scrutinise Research and Analysis, here: https://www.ilexcontent.com/addressing-security-in-the-internet-of-things-iot/

 

Posted on 31st May 2017 in IoT Security

Back to Top