Welcome millennials, this is chapter – 3, of what? Well if you are following our blog than you know the answer and if not here is the reason why we started it – The Complete Ethical Hacking Course | 2020
It’s time to understand the mindset of a Hackers. ⚡⚡
Let’s get it out straight, not all hackers are what you think or have seen in cinema. Just like not two people in this world function similar, Hackers are same, they have different motives behind their use of skillsets.
In board term, Hackers Intentions can be divided into 3 categories :
Once upon a time …………? Wait what?
Many times when hackers Attack a system it is for political reasons, it is to support a political cause.
A strong message is set across, and that’s the motivation behind it, to sent a message and not to victimize anyone. These type of Hackers make a large impact through social media platforms.
(Hacker + Activism) = Hacktivism
Hacktivism is the way of Hacktivists to call out people’s attention to something that they believe issue or cause such as freedom of human rights or right to information.
Or it’s their way of opposing something that they don’t like.
And they are clear about their messages, clearly showing messages or photos of their cause.
Hacktivists are typically individuals but they also function as a group, for example Anonymous group.
Hacktivism examples : –
- Website defacement
- Message popups
- Website mirroring
- Information leak
To know more about them, kindly reach google.🙂
Example of Hacktivism events : –
During the 2009 Iranian elections, Anonymous set up a website to disseminate information to and from Iran
In 2014 Sony Entertainment Pictures was hacked by the group known as Guardians of Peace or GOP. The group collected over 100 TB of data from Sony including unreleased pictures and personal information of employees.
In a way people term it as Cyberterrorism since the attack render a lot of websites useless because of it regular users are unable to visit the website because the attackers bring down the websites.
As today’s society all do, hackers are sometimes fuelled by the greed for money.
In this type of attacks, Hackers approach is to install a malware on victim’s system.
Q. What is Malware?
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware.
Source – Wikipedia
The malware piece of code blocks down the entire system and compromise information.
The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
In order to unlock the system, the victim is asked to pay ransom.
This type of malware is also known as Ransomware.
Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the “WannaCry worm”, travelled automatically between computers without user interaction.
And this type of attack where victimization happens is called Cyber Espionage.
Personal intentions are to have a personal attack on usually someone that the hackers is related with, to harrass the person.
Harrasing a person via Digital means is called cyberstalking.
In todays days it is easy to stalk someone using their social media accounts.
An attackers can easily find whereabouts of the person through social media such as Facebook and Instagram because they have live check in features.
The victim doesn’t even find out that someone is stalking him/her.
One of the worst type of hacks is to hack the personal webcam of the person.
With this the hacker can easily find out the sensitive and personal information of the victim.
One should always be vigilant of who they are interacting with on social media websites.