Loading...

10 Apr 2026 04:42

Mobile & Digital

What makes a cybercriminal?

Forget balaclavas or hoodies; these cybercriminals are hiding in plain sight

Authored by Jake Moore, Cyber Security Specialist for ESET

In my days when I worked for the police, we would constantly try to profile criminals because it made our investigations easier. We would even regularly use specialist criminal profilers and psychologists to help with slow cases in order to gather additional clues, which at the very least would indicate a direction in determining “whodunnit.”

While I worked in the digital forensics unit, in which I spent nearly a decade, the profiling of a computer criminal became increasingly more difficult to decipher as time went by. However, around 60% of the crimes we reactively investigated were to do with paedophiles, which is a dark part of society to try to reconcile.

Nevertheless, profiling a paedophile in the early days was easier to categorise than, say, a fraudster, as they would usually fall into a small number of predetermined profiled groups. This was more straightforward as we would be told about the offence and then given full access into their computers and phones to look for evidence that would naturally give us an insight into their lives, families and hobbies. Most interesting would be that some would look “normal” on the outside but once you delve into the hard drive and search history, you would start to unravel a darker side.

At its worst, I started to think everyone could potentially be a criminal but I soon realised that if I carried on with that attitude I would simply never have faith in society again. However, the lives into which I would delve, searching for evidence to submit to court, shocked me: to think these people were up until now hidden in plain sight, masquerading as upstanding citizens. My investigations “hit list” of convicted paedophiles included a teacher, a scout leader, a police officer, and even the head of children services from a local council.

In my personal view from meeting these individuals and researching their lives prior to charge and conviction, I would only be able to sum these people up by calling them sociopaths. They were able to convince society that they were respectable and decent human beings, yet able to hide something so dark and sinister behind closed doors.

How does this relate to all cybercriminals? Are they sociopaths too? Well: sadly, it’s not as easy to profile and not that easy to get hold of a series of results to create a synopsis such as when I was in the Digital Forensics Unit with the ability to analyse all those computers from people on bail.

Researching criminals such as murderers, paedophiles, fraudsters and drug dealers all leave evidence on their computers for the digital forensics investigators to locate because of one flaw – they usually aren’t technical. Or at least not technical enough to even think how to mitigate the chance of capture. Yes, they can learn it, but they are usually late to the game when swotting up on forensic traces and hence leave a plethora of evidence leading an investigator back to the perpetrator. Moreover, crimes such as murder are usually in the heat of the moment or derived from passion, which leaves little time to open a TOR browser and buy a weapon with a digital currency.

The face of today’s cybercriminal is relatively unknown (and that’s nothing to do with the fact he/she is usually in a hoodie). The number of arrested cybercriminals is miniscule in comparison to the amount of cybercrimes that take place each year. When someone is arrested for murder or fraud etc., the suspect has phone, tablet and laptop etc. seized in order to search for evidence that may support the case. In more occasions than not, these were needle-in-a-haystack exercises, but at least there was information to go on. On the other hand, those who choose to become cybercriminals often meticulously learn the right skills before striking and learn how to cover their tracks.

In fact, when someone can download an anonymous browser, search in minutes for malware-as-a-service fully equipped with a service hotline and full money back guarantee, then the demographic of someone following simple procedure steps suddenly becomes even harder to predict and profile. In simple terms, anyone can be a cybercriminal. Anyone can learn how to do it in a lunch hour and, with little evidence left behind, it can be argued that it is quite attractive to even the less experienced wannabe “hacker”.

Criminals are still lazy, it’s just they are cleverer nowadays. That’s probably why they don’t walk into banks with a balaclava in a good old fashioned “stick ’em up” anymore. It’s easier to steal stuff online without leaving a ton of evidence behind and – to some – slightly more satisfying.

The problem is, the police get a tough time for “not doing enough” when it comes to combatting cybercrime, yet they are playing a huge cat-and-mouse game with the gap widening by the day. Funding will always be an issue, but that just seems like a quick way of the police saying they can’t do it so they go back to investigating “real world” crimes where DNA and fingerprints lead them to suspects.

Criminals no longer wear balaclavas or hoodies. They are amongst us and hidden in plain sight, which makes understanding them increasingly difficult. Law enforcement are struggling, but just as it may sound like all doom and gloom, there is one small glimpse of a win: prevention. If we all simply up our own game and awareness on security, we all stand a better chance on outing the scams, making them pointless so let’s all take a moment to rethink our awareness. Training and education is a key defence in the war on cybercrime and by working together we will beat the cybercriminals!

