Loading...

19 Feb 2026 14:10

Mobile & Digital

What makes a cybercriminal?

Forget balaclavas or hoodies; these cybercriminals are hiding in plain sight

Authored by Jake Moore, Cyber Security Specialist for ESET

In my days when I worked for the police, we would constantly try to profile criminals because it made our investigations easier. We would even regularly use specialist criminal profilers and psychologists to help with slow cases in order to gather additional clues, which at the very least would indicate a direction in determining “whodunnit.”

While I worked in the digital forensics unit, in which I spent nearly a decade, the profiling of a computer criminal became increasingly more difficult to decipher as time went by. However, around 60% of the crimes we reactively investigated were to do with paedophiles, which is a dark part of society to try to reconcile.

Nevertheless, profiling a paedophile in the early days was easier to categorise than, say, a fraudster, as they would usually fall into a small number of predetermined profiled groups. This was more straightforward as we would be told about the offence and then given full access into their computers and phones to look for evidence that would naturally give us an insight into their lives, families and hobbies. Most interesting would be that some would look “normal” on the outside but once you delve into the hard drive and search history, you would start to unravel a darker side.

At its worst, I started to think everyone could potentially be a criminal but I soon realised that if I carried on with that attitude I would simply never have faith in society again. However, the lives into which I would delve, searching for evidence to submit to court, shocked me: to think these people were up until now hidden in plain sight, masquerading as upstanding citizens. My investigations “hit list” of convicted paedophiles included a teacher, a scout leader, a police officer, and even the head of children services from a local council.

In my personal view from meeting these individuals and researching their lives prior to charge and conviction, I would only be able to sum these people up by calling them sociopaths. They were able to convince society that they were respectable and decent human beings, yet able to hide something so dark and sinister behind closed doors.

How does this relate to all cybercriminals? Are they sociopaths too? Well: sadly, it’s not as easy to profile and not that easy to get hold of a series of results to create a synopsis such as when I was in the Digital Forensics Unit with the ability to analyse all those computers from people on bail.

Researching criminals such as murderers, paedophiles, fraudsters and drug dealers all leave evidence on their computers for the digital forensics investigators to locate because of one flaw – they usually aren’t technical. Or at least not technical enough to even think how to mitigate the chance of capture. Yes, they can learn it, but they are usually late to the game when swotting up on forensic traces and hence leave a plethora of evidence leading an investigator back to the perpetrator. Moreover, crimes such as murder are usually in the heat of the moment or derived from passion, which leaves little time to open a TOR browser and buy a weapon with a digital currency.

The face of today’s cybercriminal is relatively unknown (and that’s nothing to do with the fact he/she is usually in a hoodie). The number of arrested cybercriminals is miniscule in comparison to the amount of cybercrimes that take place each year. When someone is arrested for murder or fraud etc., the suspect has phone, tablet and laptop etc. seized in order to search for evidence that may support the case. In more occasions than not, these were needle-in-a-haystack exercises, but at least there was information to go on. On the other hand, those who choose to become cybercriminals often meticulously learn the right skills before striking and learn how to cover their tracks.

In fact, when someone can download an anonymous browser, search in minutes for malware-as-a-service fully equipped with a service hotline and full money back guarantee, then the demographic of someone following simple procedure steps suddenly becomes even harder to predict and profile. In simple terms, anyone can be a cybercriminal. Anyone can learn how to do it in a lunch hour and, with little evidence left behind, it can be argued that it is quite attractive to even the less experienced wannabe “hacker”.

Criminals are still lazy, it’s just they are cleverer nowadays. That’s probably why they don’t walk into banks with a balaclava in a good old fashioned “stick ’em up” anymore. It’s easier to steal stuff online without leaving a ton of evidence behind and – to some – slightly more satisfying.

The problem is, the police get a tough time for “not doing enough” when it comes to combatting cybercrime, yet they are playing a huge cat-and-mouse game with the gap widening by the day. Funding will always be an issue, but that just seems like a quick way of the police saying they can’t do it so they go back to investigating “real world” crimes where DNA and fingerprints lead them to suspects.

