May 26, 2011

The Cybercrime ‘Five’ Part Two: Hacktivist

Carl Leonard Principal Security Analyst



Who: When hackers are motivated by social, political, religious, environmental or other personal beliefs, they fall under this category. Normally thought of as natural-fiber wearing picketers with hand written cardboard signs or hanging out of trees in protest, these activists have swapped the spray paint for the keyboard and frequently use a variety of software tools readily available on the Internet to get their message across to the larger audience.

Why: Attention. Cyberspace is huge and a perfect platform to carry out their operations. Usually there is no direct financial gain. They are usually content with embarrassing or inconveniencing their opponents by defacing websites, arranging redirects, denial-of-service attacks or information theft/ disclosure. Forms of hacktivism also include web site parodies, anonymous blogging and virtual sit-ins (a variation of denial of service) and they can slip into corporate-espionage mode if it means they can weaken the opponent.

What : WikiLeaks has to be the most high profile example from recent months. WikiLeaks is an international non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers. Its website, launched in 2006 claimed a database of more than 1.2 million documents within a year of its launch. Originally launched as a user-editable wiki, the site moved towards a more traditional publication model and no longer accepts user comments or edits.

Carl Leonard

Principal Security Analyst

Carl Leonard is a Principal Security Analyst within Forcepoint X-Labs. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Labs teams. Focusing on protecting companies against the latest cyberattacks that...

Read more articles by Carl Leonard

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.