NULL
(Visited 7 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/era77https://ayodonktolong.pages.dev/stc76analisis teknis psikologi mekanisme mahjong ways 2teknik memahami indikator balikan pola tersembunyianalisis alur pemain ahli scatter hitamrekonstruksi matriks scatter mahjong ways 2arsitektur mekanik mahjong wins 3 analis profesionalrahasia cuan hujan deras mahjong ways 2026cara instan hasil maksimal mahjong wins scatter hitambocoran angka hasil mahjong ways april 2026riset indikator balikan mahjong viral macau abc1131alasan analis abc1131 bocoran indikator terbukae5 pola adaptif bermain berdasarkan tren rtp hariane5 pola spin terarah sebagai kunci stabilitas rtpe5 rahasia pola scatter dan wild yang sering diabaikan pemaine5 rahasia tersembunyi scatter dan wild akhirnya terungkap lewat analisis algoritmae5 strategi berbasis algoritma dalam mengidentifikasi scatter dan wilde5 strategi bermain adaptif berbasis analisis rtp hariane5 strategi bermain modern dengan pendekatan analisis rtp hariane5 strategi dinamis permainan mengacu pada analisis rtp hariane5 strategi efektif berbasis evaluasi rtp hariane5 strategi fleksibel permainan berlandaskan data rtp hariane5 strategi maksimalkan rtp dengan pola spin terarahe5 strategi memanfaatkan tumble mahjong ways dalam kombinasi beruntune5 strategi mengurai pola scatter dan wild berbasis sistem algoritmaanalisis distribusi hasil pada mahjong ways dan wild banditoanalisis pola mahjong ways dalam mengamati variasi hasilpendekatan observasional mahjong ways 2 terhadap frekuensimahjong wins 3 dalam studi sesi responsanalysis pola permainan mahjong ways dan dinamika rtpe5 strategi modern membaca scatter dan wild dengan pendekatan sistematise5 strategi responsif permainan dari evaluasi rtp hariane5 strategi spin disiplin dalam mengontrol pergerakan rtpe5 strategi taktis permainan mengikuti pergerakan rtp hariane5 strategi terukur dengan dukungan analisis rtp hariane5 struktur tumble mahjong ways dalam menciptakan kombinasi panjange5 studi komparatif industri game lokal dan global dinamika dan peluang di indonesiae5 studi mekanisme tumble mahjong ways untuk kombinasi panjange5 studi perbandingan model bisnis game lokal dan internasional masa depan industri digital indonesiaaws analisis scatter starlight multiplier sesiaws arsitektur data mahjong output pengalamanaws emas antam rtp mahjong trenaws kebiasaan online mahjong rekomendasi minataws kebiasaan tab mahjong beranda informasiaws minat digital mahjong ways perhatianaws minat generasi digital mahjong berandaaws probabilitas simbol mahjong siklus interaksiaws tren mahjong data realtime aktivitasaws waktu akses mahjong visibilitas penggunaekstraksi peluang analisa pola mahjong wild deluxe teknik dadu sicbo strategi rtp live gates of olympusarsitektur probabilitas teknik peluang baccarat analisa pola mahjong ways 2 pgsoft strategi rtp live starlight princesskalibrasi probabilitas teknik analisa blackjack strategi pola mahjong wins 3 pragmatic taktik rtp live sweet bonanzarekayasa rotasi taruhan analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi teknik rtp live wild west goldspektrum risiko multidimensi taktik peluang sv388 analisa blackjack strategi pola mahjong wins 3 pragmatic teknik rtp live sugar rushsinkronisasi taktik peluang dadu sicbo analisa rtp live gates of olympus strategi pola mahjong wild deluxe patenanatomi kemenangan taktik pola mahjong ways 2 pgsoft analisa strategi rtp live starlight princess teknik peluang baccaratpemetaan spektrum volatilitas strategi peluang blackjack teknik analisa rtp live sweet bonanza taktik pola mahjong wins 3 pragmaticmanajemen bantalan risiko teknik analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi rtp live wild west goldnavigasi kontras probabilitas teknik taktik blackjack analisa peluang sv388 strategi pola mahjong wins 3 pragmatic rtp live sugar rushmekanika kemenangan teknik dadu sicbo analisa pola mahjong