Criminals no longer wear balaclavas or hoodies. They are amongst us and hidden in plain sight, which makes understanding them increasingly difficult. Law enforcement are struggling, but just as it may sound like all doom and gloom, there is one small glimpse of a win: prevention. If we all simply up our own game and awareness on security, we all stand a better chance on outing the scams, making them pointless so let’s all take a moment to rethink our awareness. Training and education is a key defence in the war on cybercrime and by working together we will beat the cybercriminals!

NULL
(Visited 6 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandabout usAWSBETpanduan eksklusif menerobos mekanisme mahjong wild deluxe gates of olympus sicbo teknik kalkulasi pembacaan rtp live duta76duta76 mengurai logika simbol mahjong ways 2 pgsoft pola kartu baccarat dan starlight princess melalui teknik observasi berbasis rtp livemembongkar celah peluang jitu mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasi strategi penempatan adaptif duta76mengurai mekanisme simbol mahjong ways 2 pgsoft putaran roulette scatter wild west gold melalui taktik kalkulasi entropi berbasis peluang terukur duta76teknik membaca peluang mahjong wins 3 pragmatic sabung ayam sv388 blackjack lewat analisa ritme siklus strategi kalkulasi presisi adaptif duta76membongkar logika simbol mahjong wild deluxe pola dadu sicbo cascade gates of olympus strategi observasi frekuensi berbasis data perihokianalisa perihoki volatilitas mahjong ways 2 pgsoft baccarat starlight princess taktik pola rtp live dan teknik prediksi peluang lintas permainanpemetaan anomali rtp live sweet bonanza blackjack mahjong wins 3 pragmatic strategi pembacaan pola silang taktik manajemen berbasis frekuensi perihokidekonstruksi siklus bonus wild bounty hunter putaran roulette frekuensi mahjong ways 2 pgsoft melalui taktik analitis eksklusif berbasis rtp live terukur perihokitaktik mendeteksi ritme sabung ayam sv388 mahjong wins 3 pragmatic blackjack pendekatan kalkulasi pola presisi terjamin perihokiteknik pembacaan pola multiplier cascade distribusi tile dalam gates of olympus mahjong wild deluxe sicbo dengan kalkulasi terukur perihokipanduan holistik menembus mekanisme distribusi kartu baccarat simbol mahjong ways 2 pgsoft multiplier starlight princess melalui taktik analisa rtp live perihokimenavigasi pola cluster sweet bonanza siklus kartu blackjack tile mahjong wins 3 pragmatic analisa momentum rtp live adaptif taktik lintas perihokitaktik mendeteksi ritme kemenangan wild west gold mahjong ways 2 pgsoft roulette pendekatan probabilitas kalkulasi momentum presisi eksklusif duta76mengurai mekanisme distribusi simbol mahjong wins 3 pragmatic kartu blackjack sabung ayam sv388 melalui taktik kalkulasi berbasis peluang terukur duta76aws grid rtp mahjongaws logika matematika mahjongaws logika strategi mahjongaws pengelolaan modal mahjongaws perubahan alur mahjongaws sinkronisasi simbol mahjongaws strategi rahasia mahjongaws tempo respon mahjongaws variasi pola mahjongaws wild momentum mahjongaws adaptasi transisi mahjongaws analisis keputusan mahjongaws analisis retrigger mahjongaws deteksi suasana mahjongaws pembaruan sistem mahjongaws perubahan tempo mahjongaws target awal mahjongaws tips statistik mahjongaws transisi fase mahjongaws wild emas mahjonge4 formula stabil dengan evaluasi rtp berkalae4 manajemen saldo profesional dalam mahjong wins 3e4 mental tangguh ala atlet olimpiade untuk scatter hitam mahjong wins 2e4 metode main disiplin dengan rtp stabil paling dicarie4 mindset juara dan pola main konsisten mahjong wins 2e4 optimasi hasil dengan strategi data drivene4 pendekatan modern mahjong wins berbasis statistike4 pendekatan terstruktur mengikuti