Who are hackers and their motive
So, who the hell are these people, and what do they get by doing those nasty things? The motive behind every attack is different. First thing is to understand the target of the attack. A hacker’s target can vary from a large or small company, governments, organizations, high net worth individuals or a common man. Every attack has a motive behind it. By attacking an organization, I mean taking control over the websites/server and disrupting the services which the organization provides. So, when a company gets attacked, you might not be able to access its website and the database where all the customer’s information is stored can also be compromised. The reason for attacking the organizations may be to send a message or to prove a point. Also, companies get attacked for sensitive data their computers contain which is generally of some monetary value. Some websites get attacked just because they happen to be in a specific country which the hacker doesn’t like. The reason to hack a common person like you and me may be either to scam for money or to take revenge on someone.
But if you are reading this book, chances are that you don’t have to worry about an organization or government getting hacked. So, why would a hacker be interested in you? Well, here are a few reasons:
- To scam you out of your money. This is the most common reason. People who want to make some quick bucks and do not care about morality or legality will play every kind of trick to fool you. I will explain how to identify such threats.
- It might a person you know who might try to hack your account, maybe to just have fun with you or to take revenge against you. In any case, you have to be very careful.
- To get your computer’s resources. It might be surprising for you but a huge number of viruses and Trojans actually have a single motive to hack you i.e. to use your computer’s resources to achieve their higher goal. For instance, to carry out an attack against an organization or government, a hacker needs CPU power. His own computer can give him a limited amount of CPU power. So he creates a virus which spreads in thousands of computer. When your computer is infected by such virus, your machine becomes a “slave” which gets involved in the attack by the hacker against his target organization. When thousands of slaves attack the target server, it becomes a powerful tool for the hacker. Also, the hacker hides behind your system and your IP address which makes it difficult for the police authorities to track
him. The situation can be understood better by the following diagram. Zombies are the slave computers and the victim is target organization’s server (although technically zombies can also be victim)