{"id":3998,"date":"2014-09-11T10:00:37","date_gmt":"2014-09-11T14:00:37","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3998"},"modified":"2017-09-24T18:37:58","modified_gmt":"2017-09-24T14:37:58","slug":"why-hackers-attack-you","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/why-hackers-attack-you\/3998\/","title":{"rendered":"Why would hackers be after your network?"},"content":{"rendered":"<p>The main attraction during the annual Black Hat hacker conference is the demonstration of vulnerabilities of something which would definitely not spring to your mind when thinking about security \u2013 say, cars or toilets. But an even more interesting at BlackHat are the security gurus, which frequently refer to themselves as hackers. Unlike cybercriminals, hackers are not necessary after someone\u2019s money or secrets, so what drives them to be what they are? Thycotic, a security firm, has taken on the challenge and surveyed over a hundred conference visitors who consider themselves to be hackers. The findings supposedly reveal motivations behind hackers\u2019 actions and their weapons of choice. Use this insight to plan your own cyberdefense.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/09\/05111633\/Whom-do-hackers-attack-and-why-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5984\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/09\/05111633\/Whom-do-hackers-attack-and-why-1.png\" alt=\"Whom-do-hackers-attack-and-why\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Amazingly, 86% of hackers are sure they would not be punished for their deeds nor need bear responsibility for the consequences. Impunity is the primary call to action for cybercriminals.<strong>\u00a0<\/strong><\/p>\n<div class=\"pullquote\">40% of hackers would choose the company\u2019s contractors as their primary targets<\/div>\n<p>Another interesting find defines the weakest link amongst personnel whom hackers would use to infiltrate an organization\u2019s security system. 40% of respondents would choose the company\u2019s contractors as their primary targets. Usually contractors have access to corporate networks but are not entirely embraced by the corporate security policies.<\/p>\n<p>Curiously, IT administrators take the lead in this rating. Although they are mostly aware and prepared to handle the attack, 30% of hackers aim at them in their efforts to breach the corporate network.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Even hackers consider their personal data vulnerable to scams \u2013 a shocking 88% of them!<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fxk8d&amp;text=Even+hackers+consider+their+personal+data+vulnerable+to+scams+%E2%80%93+a+shocking+88%25+of+them%21\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Curiously, Thycotic\u2019s list does not include PR or HR personnel who are traditionally regarded as highly vulnerable to targeted attacks. The survey also reveals amazing findings regarding the motivation behind hacking as hackers themselves describe it. Over a half of the surveyed hackers (51%) hack everything they lay an eye on \u2018just for fun or the thrill\u2019, whereas a relatively low proportion of respondents (18%) pursue material benefit. Almost 30% of hackers follow ethical principles, which is good.<\/p>\n<p>The majority of hackers are realistic and acknowledge that possessing certain capabilities does not always mean that they themselves are safe. In fact, 88% think that they run a high risk of their own personal data being stolen by other hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences. <\/p>\n","protected":false},"author":199,"featured_media":3997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[740,78,119],"class_list":{"0":"post-3998","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-black-hat","9":"tag-hackers","10":"tag-survey"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/why-hackers-attack-you\/3998\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/why-hackers-attack-you\/4089\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/why-hackers-attack-you\/4482\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/why-hackers-attack-you\/4739\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/why-hackers-attack-you\/5983\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/why-hackers-attack-you\/4774\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/why-hackers-attack-you\/5983\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/why-hackers-attack-you\/5983\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/199"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3998"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3998\/revisions"}],"predecessor-version":[{"id":6697,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3998\/revisions\/6697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3997"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}