Click to chat
  • Solutions
    • Solutions
    • Artificial Intelligence
    • Data Analytics
    • Epicor for Distribution
    • Epicor for Manufacturing
    • IT Support
    • Managed Services
    • Microsoft 365
    • Microsoft Azure
    • Microsoft Licensing Support
    • Security
  • Innovation
    • Innovation
    • AI for Epicor
    • Cybersecurity
    • Data Analytics
    • Epicor in Azure
    • Epicor Kinetic ERP
    • Microsoft 365
    • Microsoft Azure
    • SaaS
  • Helpdesk
  • Resources
    • Resources
      • Resources
      • 2W Conversations
      • News Releases
      • Product Demo’s
      • Quick Tech Talks
      • Webinars
    • Blogs
  • About 2W
    • About Us
    • Contact Us
    • IT News
  • Join the Team
  • Client Login
  • Solutions
    • Solutions
    • Artificial Intelligence
    • Data Analytics
    • Epicor for Distribution
    • Epicor for Manufacturing
    • IT Support
    • Managed Services
    • Microsoft 365
    • Microsoft Azure
    • Microsoft Licensing Support
    • Security
  • Innovation
    • Innovation
    • AI for Epicor
    • Cybersecurity
    • Data Analytics
    • Epicor in Azure
    • Epicor Kinetic ERP
    • Microsoft 365
    • Microsoft Azure
    • SaaS
  • Helpdesk
  • Resources
    • Resources
      • Resources
      • 2W Conversations
      • News Releases
      • Product Demo’s
      • Quick Tech Talks
      • Webinars
    • Blogs
  • About 2W
    • About Us
    • Contact Us
    • IT News
  • Join the Team
  • Client Login
Contact Us
Home / IT News / IT 101: Who are the Attackers?

IT 101: Who are the Attackers?

11/08/19
Categories:
  • Brokers
  • cybercriminals
  • Cybersecurity
  • Cyberterrorists
  • hacker
  • Hacktivists
  • Insiders
  • IT 101
  • Script kiddies
  • State-sponsored attackers

Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down for educational purposes.

“Hacker” used to be the catchall term for a person who used advanced computer skills to attack computers. That morphed into a variety of “hat” titles — white hat hackers for ethical attackers, gray hat hackers for vigilantes shaming organizations into fixing their vulnerabilities, etc. But those titles did not always accurately reflect the different motives and goals of the attackers.

The following are more descriptive categories of hackers:

  • Cybercriminals – Strictly speaking, cybercriminals are a loose network or attackers, identity thieves and financial fraudsters who are highly motivated, less risk-averse, well-funded and tenacious. Instead of attacking a computer to show of their skills, cybercriminals have a more focused goal of financial gain.
  • Script kiddies – Script kiddies want to attack computers yet lack the knowledge of computers and networks to do so. They instead do their work by downloading automated attack software, or scripts, from websites and using it to perform malicious acts.
  • Brokers – Brokers sell their knowledge of a vulnerability to other attackers or even governments. These buyers are generally willing to pay a high price because this vulnerability is unknown to the software financier and thus unlikely to be “patched” until after new attacks based on it are already widespread.
  • Insiders – Employees, contractors and business partners also pose a serious threat to an organization. Most malicious insider attacks consist of the sabotage or theft of intellectual property.
  • Cyberterrorists – These attackers’ motivation is ideological, attacking for the sake of their principles or beliefs. They can be inactive for several years and then suddenly strike in a new way.
  • Hacktivists – Attacks by hacktivists can involve breaking into a website and changing the contents on the site as a means of making a political statement against those who oppose their beliefs.
  • State-sponsored attackers – These attackers target foreign governments or even citizens of the government who are considered hostile or threatening.

With so many potential threats to your organization, you should not tackle cybersecurity alone. Contact 2W Tech for help with your defenses.

Read More:

SOC for Supply Chain is on the Way

The Need for Cloud Governance in Office 365

Back to IT News

Copyright © 2025, 2W Technologies, Inc.

2W Tech is a leading technology service provider specializing in cutting-edge solutions for the manufacturing and distribution industry, including Epicor ERP, Epicor P21, IT support and infrastructure, Azure cloud services, Microsoft 365, cybersecurity, artificial intelligence, data analytics, and comprehensive managed technology programs.

Epicor in AzureTM and ResolveIQTM are registered trademarks of 2W Technologies, INC.

As an esteemed Epicor Platinum Elite Partner and a Microsoft Tier 1 Cloud Services Partner, we are dedicated to delivering unparalleled service and support. For more information, please contact us at 262-686-5070 or visit our website here.