• Skip to main content
  • Skip to footer

Commonwealth Sentinel Cyber Security Consulting

Cyber Security for local government, non-profits and small business

MENUMENU
  • Home
  • About Us
    • Sheri Donahue
    • Leo Haggerty
    • Careers
  • Services
    • Vulnerability and Threat Evaluation
    • Transformation Management
    • CISO Management Services
    • Incident Response Management
  • News
  • Blog
  • FAQs
  • Newsletter
  • Shop
  • Contact Us

commonsent / April 22, 2021

Just WHO are HACKERS???

Hackers come in all shapes and sizes, from all countries, all ages, male/female, all nationalities, and more. It’s not the lone hacker in a dark hoodie bent over his laptop in a dark room. It may be the pretty young redhead at the coffee shop, the middle-age next-door neighbor who was just laid off from work, the activist trying to disable a police department emergency services line, or the disgruntled citizen trying to disrupt a state unemployment office for denying her claim.

Just like with counter-espionage operations in intelligence agencies where we see various reasons for espionage (C.R.I.M.E. – Coercion Revenge Ideology Money Ego), we know that people perpetrate cyber crime for many reasons as well. Hacktivists are “hacking activists” for political or social change. Money via blackmail, ransomware, or just basic theft. Espionage, either nation-state or economic to steal trade secrets to benefit a country or a company. Disruption to wreak havoc (often these are known as script kiddies). Revenge against an organization or person.

During 2020 amid the pandemic we saw a marked increase in “opportunists”, that is, people who capitalize on unexpected events, often tragic events. They prey on those who are vulnerable because of the circumstances. They may use open source information to research people or organizations to perpetrate a charade that appears more realistic to the target (aka “victim”).

True to their name, these people seized upon the ‘opportunity’ to go after many people and organizations during the pandemic. The FBI reported a 300% increase in opportunistic cyber crime attacks by August of 2020.

By the mere nature of the pandemic, more people were working from home, shopping online, holding virtual meetings and more. For employers, they suddenly had to figure out how to keep their employees engaged while working from home. They were using home computers and/or home networks. End point security (devices such as laptops and tablets) as well as network security was no longer in their security control.

All this provided a tremendous opportunity for cyber hackers. Some of these attacks include fake COVID-19 trackers, fake charity websites, messages about the pandemic with hidden malware, and even attacking pharmaceutical and other healthcare organizations with ransomware. And for those having to meet by electronic meeting applications, we saw instances of “Zoombombing” where uninvited people hijack and disrupt video meetings.

These opportunists are equal opportunity criminals. They will go after companies of all sizes, government organizations, non-profits and individuals. They don’t care if they are affecting the production or distribution of life-saving materials and drugs. They are only focused on their reward.

The best thing an organization can do is to update technology (patching), implement security protocols and provide continuous security awareness training to all employees.

Filed Under: Blog

Footer

CONTACT US

COMMONWEALTH SENTINEL

1230 US Highway 127 S
Suite #5
Frankfort KY 40601
(502) 320-9885

EMAIL US

ABOUT US

Cyber security consulting for local governments, non-profit organizations, and small businesses facing the threats of the cyber world.  At Commonwealth Sentinel, we are passionate about helping people be cyber-safe!

FOLLOW US

  • Email
  • Facebook
  • LinkedIn
  • Phone
  • Twitter
  • YouTube

Copyright © 2022 Commonwealth Sentinel

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT