Cybercrime in a Nutshell
-by Demystifier
Cybercrime has become a professional industry. It's made up of networks where everyone has a job: some do the hacking, some sell access, and others clean the stolen money. There is a lot of money moving around.
It is easy to get started because criminals can simply buy ready-made tools and services from each other. Many actors specialize in just one area, which makes their activities much more efficient. Attacks often happen in a chain: a single vulnerability quickly grows into a larger situation where data is stolen, people are blackmailed, and operations are disrupted.

Cyber threats come in many shapes and sizes, and criminals use different methods to get what they want.
Here are some examples of cyber threats that are emerging today:
-
Deepfake videos – Europol has listed examples of what cybercriminals are using these videos for.
-
Fake QR codes – a code stuck to a table or poster takes you to the wrong address.
-
Unauthorized mining – the power of a device is secretly harnessed to mine virtual currency.
-
Reselling access – once an attacker has gained a foothold in the system, access can be resold to the next.
-
Investment scams – there are sites and social media experts promising “sure returns”.
-
Subscription traps – a free trial turns into a paid one.
Various threat actors
There is an actor behind every attack – and actors have different motives, means and resources. Below is a brief overview of the most common threat actors:




