top of page

Cybercrime in a Nutshell
-by Demystifier

Cybercrime has become a professional industry. It's made up of networks where everyone has a job: some do the hacking, some sell access, and others clean the stolen money. There is a lot of money moving around.

 

It is easy to get started because criminals can simply buy ready-made tools and services from each other. Many actors specialize in just one area, which makes their activities much more efficient. Attacks often happen in a chain: a single vulnerability quickly grows into a larger situation where data is stolen, people are blackmailed, and operations are disrupted.

Kansantajuistaja 3.png

Cyber threats come in many shapes and sizes, and criminals use different methods to get what they want.

Here are some examples of cyber threats that are emerging today:

 

  • Deepfake videos Europol has listed examples of what cybercriminals are using these videos for.

  • Fake QR codes – a code stuck to a table or poster takes you to the wrong address.

  • Unauthorized mining – the power of a device is secretly harnessed to mine virtual currency.

  • Reselling access – once an attacker has gained a foothold in the system, access can be resold to the next.

  • Investment scams – there are sites and social media experts promising “sure returns”.

  • Subscription traps – a free trial turns into a paid one.

Watch three videos that explore cybercrime from different perspectives

Note: The videos are in Finnish.

Teknologia x Kyberrikollisuus.png
Liiketoiminta x Kyberrikollisuus.png

Various threat actors

There is an actor behind every attack – and actors have different motives, means and resources. Below is a brief overview of the most common threat actors:

Criminal groups

The goal is data and money. The activities are often organised.

Nation-state actors

They gather information, influence opinions, and seek to disrupt critical services. Their operations are long-term, discreet, and well-resourced.

Hacktivists

They want to attract attention. The goal is to gain visibility for their cause, which is most often either political or personal.

Insider threats

Current or former employees, partners and subcontractors who have access to the systems. Damage can occur intentionally, for self-interest or simply through negligence.

Experimenters

They use ready-made tools that can be found online. Their skills vary. The motive is often curiosity or a quick way to make money.

bottom of page