{"id":2136,"date":"2020-12-31T09:30:00","date_gmt":"2020-12-31T09:30:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2136"},"modified":"2020-12-31T03:13:31","modified_gmt":"2020-12-31T03:13:31","slug":"hacker-motivation-why-do-hackers-hack","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/","title":{"rendered":"Hacker Motivation: Why Do Hackers Hack?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.bromium.com\/wp-content\/uploads\/2018\/05\/Into-the-Web-of-Profit_Bromium.pdf\">Bromium<\/a> reports that high-end cybercriminals make $166,000+ per year and the middle-income range for hackers is $75,000 a year! But is money the only hacker motivation? Let\u2019s find out!<\/h2>\n\n\n\n<p>Hacking is a highly risky game. Most countries have robust security laws and cybersecurity departments working hand-in-hand with local law enforcement officials to catch cybercriminals. To be a successful hacker, apart from having expertise in technology, people also need to know how to monetize their hacking skills without getting caught. You also need to have a strong hacker motivation.<\/p>\n\n\n\n<p>But why would a talented person with vast knowledge in information technology and financial channels choose to take the risk of hacking? What are their hacker motivations? Let\u2019s explore seven hacker motivation factors in this article to understand why do hackers do what they do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Motivation of Hackers: Why Do Hackers Do What They Do?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 1: Achieving Financial Gains<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-1024x640.jpg\" alt=\"hacker motivation graphic: a photograph of cryptocurrency collectible coins.\" class=\"wp-image-1618 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-1024x640.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-300x188.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-560x350.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-1536x960.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-940x588.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types-480x300.jpg 480w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/10\/mining-cryptocurrency-types.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>A photograph of cryptocurrency collectible coins to illustrate how hackers make money via cybercrimes.<\/figcaption><\/figure><\/div>\n\n\n\n<p>Now this one is a pretty obvious hacker motivation. Money is a <em>huge<\/em> motivation for many types of criminals \u2014 and cybercriminals are no different. In fact, <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">Verizon\u2019s 2020 Data Breach Investigations Report<\/a> (DBIR) shares that 86% of the data breaches they analyzed were financially motivated.\u00a0<\/p>\n\n\n\n<p>When hackers profit financially at the cost of others by doing illegal activities, they typically fall within the black hat hacker camp. But hackers can earn money legally, too. They are called <a href=\"https:\/\/sectigostore.com\/blog\/white-hat-hacker-ethical-hacker\/#:~:text=Basically%2C%20white%20hat%20hackers%20are,for%20their%20own%20nefarious%20purposes.\">white hat hackers<\/a>, or ethical hackers. (We\u2019ll talk about them towards the end of this article.)<\/p>\n\n\n\n<p>These are several common methods by which hackers (black hat hackers, especially) get financial gains.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Misusing Data<\/h4>\n\n\n\n<p>Hackers steal victims\u2019 financial or personally identifiable information (PII) through a variety of different tactics, including using <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">malware<\/a>, <a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\">phishing attacks<\/a>, and brute-force attacks. They can then use the data to carry out financial fraud by making fraudulent purchases or transferring money to their (hackers&#8217;) bank account.<\/p>\n\n\n\n<p>Hackers might also execute the following identity theft-related crimes using your PII:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apply for a loan in your name.<\/li><li>Make fake passport\/immigration documents.<\/li><li>Open a bank account or apply for a credit card in your name and use the overdraft\/credit limit.<\/li><li>Send <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a>, <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-smishing-definition-examples-protection-tips\/\">SMS phishing messages<\/a>, and voice call impersonating you.<\/li><li>Create a fake social media account in your name (which they can use to scam other targets).<\/li><li>File for state\/federal benefit schemes like unemployment benefits impersonating you.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Selling Data on the Dark Web<\/h4>\n\n\n\n<p>Some hackers sell the data they steal on the dark web. Basically, this is an underground marketplace where hackers and other cybercriminals can engage in legal and illegal activities. Other hackers buy personal and sensitive data to execute financial fraud and other PII-related crimes. Even unscrupulous online advertisers and marketers are interested in such data. They can use it to craft targeted advertising or send spam emails.<\/p>\n\n\n\n<p>Either way, it\u2019s a lose-lose situation if your information becomes compromised as a result of this hacker motivation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Blackmailing Victims<\/h4>\n\n\n\n<p>Blackmail is a very powerful tool in any cybercriminal\u2019s arsenal, including hackers. For example, hackers can steal confidential data or intercept personal media files (images, videos, etc.) and demand money to not release the information publicly. They also can encrypt important data or lock users out of their own devices, then demand the ransom in exchange for access.