irama sistemdekonstruksi mekanik scatter hitam mahjong ways akumulasi tinggimanajemen finansial terpadu dinamika putaran mahjong winsevolusi algoritma mahjong ways 2 arena ketangkasan digital 2026analisis sinkronisasi energi multiplier starlight princess fase akumulasirekonstruksi mekanik multiplier sugar rush 1000 konsistensi hasilintegrasi narasi budaya multiplier gates of gatot kaca strategi digitalmetodologi pemetaan roda keempat aztec gems peluang transisidekonstruksi mekanik tumble multiplier sweet bonanza akumulasi terstrukturanalisis volatilitas sticky wild wild west gold stabilitas sesiharmonisasi ekspansi simbol koi gate ketahanan saldo ritme bermainefektivitas multiplier berjenjang lucky neko pertumbuhan hasilkajian teknik hold and spin great rhino megaways capaian finansialanalisis struktur peluang buffalo king algoritma komputasimekanisme sticky wild multiplier the dog house stabilitas hasilimplementasi strategi hammer multiplier power of thor ritme akumulasistrategi dekonstruksi pola mahjong wild 2 dadu sicbo gates of olympus lewat analisa siklus rtp live dan teknik pembacaan momentum duta76pola starlight princess siklus kartu baccarat mahjong ways 2 pgsoft pendekatan analisa momentum rtp live adaptif taktik cerdas duta76taktik mendeteksi ritme kemenangan sweet bonanza mahjong wins 3 pragmatic blackjack pendekatan kalkulasi momentum eksklusif duta76metode penetrasi algoritma mahjong ways 2 pgsoft roulette wild bounty showdown melalui interpretasi rtp live dan arsitektur peluang duta76peluang sabung ayam sv388 mahjong wins 3 pragmatic blackjack lewat pembacaan pola dan manipulasi threshold volatilitas rtp live berbasis data duta76mengurai mekanisme distribusi simbol mahjong wild 2 kombinasi dadu sicbo dan cascade gates of olympus melalui taktik kalkulasi peluang terukur perihokiteknik eksklusif membaca peluang mahjong ways 2 pgsoft starlight princess baccarat analisa ritme siklus strategi kalkulasi presisi perihokimembongkar celah peluang mahjong wins 3 pragmatic blackjack sweet bonanza melalui teknik observasidan strategi penempatan adaptif perihoki cerdasdeteksi irama wild west gold mahjong ways 2 pgsoft roulette dengan kalibrasi bias probabilitas dan komputasi jejak momentum perihoki eksklusifstrategi mahjong wins 3 pragmatic blackjack sabung ayam sv388 via dekripsi irama subliminal dan instrumentasi rtp live jitu perihokipanduan eksklusif menerobos volatilitas tersembunyi dadu sicbo mahjong wild 2 gates of olympus dengan teknik cross pattern manajemen siklus adaptif cerdas perihokipemetaan anomali rtp live starlight princess baccarat mahjong ways 2 pgsoft strategi pembacaan pola taktik manajemen berbasis data akurat presisi perihokimengeksploitasi frekuensi tumble sweet bonanza entropi blackjack mahjong wins 3 pragmatic lewat strategi cross analisa rtp live jitu perihokiteknik penetrasi peluang mahjong ways 2 pgsoft wild bounty showdown roulette via modulasi siklus laten dan konstruksi volatilitas duta76 cerdaslogika tersembunyi blackjack sabung ayam sv388 mahjong wins 3 pragmatic dengan disrupsi arsitektur pola rtp live dan interpolasi peluang duta76rekonstruksi pola pertahanan rise of samurai optimasi performaanalisis cluster multiplier fruit party efisiensi putaranteknik pengambilan keputusan real time spaceman akurasi targetpemetaan variasi multiplier 5 lions megaways pengembalian hasilanalisis respin mekanik cleocatra keberlanjutan durasi bermainmetodologi penangkapan simbol big bass splash ritme algoritmainterpretasi teknis dinamika multiplier madame destiny arah putaraneksplorasi pengganda nilai wild bounty showdown target strategis 50 jutaanalisis frekuensi multiplier starlight princess akumulasi nilaistrategi pengaturan saldo sugar rush 1000 target 70 juta Top