https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2021 MSP 501 Application
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2021 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2021 MSP 501 Application
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2021 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

Strategy


A new report says insider threats have become more prevalent in the past year

What Do Hackers Want, Anyway? A Look at Different Cyberattack Goals

  • Written by Christopher Tozzi
  • December 18, 2017
The motives and goals of hackers in cyberattacks vary widely. Some want to steal data, some are seeking ransoms and some want to deny service or steal infrastructure.

What do hackers actually want? The answer varies widely depending on which types of cyberattacks you’re talking about. Here’s a look at the most common motives behind attacks by hackers.

I should preface this article by noting that technical communities lack consensus regarding the meaning of “hacker.”

Historically, the term has referred to people who build new things or make them better, not break into software systems for malicious purposes.

For the purposes of this article, however, I’ll be using “hacker” in the negative sense, to describe people who seek to gain unauthorized access to software or hardware.

Identifying What Hackers Want

We tend to treat hackers more or less as a single group. Yet in reality, there are many different types of hackers. Their strategies and methodologies vary. So do their motivations, which fall into the following main categories:

Exploiting Data
Some cyberattacks are designed to gain unauthorized access to data so that the data can be exploited in some way.

For example, exploiting consumer data was probably the goal of the hackers behind the Equifax attack in 2017.

In attacks like this, stolen data can be used to steal more information or assets from the parties who are affected.

Holding Data Ransom
In other cases, hackers might steal (or otherwise gain control over) data with the goal not of holding onto it permanently, but of charging a ransom to give it back.

This was the motive behind the recent Wannacry ransomware attack.

You could categorize these attacks as a form of data exploitation.

However, they differ in that the goal of the attacks is not to exploit the information within the data itself, but rather to make money by holding data for ransom.

Stealing Infrastructure
If you’re a hacker, you want access to computing resources and you don’t want to pay for them. In these instances, you might launch an attack designed to steal infrastructure.

Such an attack allows you to take control of the storage, compute or network resources owned by other people. Hack ’em and you can then use these resources for yourself.

In some cases, hackers execute an attack against infrastructure in order to host websites or ads.

In other cases, their goal is instead to create a botnet of other people’s servers and computers. The botnet can then be used to execute other attacks.

Denying Service
Among the most common types of attacks that are executed with a botnet (although this is not the only way to launch these attacks) is a denial-of-service (DoS) attack.

DoS—or Distributed-Denial-of-Service (DDoS)—attacks aim to prevent a website or other services from working.

The October 2016 Dyn DNS DDoS attack is the most recent major example of an attack designed to deny service.

Why would hackers want to deny service? Sometimes, it may be simply because they can. There was no clear motive in the Dyn DNS attack, for example; it was probably the work of attackers who just wanted to see if they could successfully shut down a large portion of the Internet.

But in other cases, denying service to critical websites or services could be a way to cause harm.

For instance, shutting down the network that a power plant depends on to operate would have serious real-world ramifications.

The world is a dangerous place. But when it comes to cybersecurity, it is so for a multitude of reasons.

Tags: Cloud Service Providers Digital Service Providers MSPs VARs/SIs Strategy

Related


  • Job cuts
    Latest VMware Job Cuts Impact More Workers in California
    The layoffs will begin March 30.
  • Hottest Ticket in Town
    Channel Partners Virtual 2021 Is the Hottest Ticket in Town
    And that means any town, since it’s 100% online. Will you be there?
  • strong customer relationship
    Datto Partners with ThreatLocker for Secure MSP Business Operations
    MSPs have seen increased security risks for clients amid COVID-19.
  • Brexit
    Now That a Brexit Deal is Done, What's Next for the UK Channel?
    There's an Increased need for virtual services and video conferencing, and a focus on security moving forward.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • OneLogin Hires Juniper Networks Vet to Lead Accelerate Partner Program
  • Fortinet Vet Geoff Kreiling Departs for Deep Instinct
  • 3 Strategies for Selling Zero Trust in the Channel
  • BlackBerry Research: MSSPs Increasingly Targeted by Hacker-for-Hire Groups

Galleries

View all

Channel Partners Virtual 2021 Is the Hottest Ticket in Town

February 26, 2021

Industry Perspectives

View all

The “Roaring 20s” Are Coming

February 25, 2021

Three Ways MSPs Can Improve Supply Chain Security

February 24, 2021

SASE: The Key to Mitigating Business Transformation Risk

February 22, 2021

Webinars

View all

A Partner’s Perspective on Channel Success in 2021

March 23, 2021

XDR and Why it Matters to MSPs

March 24, 2021

Top Security Trends Impacting Technology Security Providers In 2021

March 25, 2021

White Papers

View all

Ready To Add Cutting Edge IoT Solutions To Your Portfolio?

  • 1
February 25, 2021

What Is The Value Of Distribution For The Internet Of Things?

February 25, 2021

The Internet of Things (IoT): Where do You Begin?

  • 1
February 25, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

#CPVirtual has arrived! Excited for speakers @channelsmart @jldelozier3 @jmcbain and more. dlvr.it/Rtm5yr https://t.co/MiwNsfGGLw

March 1, 2021
ChannelFutures

.@solarwinds incurring additional expenses in aftermath of massive hack. #cybersecurity dlvr.it/Rtlxzd https://t.co/CpBjkIEaus

March 1, 2021
ChannelFutures

.@IBM working with 65 partners for #CloudSatellite services. @IBMPartners dlvr.it/RtlmDC https://t.co/R6IzgklQ6c

March 1, 2021
ChannelFutures

NOW OPEN: 2021 Channel Futures MSP 501 Awards. ✍️ Start your online application today: bit.ly/2021MSP501. Ha… twitter.com/i/web/status/1…

March 1, 2021
ChannelFutures

Applying for the 2021 #MSP501? Check out our FAQs for everything you EVER wanted to know about applying & submittin… twitter.com/i/web/status/1…

March 1, 2021
ChannelFutures

Educate #WFH employees about #phishing and increase emphasis on cybersecurity to avoid a data breach, say @GiacomCM… twitter.com/i/web/status/1…

March 1, 2021
ChannelFutures

Amazon WorkSpaces @awscloud DaaS client will be available on @IGEL_Technology virtual endpoint client OS.… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@VMware cutting more workers in California as part of ongoing #workforcerebalancing. #layoffs… twitter.com/i/web/status/1…

February 26, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X