Skip to content ↓ | Skip to navigation ↓

Results of a survey conducted at this year’s Black Hat 2014 hacking conference in Las Vegas recently revealed the main drivers behind attackers and who they primarily target in attempts to compromise valuable data.

The results showed the greatest risk is bared by contractors and IT administrators, with about 40 percent of respondents claiming they would likely target contractors and 30 percent aiming to hack IT administrators.

Black Hat 2014 Hacker Survey

These type of employees within a company are often capable of directly accessing servers and systems home to loads of sensitive data, therefore, increasing their value to attackers.

“Once an attacker gains control of login credentials, they can swiftly compromise systems and gain control over the network,” said security firm Thycotic, who performed the survey.

“Intruders can scan systems for personally identifiable information, which is even more valuable to many hackers than credit card numbers of login credentials, because they can be sold on the black market and used repeatedly to create fake bank accounts or even file false tax returns.”

Interestingly enough, Thycotic also found the most common motivator of a hacker is simply just “for the thrill of it.” Only 19 percent of respondents actually look for financial gain from their hacking efforts, while nearly 30 percent seek “moral compass” or “social consciousness.”

Black Hat 2014 Hacker Survey

“Contrary to a majority of the news stories we read about ransomware and other forms of cyber blackmail, more than half of hackers who responded are simply curious, bored, or want to test out their abilities,” said Thycotic.

Lastly, an overwhelming majority of hackers (86 percent) surveyed believe they can infiltrate systems without getting caught, making it easier for them to carry on with their hacking activities.

Hackers are now more sophisticated than ever, benefiting from a variety of resources at their disposal and increasing the attacks they are capable of performing.

“The rate in which attacks are performed vastly outweigh how closely systems are monitored,” said Thycotic, allowing hackers to continue to be successful without adding much risk.

Results from the survey were gathered from 127 self-identified “black hat” hackers attending the conference this year.

Read More Here…