{"id":3236,"date":"2020-08-19T07:27:48","date_gmt":"2020-08-19T06:27:48","guid":{"rendered":"https:\/\/www.conferencecall.co.uk\/blog\/?p=3236"},"modified":"2021-06-15T10:50:00","modified_gmt":"2021-06-15T09:50:00","slug":"hackers-make-money","status":"publish","type":"post","link":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/","title":{"rendered":"How do hackers make money?"},"content":{"rendered":"<p>Whether it&#8217;s phishing, Trojan Horses or a DDoS attack, cyber crime is getting more and more complex and efficient<\/p>\n<p>All of which is obviously concerning, but have you ever wondered how hackers actually make their money?<\/p>\n<p><!--more--><\/p>\n<p>According to <a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\">stats from Varonis<\/a>, more than two-thirds (68%) of business leaders feel their cybersecurity risks are increasing. (<a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50\" target=\"_blank\" rel=\"noopener noreferrer\">Accenture<\/a>), while just\u00a05% of companies\u2019 folders are properly protected, on average.<\/p>\n<p>Figures also show that data breaches exposed 4.1 billion records in the first half of 2019 and almost three-quarters (71%) of breaches were financially motivated with a quarter (25%) motivated by espionage.<\/p>\n<p>To date, the 2013 attack on Yahoo remains the biggest security breach in history, as hackers got their hands on the names, email addresses, phone numbers, birth dates, security questions and answers, and encrypted passwords associated with at least half a billion Yahoo accounts, about 8 million of which are thought to be from the UK.<\/p>\n<p>It&#8217;s thought the hack was funded by another country in a &#8216;state-sponsored&#8217; attack, but it&#8217;s not known which country was behind it, and it eventually compromised the data of 3 billion people!<\/p>\n<h2>How cyber crime pays<\/h2>\n<p>Hackers use all sorts of tricks, such as Trojan Horses, viruses, spam attacks, crawl bots and all kinds of malware to get their hands on sensitive data &#8211; and they can make thousands of pounds worth of profit with relatively little initial outlay.<\/p>\n<p>This infographic below from Kaspersky,\u00a0developers of\u00a0internet security and antivirus software, tallies up out the victim&#8217;s losses and the criminal&#8217;s gain&#8230;<\/p>\n<p><a href=\"https:\/\/usa.kaspersky.com\/internet-security-center\/infographics\/how_hackers_earn_money#.V-rkE_ArLIU\" rel=\"attachment wp-att-3237\"><img decoding=\"async\" class=\"size-full wp-image-3237\" src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2016\/09\/cybercrimepays.jpg\" alt=\"Infographic showing how cyber crime pays\" width=\"596\" height=\"842\" \/><\/a><\/p>\n<h2>Back to the Yahoo attack<\/h2>\n<p>So now you know how hackers can make money out of any kind of security breach you can see how getting the details of\u00a0half-a-billion Yahoo email users could turn a profit.<\/p>\n<p>The big worry about the Yahoo hack though is the length of time it took the internet giant to \u00a0acknowledge the attack &#8211; a lot of damage can be done in two years!<\/p>\n<p>Professor Alan Woodward of the University of Surrey said of the hack:\u00a0&#8220;It is really worrying that a breach from 2014 can have gone undetected for so long.\u00a0It is also surprising the public statement took so long to appear.<\/p>\n<p>He added: \u00a0&#8220;I would have thought most companies had learned by now that early disclosure is better, even if you have to revise and update as you learn more.&#8221;<\/p>\n<p>And to put the whole hack into some sort of perspective, it goes way beyond\u00a0other recent data\u00a0breaches like MySpace (359 million), LinkedIn (164 million) and Adobe (152 million).<\/p>\n<h4>Have you been a victim of the Yahoo hack? Or any other hack? Let us know&#8230;<\/h4>\n<p><a href=\"https:\/\/www.conferencecall.co.uk\/conference-call\"><img decoding=\"async\" class=\"alignnone wp-image-1777 size-full\" src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg\" alt=\"\" width=\"600\" height=\"118\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether it&#8217;s phishing, Trojan Horses or a DDoS attack, cyber crime is getting more and more complex and efficient All of which is obviously concerning, but have you ever wondered<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\">Read More<span class=\"screen-reader-text\">How do hackers make money?<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[29,18],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How do hackers make money? - ConferenceCall.co.uk blog<\/title>\n<meta name=\"description\" content=\"Yahoo is at the centre of the biggest data hack in history - but have you ever wondered how hackers make their money? This infographic has the answers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do hackers make money? - ConferenceCall.co.uk blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\" \/>\n<meta property=\"og:site_name\" content=\"ConferenceCall.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-19T06:27:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-15T09:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/data-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Les Roberts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:site\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Les Roberts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\",\"name\":\"How do hackers make money? - ConferenceCall.co.uk blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\"},\"datePublished\":\"2020-08-19T06:27:48+00:00\",\"dateModified\":\"2021-06-15T09:50:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1\"},\"description\":\"Yahoo is at the centre of the biggest data hack in history - but have you ever wondered how hackers make their money? This infographic has the answers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.conferencecall.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do hackers make money?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/\",\"name\":\"ConferenceCall.co.uk blog\",\"description\":\"Conference calling made easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1\",\"name\":\"Les Roberts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g\",\"caption\":\"Les Roberts\"},\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do hackers make money? - ConferenceCall.co.uk blog","description":"Yahoo is at the centre of the biggest data hack in history - but have you ever wondered how hackers make their money? This infographic has the answers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/","og_locale":"en_GB","og_type":"article","og_title":"How do hackers make money? - ConferenceCall.co.uk blog","og_url":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/","og_site_name":"ConferenceCall.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826","article_published_time":"2020-08-19T06:27:48+00:00","article_modified_time":"2021-06-15T09:50:00+00:00","og_image":[{"width":800,"height":531,"url":"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/08\/data-hack.jpg","type":"image\/jpeg"}],"author":"Les Roberts","twitter_card":"summary_large_image","twitter_creator":"@ConfCallUK","twitter_site":"@ConfCallUK","twitter_misc":{"Written by":"Les Roberts","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/","url":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/","name":"How do hackers make money? - ConferenceCall.co.uk blog","isPartOf":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website"},"datePublished":"2020-08-19T06:27:48+00:00","dateModified":"2021-06-15T09:50:00+00:00","author":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1"},"description":"Yahoo is at the centre of the biggest data hack in history - but have you ever wondered how hackers make their money? This infographic has the answers.","breadcrumb":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.conferencecall.co.uk\/blog\/hackers-make-money\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.conferencecall.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How do hackers make money?"}]},{"@type":"WebSite","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website","url":"https:\/\/www.conferencecall.co.uk\/blog\/","name":"ConferenceCall.co.uk blog","description":"Conference calling made easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/7c9b498e80a769b5ec7361479fa9e4a1","name":"Les Roberts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/35588a095c072ad9300c7b3253934113?s=96&d=mm&r=g","caption":"Les Roberts"},"url":"https:\/\/www.conferencecall.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3236"}],"collection":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3236"}],"version-history":[{"count":3,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3236\/revisions"}],"predecessor-version":[{"id":5848,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3236\/revisions\/5848"}],"wp:attachment":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}