Diary of data breaches reveals who's hacking. Credit: Thinkstock The cybercrime rate’s going up, up, up, up, up. Cybercrime damages were predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015, according to a recent CSO story.So, who’s committing the the hacks? Hackers have morphed from the lone wolf wearing a hoodie and sitting behind a computer — to a garden variety of cyber intruders and perpetrators wearing anything from T-shirts and flip-flops, to dark suits and wing-tips, to military garb, according to Cybersecurity Ventures’ annual cybercrime report. (Disclaimer: Steve Morgan is CEO and founder of Cybersecurity Ventures.) A high-level breakdown of the various hacker types:Hacktivists (Hacker-Activists) are motivated to deface and harm websites, blogs and other digital media — and launch DDoS (distributed denial of service) attacks against organizations they are opposed to. [ ALSO ON CSO: The worst people you meet doing IT security ]Cyber-Insiders are employees (or contractors, others with ‘inside’ access) who hack into internal systems and data belonging to their employers. Cyber-Gangs are groups of hackers who are sponsored and managed by criminal organizations, and perpetrate illegal hacking for stealing large sums of money, drug trafficking, and other crimes.Cyber-Spies (often sponsored by hostile governments) commit espionage through digital surveillance, and theft of confidential data including government and trade secrets, intellectual property belonging to corporations, academia, medical institutions, and other.Cyber-Terrorists use technology to commit cyber-attacks which harm people, places and things.Cyber-War Fighters belong to nations who engage in cyber warfare, using technology as their weaponry.Cyber-Criminals are the broadest category and may refer to any of the above, but can be thought of as solo or group hackers who use technology and employ social engineering against organizations and individuals for financial gain, notoriety, or both.Another way to look at who’s hacking is to sift through the data breach diary covering cyber-attacks over the past 90 days. There are reports of cybercriminal activities carried out by Chinese citizens, Russian hacking groups, a U.S. Navy contractor, a 17-year-old boy in the U.K., an imposter in New Zealand, a Russian citizen who’s been pursued by the FBI, and many others. A careful read through each one of the dozens of cyber intrusions portrays a large array of bad guys and girls.A hacker has long been known as a person who uses computers (and digital devices) to gain unauthorized access to data. That definition has remained the same, but now the crooks come in all shapes and sizes.So, be on the look out. The people you least suspect may be the very ones that are hacking your network. Related content news Okta confirms recent hack affected all customers within the affected system Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident. By Shweta Sharma Nov 30, 2023 3 mins Data Breach Cyberattacks Cybercrime news Top cybersecurity product news of the week New product and service announcements from Wiz, Palo Alto Networks, Sophos, SecureAuth, Kasada, Lacework, Cycode, and more. By CSO staff Nov 30, 2023 17 mins Generative AI Security feature How to maintain a solid cybersecurity posture during a natural disaster Fire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst. By James Careless Nov 30, 2023 8 mins Security Operations Center Data and Information Security Security Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement Compromised Windows systems can enable attackers to gain access to Google Workspace and Google Cloud by stealing access tokens and plaintext passwords. By Lucian Constantin Nov 30, 2023 8 mins Multi-factor Authentication Single Sign-on Remote Access Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe