Being the inspiration for “CSI: Cyber” is not likely an honor many people in the security field would be happy to claim. But this is exactly the tag line that cyberpsychologist Professor Mary Aiken is often given. As the director of the CyberPsychology Research Center (CPRC) in Dublin, she has an interesting viewpoint on cybercriminals and hackers around the world.

Aiken is one of the leaders looking into the motivations and psychology of the people who are committing crimes using computers and the Internet. It’s criminal psychology specializing in crimes carried out via technology. Without a doubt, the type of work she is doing is needed in today’s society.

The Psychology of Hackers

We live in an age in which many if not most crimes involve a computer at some point, so it stands to reason that research on how the involvement of computers changes both the nature of the crime and the criminal is necessary. Reading about Aiken’s recent presentation at the 2015 Web Summit in The Guardian, it’s interesting to see her comments about hacking as a Freudian “cyber-sexual urge to penetrate,” especially seeing the term cyber once again added to the mix.

Research into particular psychology that marks hackers isn’t actually all that new. There have been studies that started as far back as 2005 trying to link hacking culture with neurological conditions. But to see something that’s receiving attention in a mainstream event like the Web Summit and to see it covered by publications such as The Guardian is something new.

Beware of Stereotypes

The potential danger resulting from the attention Aiken is receiving is that it further fuels the stereotype of a hacker as a young adult male, wearing a hoodie and living in his parents’ basement. It puts nice, intellectual words and psychology jargon around the description, but despite the polysyllabic pronouncements, it’s the same stereotype we’ve seen in the news since the press took control of the word hacker. No matter how pretty the veneer her talks put on the term, what she’s telling the world is the same story we’ve heard again and again, and that’s disappointing.

That said, stereotypes generally exist for a reason: If you go to DEF CON in Las Vegas or Chaos Computer Club in Europe, you’ll see hundreds of examples of the lone hacker, tattooed and wearing a dark hoodie. But for every one of those people putting on a public show, there are tens if not hundreds of people who spend their time breaking systems for fun and profit. Many of them are successful businesspeople, wearing a suit to work every day, looking and acting no different from everyone else. To some people, committing crimes using a computer is as much a 9-to-5 job as protecting computer systems is.

It’s almost certain that Professor Aiken’s research extends beyond the stereotypes. Unfortunately, what comes out in shows like “CSI: Cyber” and the press is that preconceived notion of a hacker. The idea that it’s a 15-year-old kid in his basement is further reinforced by events like the recent TalkTalk hack, but this type of event is now the outlier and less of a threat than the press makes it seem.

The bigger worry is attacks that last for weeks, months and even years, undetected until an external entity calls to notify the victim that they’ve been compromised. Hackers who go unnoticed and undetected aren’t attacking for fun or to fulfill some cyber-sexual urge; they’re attacking because it’s how they make their living, and they’re good at it.

More to Be Done

We need to see more research into the criminal motivations of the people who are compromising networks and businesses around the world. But the model of the lone hacker no more applies to the psychology of modern cybercriminals than the profile of a single serial killer could be generalized to all murderers. We need to broaden the research, move beyond the old model and understand the larger populace of criminal behaviors that happen to involve computers and the Internet. We’ll probably find that it’s not all that different from any other type of crime.

Unfortunately, it appears that Aiken won’t be the one to do broader research into computer-related criminals, at least in Ireland. Shortly before her talk at the Web Summit, it was announced that the Royal College of Surgeons Ireland (RSCI), the home of her organization, would be shutting down the CPRC.

It seems that the research being done there no longer aligns with the direction the RCSI believes it needs to take. Hopefully Aiken and the CyberPsychology Research Center can find a new home and broaden their research from the stereotypes and into the real world of cybercriminals. The need for this information won’t be going away any time soon.

More from Threat Intelligence

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Email campaigns leverage updated DBatLoader to deliver RATs, stealers

11 min read - IBM X-Force has identified new capabilities in DBatLoader malware samples delivered in recent email campaigns, signaling a heightened risk of infection from commodity malware families associated with DBatLoader activity. X-Force has observed nearly two dozen email campaigns since late June leveraging the updated DBatLoader loader to deliver payloads such as Remcos, Warzone, Formbook, and AgentTesla. DBatLoader malware has been used since 2020 by cybercriminals to install commodity malware remote access Trojans (RATs) and infostealers, primarily via malicious spam (malspam). DBatLoader…

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

8 min read - IBM X-Force uncovered a new phishing campaign likely conducted by Hive0117 delivering the fileless malware DarkWatchman, directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia. DarkWatchman malware is capable of keylogging, collecting system information, and deploying secondary payloads. Imitating official correspondence from the Russian government in phishing emails aligns with previous Hive0117 campaigns delivering DarkWatchman malware, and shows a possible significant effort to induce a sense of urgency as…

Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub

3 min read - Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. Innovation and best practices co-exist in the criminal world, and one mustn’t distract us from the other. IBM X-Force is continuously observing new attack vectors and novel malware in the wild, as adversaries seek to evade detection innovations. But we also know that tried and true tactics — from phishing and exploiting known vulnerabilities to using compromised credentials and…