{"id":333,"date":"2023-02-11T09:00:42","date_gmt":"2023-02-11T14:00:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonburke\/?p=333"},"modified":"2024-02-02T18:52:33","modified_gmt":"2024-02-02T23:52:33","slug":"journal-5-hacker-motives","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/02\/11\/journal-5-hacker-motives\/","title":{"rendered":"Journal 5 &#8211; Hacker Motives"},"content":{"rendered":"\n<p><em>When a system is compromised, hackers have their reasons for why they want data from the system. The motives could be for money, entertainment, political, etc. There are seven generalized motives that hackers have that can be ranked from one through seven. One being seen more and seven being seen the least.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Multiple Reasons<\/h2>\n\n\n\n<p>Multiple reasons is exactly as it sounds. Hackers of all ages have their own reasons for compromising a system or someone\u2019s credentials. Multiple reasons can be a combination of the motives listed below. For example, money and political motives have close ties to one another. Lazarus from North Korea is a state-sponsored hacking group. They often deploy ransomware and cryptocurrency campaigns in the name of the North Korean government. Lazarus does this to make money for themselves and keep the Kim political dynasty afloat with a steady source of income.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Money<\/h2>\n\n\n\n<p>Coming in second place, money and monetary gain are one of the main motives for hackers. On the internet, data is money. Companies store data on customers and employees, which allows for more effective marketing campaigns. However, hackers can also use this data for malicious purposes. Companies that experience server and database hacks often have some sort of information stolen. This could be source code, employee, or customer data. Data of this nature is then sold on the dark web for other people to find and exploit the information as they wish.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Recognition<\/h2>\n\n\n\n<p>Hacker groups often gain some sort of recognition after compromising systems or using denial of service attacks. Anonymous would be notorious for using such attacks. In 2020, Anonymous would hack the United Nations website and would create a page for Taiwan. Anonymous would claim responsibility for the attack which would gain them recognition.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Entertainment<\/h2>\n\n\n\n<p>Entertainment is number four out of seven for hacker motives. Not many hackers hack for entertainment reasons. Nonetheless, the hacking group Lizard Squad would hack and deploy denial of service attacks from 2014 \u2013 2015. During Christmas of 2014, they would take down Playstation and Xbox Live networks to prevent players from playing online games. They would watch the chaos unfold as many would complain to Sony and Microsoft that their systems were not working. Lizard Squad would do the attack because they just wanted entertainment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Bordem<\/h2>\n\n\n\n<p>People that have technical knowledge of hacking can also hack out of boredom. Boredom is human nature. Giving into boredom can lead to rational and non-rational decisions. This can lead to people hacking for fun, which can be dangerous as the motives can switch to fun to monetary gain to relieve boredom. Boredom ranks number four because it can switch from boredom to more serious motives such as money or even recognition.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Political<\/h2>\n\n\n\n<p>Political motives are number six on the motive scale. Although there are individual hackers and smaller groups, larger hacker groups such as Lazarus and Red Apollo are state-sponsored APTs (advanced persistent threats). APTs often hack for political motives. They deploy ransomware, denial of service attacks, malware, and more to achieve their political goals for the nation of origin. Even though APTs are usually state sponsored, they often hack for information that can be sold to other countries. This means APTs often have more monetary goals in mind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. Revenge<\/h2>\n\n\n\n<p>Hackers that hack for revenge are called blue hat hackers. Anonymous is a prime example of this happening. For example, in 2022, Anonymous would launch attacks against the Russian Federation because of the war started in Ukraine. Anonymous would boot systems offline and compromise systems that would have sensitive information on officials in the Russian government. Revenge hacking is not as prevalent as black hat hacking, which means hacking for monetary gain.<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>When a system is compromised, hackers have their reasons for why they want data from the system. The motives could be for money, entertainment, political, etc. There are seven generalized motives that hackers have that can be ranked from one&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/02\/11\/journal-5-hacker-motives\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24541,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/users\/24541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/333\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}