<\/p>\n\n\n\n<p>Hackers use special types of malware such as <a href=\"https:\/\/sectigostore.com\/blog\/5-best-ransomware-protection-tips-to-protect-your-organization\/\">ransomware<\/a> and spyware to steal data and lock compromised devices. Sometimes, hackers breach companies or government agencies&#8217; databases to gain access to their data. They then demand extortion money for not revealing their trade secrets or other sensitive information in the public domain.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Selling Malware<\/h4>\n\n\n\n<p>Some hackers are programmers who write the code for various <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">types of malware<\/a>, including worms, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\">trojans<\/a>, viruses, scareware, and rootkits, etc. They can either use these malware programs or sell them to other cybercriminals.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Using Psychological Manipulation and Social Engineering<\/h4>\n\n\n\n<p>Phishing is one of the most commonly used tactics by cybercriminals. Hackers send phishing messages to victims impersonating any person or company they (victims) trust. They psychologically manipulate victims into sending them money by:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Claiming to be experiencing a fake emergency and needing their help.<\/li><li>Blaming the victims for breaking a law and demanding they pay a penalty.<\/li><li>Asking for a donation while impersonating a legitimate charity or non-profit organization.<\/li><li>Fraudulently claiming the victim\u2019s computer has a virus infection and offering phony malware removal service (which may result in the target\u2019s computer getting infected or otherwise compromised).<\/li><li>Tricking or manipulating them into buying fake software\/products\/educational materials.<\/li><\/ul>\n\n\n\n<p>These are just some techniques hackers use to make money. As you can see, their methods involve lying, manipulating, threatening, and blackmailing victims and other targets.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 2: Carrying Out Political Agendas<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-1024x640.jpg\" alt=\"hacker motivation graphic is a photograph of a hacker in front of a computer with locations he's targeting with cyber attacks on a map\" class=\"wp-image-2138 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-1024x640.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-300x188.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-560x350.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-1536x960.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-940x588.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors-480x300.jpg 480w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation-nation-state-actors.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>A photograph illustrating a nation-state hacker targeting specific locations with cyber attacks.<\/figcaption><\/figure><\/div>\n\n\n\n<p>Some countries\u2019 governments hire hackers for political espionage. In these cases, the hackers who engage in <a href=\"https:\/\/blog.radware.com\/security\/2019\/12\/the-state-sponsored-cyberthreat-landscape\/#:~:text=In%20recent%20years%2C%20large%2Dscale,as%20Iran%20and%20North%20Korea.\">state-sponsored cyber attacks<\/a> become known as nation-state actors. In this type of role, hackers are assigned duties such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Stealing sensitive, confidential, or classified data (research, trade secrets, or even personal information on specific targets).<\/li><li>Manipulating or otherwise interfering with elections.<\/li><li>Stealing or leaking government or military documents.<\/li><li>Interfering with the economy.<\/li><li>Interfering or affecting relationships or treaties with other nations.<\/li><\/ul>\n\n\n\n<p>The hiring governments often release the compromised or breached data to the public to cause political unrest in the enemy country. Hackers also hack or deploy cyber attacks like <a href=\"https:\/\/sectigostore.com\/blog\/ddos-attack-statistics-a-look-at-the-most-recent-and-largest-ddos-attacks\/\">DDoS attacks<\/a> on the rival county\u2019s government websites and servers to cause functional or operational disruptions. These types of attacks are also known as <a href=\"https:\/\/blog.radware.com\/security\/2019\/12\/the-state-sponsored-cyberthreat-landscape\/#:~:text=In%20recent%20years%2C%20large%2Dscale,as%20Iran%20and%20North%20Korea.\">state-sponsored cyber attacks<\/a>. Countries like Iran, China, North Korea, and Russia are notorious for using these types of tactics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 3: Performing Corporate Espionage<\/h3>\n\n\n\n<p>Some companies hire hackers for stealing confidential information from rival firms. In these situations, hackers are assigned to find leaky or vulnerable databases or launch attacks on the target organization\u2019s servers or websites. They can attack in multiple ways, including using <a href=\"https:\/\/aboutssl.org\/what-is-brute-force-attack-how-to-prevent-it\/\">brute force attacks<\/a>, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-sql-injection-8-tips-on-how-to-prevent-sql-injection-attacks\/\">SQL injections<\/a>, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-cross-site-scripting-how-to-prevent-cross-site-scripting-attacks\/\">cross-site scripting<\/a>, and DDoS attacks.