January 6, 2021

Hacker ≠ attacker.

There’s a difference.

Comments

techietraveller84

From [https://www.tripwire.com/state-of-security/vulnerability-management/hackers-vs-attackers-different-animals/](https://www.tripwire.com/state-of-security/vulnerability-management/hackers-vs-attackers-different-animals/)

**Hacker vs Attacker**

“Hacker” is another name for an ethical researcher. It refers to someone who proactively explores, identifies and alerts organizations to vulnerabilities that an attacker could use for malicious purposes. They seek to disclose in good faith by alerting organizations that may or may not have vulnerability disclosure policies.

Although “hacker” is now sometimes mistakenly used to refer to an attacker, its origins are benign and complementary. The term arose to describe someone who was smart enough to “hack” their way through the security levels of a computer system or network.

An “attacker,” on the other hand, is just that. It’s someone who gains unauthorized access to someone else’s network and computers for malicious purposes. An attacker probes for vulnerabilities, but unlike a hacker, the attacker exploits them without permission or without warning the organization. This can be for monetary gain such as in [ransomware attacks](https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/22-ransomware-prevention-tips/), cryptojacking, etc., which are costly scenarios if the victim’s computing resources are [cloud](https://www.tripwire.com/solutions/maintain-control-in-the-cloud/)-based and the attacker is racking up CPU usage fees. The attack could also focus on the theft of user data for monetization on the dark web. Alternatively, it could be for competitive advantages such as using a RAT or APT to escalate privileges and extract intellectual property or other valuable data. Rather than a direct attack, some nefarious individuals create malware decoys such as mobile apps with keyloggers and trojans that steal banking and retail account passwords, enabling account takeovers.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.