wild deluxe taktik rtp live gates of olympussinergi taruhan taktis analisa peluang baccarat teknik pola mahjong ways 2 pgsoft strategi rtp live starlight princessagresi taruhan terstruktur taktik peluang blackjack analisa pola mahjong wins 3 pragmatic teknik strategi rtp live sweet bonanzaeksekusi hibrida terkalkulasi taktik analisa peluang roulette strategi pola mahjong ways 2 pgsoft teknik rtp live wild west goldekspansi taruhan terukur analisa strategi rtp live sugar rush teknik pola mahjong wins 3 pragmatic taktik peluang sv388 blackjackadaptasi kemenangan live casino taktik mahjong ways terbaru pastikan 5 lions megawaysadaptasi rtp live pastikan mahjong ways deluxe memecahkan gates of gatotkacadekonstruksi peluang roullete mampu tingkatkan rtp mahjong ways 2 tanpa sweet bonanza super scattereksplorasi teknik baccarat dengan pola fortune gods pastikan starlight archer 1000fakta terbaru dari dragon tiger mampu wild bounty showdown rtp live gates of olympus deluxeformula rtp live deluxe mahjong wins 3 dengan teknik baccarat tanpa pola aztec gemsmembaca rtp live sicbo algoritma mahjong wins menghasilkan fortune of olympuspenguasaan tanpa pola rtp live deluxe mahjong wins 2 lebih terpercaya starlight princess x1000rasio kemenangan sicbo saat rtp mahjong wins black scatter terbaru sweet bonanza superrasio lebih memilih dragon tiger saat mahjong black scatter menguasai starlight princessrasio lebih memilih roullete saat mahjong ways terpercaya rtp gates of olympus deluxestrategi memecahkan baccarat sesuai mahjong ways deluxe dengan teknik gates of olympusstrategi probabilitas mahjong ways 2 menggunakan baccarat deluxe pecahkan starlight princessstrategi ritme roullete memecahkan peluang mahjong ways 2 pastikan sweet bonanza xmasvoltalitas kemenangan sicbo berhasil capai puncak mahjong ways dengan gates of olympus x1000analisis wild bandito terhadap pola distribusi hasilpendekatan sistematis wild bandito dalam mengamati variasi fitur permainanwild bandito dalam studi pola permainanevaluasi pola wild bandito dalam konteks distribusi dan frekuensi hasilanalisis multiplier gates of olympusaws distribusi simbol mahjong probabilitas lanjutanaws optimalisasi ambang sweet bonanza variansiaws algoritma personalisasi mahjong beranda dataaws micro engagement mahjong popularitas digitalaws struktur probabilistik mahjong kombinasi eliminasiaws algoritma konten mahjong tren interaksiaws analisis kuantitatif sweet bonanza variansiaws distribusi simbol mahjong grid kuantitatifaws ketahanan sistem mahjong simulasi deterministikaws mahjong platform digital evolusi kontenaws analisis kognitif wild bounty interaksiaws fase transisi mahjong algoritma polaaws kerangka mahjong data heterogen operasionalaws metadata semantik starlight analisis dataaws pendekatan stokastik mahjong variasi hasilanalisis waktu terbaik pola penyeimbang mahjong waysrahasia konsistensi pola stabil mahjong wins 3update pola real time mahjong ways april 2026rahasia indikator balikan mahjong ways 2 gacorbedah matematika grid tumble mahjong ways 2optimasi performa mahjong wins 3 balikan real timeformasi sinkronisasi tumble mahjong ways kombinasievaluasi algoritma balikan performa sistem interaktifviral forum strategi indikator mahjong wayslaporan tren mahjong ways april 2026sinkronisasi taktik jitu peluang dadu sicbo analisa rtp live gates of olympus strategi pola mahjong wild deluxe patenanatomi kemenangan mutlak taktik pola mahjong ways 2 pgsoft analisa strategi rtp live starlight princess teknik peluang baccaratpemetaan spektrum volatilitas strategi paten peluang blackjack teknik analisa rtp live sweet bonanza taktik pola mahjong wins 3 pragmaticmanajemen bantalan risiko gunakan teknik analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi rtp live wild west goldnavigasi kontras probabilitas teknik bagus taktik blackjack analisa peluang sv388 strategi pola mahjong wins 3 pragmatic rtp live sugar rush Top