<\/p>\n\n\n\n<p>But just what types of information are the hackers looking for? The target data can be virtually anything but often falls within the following categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Trade secrets,<\/li><li>Key customers, suppliers, vendors,<\/li><li>Pricing information,<\/li><li>Data regarding future financial and marking planning,<\/li><li>Technical schematics or sensitive product information.<\/li><\/ul>\n\n\n\n<p>Some companies hire hackers to slow down or crash a competitor\u2019s website by deploying DDoS attacks. This type of attack essentially overwhelms the organization\u2019s web servers, making them unavailable for the customers. They may also choose to leak confidential customer data to ruin the rival\u2019s reputation.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 4: Proving a Point (Hacktivist)<\/h3>\n\n\n\n<p>Some hackers don\u2019t care about money. Instead, they hack to prove their social, ethical, religious, or political views or to force their views upon others.<\/p>\n\n\n\n<p>For example 1: To show their protest and anger against the death of Iran\u2019s late major general Qassim Soleimani, Iranian hackers attacked the U.S. Federal Depository Library Program\u2019s website in January 2020 to <a href=\"https:\/\/www.nytimes.com\/2020\/01\/06\/us\/iran-hack-federal-depository-library.html\" target=\"_blank\" rel=\"noreferrer noopener\">display an image<\/a>&nbsp;of President Donald Trump over a map of the Middle East.&nbsp;<\/p>\n\n\n\n<p>Example 2: In July 2015, a hacktivist group calling themselves the &#8220;Impact Team&#8221; hacked the online cheating website Ashley Madison. The result? The <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2020\/02\/01\/ashley-madison-hack-returns-to-haunt-its-victims-32-million-users-now-have-to-watch-and-wait\/?sh=7ada6d7d5677\">personal data of 32 million members<\/a> was published publicly. They released the members\u2019 data to teach the members a lesson and make the owner shut down the site.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"760\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/impactteam-ashley-madison-hack.png\" alt=\"A snippet from the Ashley Madison website hack from krebsonsecurity.com\" class=\"wp-image-2139 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/impactteam-ashley-madison-hack.png 671w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/impactteam-ashley-madison-hack-265x300.png 265w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/impactteam-ashley-madison-hack-560x634.png 560w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><figcaption>Image source: <a href=\"https:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/\">krebsonsecurity.com<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 5: Taking Personal Revenge<\/h3>\n\n\n\n<p>Some hackers use their hacking skills to take personal revenge on a person or company for a real or perceived injustice. The hackers harass their nemesis in many ways, such as by:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Locking their targets\u2019 devices.<\/li><li>Encrypting or deleting their data.<\/li><li>Publishing the confidential data\/personal media files to the public (called <a href=\"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/\">doxxing<\/a>).<\/li><li>Sending them numerous spam and phishing emails.<\/li><li>Hacking their social media profiles and posting false or inappropriate content.<\/li><li>Hacking their email accounts and sending phishing emails to their contacts.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 6: Causing Harm for Personal Enjoyment<\/h3>\n\n\n\n<p>Some black hat hackers hack just to create chaos or to cause harm or panic. They relish ruining the reputation of a person or company, interrupting governments&#8217; activities, or destroying important data. They might be addicted to hacking and feel a sense of achievement when they hack a system or defraud someone.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hacker Motivation 7: Mitigating Cyber Threats<\/h3>\n\n\n\n<p>This is the last hacker motivation that we\u2019re going to talk about in this article. Hackers sometimes hack to attack or stop other hackers from doing bad things. These types of hackers typically either fall in the white hat or red hat categories.<\/p>\n\n\n\n<p>White hat hackers, or ethical hackers, hack to protect websites, servers, and databases from black hat hackers who want to cause harm. White hat hackers employ the same hacking techniques as black hat hackers, but they do it with the system owner&#8217;s permission and stick to legal methods. Companies and government agencies hire them as information security analysts, cybersecurity researchers, security specialists, penetration testers, etc. They work as independent consultants or freelancers as well.<\/p>\n\n\n\n<p>White hat hackers\u2019 intentions are typically to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Find and fix vulnerabilities in the system before black hat hackers exploit them.<\/li><li>Develop security software that detects and removes malware.<\/li><li>Educate users about various cyber threats and ways to prevent them.<\/li><li>Make contingency plans in the event of a <a href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\">cyber attack<\/a>.<\/li><li>Strengthen the overall security posture of the software and hardware components.