The motives and goals of hackers in cyberattacks vary widely. Some want to steal data, some are seeking ransoms and some want to deny service or steal infrastructure.

Christopher Tozzi, Contributing Editor

December 19, 2017

3 Min Read
A new report says insider threats have become more prevalent in the past year
A new report says insider threats have become more prevalent in the past year.

What do hackers actually want? The answer varies widely depending on which types of cyberattacks you’re talking about. Here’s a look at the most common motives behind attacks by hackers.

I should preface this article by noting that technical communities lack consensus regarding the meaning of “hacker.”

Historically, the term has referred to people who build new things or make them better, not break into software systems for malicious purposes.

For the purposes of this article, however, I’ll be using “hacker” in the negative sense, to describe people who seek to gain unauthorized access to software or hardware.

Identifying What Hackers Want

We tend to treat hackers more or less as a single group. Yet in reality, there are many different types of hackers. Their strategies and methodologies vary. So do their motivations, which fall into the following main categories:

Exploiting Data
Some cyberattacks are designed to gain unauthorized access to data so that the data can be exploited in some way.

For example, exploiting consumer data was probably the goal of the hackers behind the Equifax attack in 2017.

In attacks like this, stolen data can be used to steal more information or assets from the parties who are affected.

Holding Data Ransom
In other cases, hackers might steal (or otherwise gain control over) data with the goal not of holding onto it permanently, but of charging a ransom to give it back.

This was the motive behind the recent Wannacry ransomware attack.

You could categorize these attacks as a form of data exploitation.

However, they differ in that the goal of the attacks is not to exploit the information within the data itself, but rather to make money by holding data for ransom.

Stealing Infrastructure
If you’re a hacker, you want access to computing resources and you don’t want to pay for them. In these instances, you might launch an attack designed to steal infrastructure.

Such an attack allows you to take control of the storage, compute or network resources owned by other people. Hack ’em and you can then use these resources for yourself.

In some cases, hackers execute an attack against infrastructure in order to host websites or ads.

In other cases, their goal is instead to create a botnet of other people’s servers and computers. The botnet can then be used to execute other attacks.

Denying Service
Among the most common types of attacks that are executed with a botnet (although this is not the only way to launch these attacks) is a denial-of-service (DoS) attack.

DoS—or Distributed-Denial-of-Service (DDoS)—attacks aim to prevent a website or other services from working.

The October 2016 Dyn DNS DDoS attack is the most recent major example of an attack designed to deny service.

Why would hackers want to deny service? Sometimes, it may be simply because they can. There was no clear motive in the Dyn DNS attack, for example; it was probably the work of attackers who just wanted to see if they could successfully shut down a large portion of the Internet.

But in other cases, denying service to critical websites or services could be a way to cause harm.

For instance, shutting down the network that a power plant depends on to operate would have serious real-world ramifications.

The world is a dangerous place. But when it comes to cybersecurity, it is so for a multitude of reasons.

Read more about:

AgentsMSPsVARs/SIs

About the Author(s)

Christopher Tozzi

Contributing Editor

Christopher Tozzi started covering the channel for The VAR Guy on a freelance basis in 2008, with an emphasis on open source, Linux, virtualization, SDN, containers, data storage and related topics. He also teaches history at a major university in Washington, D.C. He occasionally combines these interests by writing about the history of software. His book on this topic, “For Fun and Profit: A History of the Free and Open Source Software Revolution,” is forthcoming with MIT Press.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like