[WEBINAR] Better to Ask Permission? Best Practices for Privacy and Security


Definition - What does Cybercriminal mean?

A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.

Cybercriminals use computers in three broad ways:

  • Select computer as their target: These criminals attack other people's computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.
  • Uses computer as their weapon: They use the computer to carry out "conventional crime", such as spam, fraud, illegal gambling, etc.
  • Uses computer as their accessory: They use the computer to save stolen or illegal data.

Techopedia explains Cybercriminal

Cybercriminals often work in organized groups. Some cybercriminal roles are:

  • Programmers: Write code or programs used by cybercriminal organization
  • Distributors: Distribute and sell stolen data and goods from associated cybercriminals
  • IT experts: Maintain a cybercriminal organization's IT infrastructure, such as servers, encryption technologies and databases
  • Hackers: Exploit systems, applications and network vulnerabilities
  • Fraudsters: Create and deploy schemes like spam and phishing
  • System hosts and providers: Host sites and servers that possess illegal contents
  • Cashiers: Provide account names to cybercriminals and control drop accounts
  • Money mules: Manage bank account wire transfers
  • Tellers: Transfer and launder illegal money via digital and foreign exchange methods
  • Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct cybercriminal teams, and usually lack technical knowledge.

Clearly, there is much overlap between roles, but as cybercrime becomes a greater issue, more specialization is being seen as organized crime gets in the picture. For example, hackers were once more often than not hobbyists who broke into systems for personal gratification. While white-hat hacking hasn't disappeared, it's much more common now to see hackers as professionals who sell their services to the highest bidder.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.