<\/li><\/ul>\n\n\n\n<p>But there is also a different type of hacker that also likes to target the bad guys: red hat hackers. Red hats are like black hats in that they don\u2019t typically stick to legal routes with their attacks and will hack without authorization. However, instead of targeting businesses and other legitimate users, they\u2019ll instead attack other hackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other Hacker Motivations<\/h3>\n\n\n\n<p>Of course, there are also other types of hacker motivations that we haven&#8217;t yet talked about. Two of the most basic ones are human curiosity and a desire to learn. There are some hackers who are new or inexperienced who just want to expand their knowledge and skills and &#8220;flex their muscles&#8221; as the phrase goes. <\/p>\n\n\n\n<p>Of course, there are also hackers who do what they do because they want to achieve notoriety and make a name for themselves. But regardless of their reason for hacking, there\u2019s a lot we can learn from hackers and their motivations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Words on Hacker Motivation<\/h2>\n\n\n\n<p>As you read above, not all hackers have evil motivations. Security professionals that work to protect our data and systems are also called hackers, but these are the white hat hackers with good intentions. Now that you know the motivation of hackers, you should check also check out the <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/\">six different types of hackers<\/a> to see how they differ. Also, check out this <a href=\"https:\/\/sectigostore.com\/blog\/white-hat-hacker-vs-black-hat-hacker\/\">black hat hacker vs white-hat hacker article<\/a> to know which type of activities both the hackers are involved in.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bromium reports that high-end cybercriminals make $166,000+ per year and the middle-income range for hackers is $75,000 a year! But is money the only hacker motivation? Let\u2019s find out! Hacking&#8230;<\/p>\n","protected":false},"author":6,"featured_media":2140,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[176],"class_list":["post-2136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-hackers","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"We do hackers hack? From greed to helping others, we explore hacker motivation &amp; what leads hackers to use their skills for good or evil.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"We do hackers hack? From greed to helping others, we explore hacker motivation &amp; what leads hackers to use their skills for good or evil.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-31T09:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"Hacker Motivation: Why Do Hackers Hack?\",\"datePublished\":\"2020-12-31T09:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/\"},\"wordCount\":1822,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/hacker-motivation.jpg\",\"keywords\":[\"hackers\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/\",\"name\":\"Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/hacker-motivation.jpg\",\"datePublished\":\"2020-12-31T09:30:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"We do hackers hack? From greed to helping others, we explore hacker motivation & what leads hackers to use their skills for good or evil.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/hacker-motivation.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/hacker-motivation.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/hacker-motivation-why-do-hackers-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker Motivation: Why Do Hackers Hack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights","description":"We do hackers hack? From greed to helping others, we explore hacker motivation & what leads hackers to use their skills for good or evil.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights","og_description":"We do hackers hack? From greed to helping others, we explore hacker motivation & what leads hackers to use their skills for good or evil.","og_url":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/","og_site_name":"InfoSec Insights","article_published_time":"2020-12-31T09:30:00+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"Hacker Motivation: Why Do Hackers Hack?","datePublished":"2020-12-31T09:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/"},"wordCount":1822,"image":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg","keywords":["hackers"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/","url":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/","name":"Hacker Motivation: Why Do Hackers Hack? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg","datePublished":"2020-12-31T09:30:00+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"We do hackers hack? From greed to helping others, we explore hacker motivation & what leads hackers to use their skills for good or evil.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/hacker-motivation.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/hacker-motivation-why-do-hackers-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacker Motivation: Why Do Hackers Hack?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2136"}],"version-history":[{"count":1,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2136\/revisions"}],"predecessor-version":[{"id":2141,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2136\/revisions\/2141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2140"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}