What cyber criminals want
You can defend yourself more effectively and efficiently when you
learn what cyber criminals want, because you'll understand your
high-value vulnerabilities and your significance as a target.
Economic cyber espionage uses APTs to acquire intellectual property
and sensitive information. Ultimately, the threat actor seeks a
long-term economic advantage, either for themselves or on behalf of
their employer. The primary sponsors of cyber espionage include nation
states and businesses competitors. No company is safe, and in fact
many network breaches often begin with attacks on secondary targets
such as vendors in the primary target's supply chain.
Organized cyber crime uses APTs to realize short-term, rapid
financial gain through activities such as credit card theft. Their
cyber attacks are designed to evade traditional cyber security
measures and remain on a victim’s network for a long period of time.
While no business is safe, targets tend to be companies that provide
retail and financial services, including banks and credit card processors.
Nuisance threats and hacktivism
Nuisance threats and hacktivist cyber attacks attempt to interfere
with daily business operations, defame web properties and make
political statements. While embarrassing, they are typically neither
targeted nor persistent. While attackers can be individuals, most are
groups such as Anonymous and LulzSec who use botnets or spam to target
both organizations and individuals.