• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Editorial » Do some firms “deserve” to get hacked?

Do some firms “deserve” to get hacked?

by Adi Gaskell
8 January 2021
in Editorial
0
Person in front of multiple computers

© Shutterstock

23
SHARES

COVID-19 has had a significant impact on a great many of that which we hold dear. The fractious nature of events during 2020 has also significantly raised the prospect of organizations doing wrong by us in some way shape or form. We may be an employee who has been unfairly laid off or a customer who has not received the service (or refund) that we feel we deserve. Maybe we’re simply a general observer who feels an organization has behaved incorrectly towards society in some way.

This potential for having people who feel scorned by us in some way is important, as researchers have shown that we respond differently when we feel we’ve been wronged in some way. A study from a few years ago explored what the researchers refer to as the “immutable law of the ex.” The research, which was conducted in a sporting context, found that players would often reserve their best performances for when they played former teams.

The analysis of several hundred football matches from the English Premier League found that players were especially motivated to perform well against former teams when they were angry at a perceived slight against them.

When the players were determined to punish their former team, their performance levels rose significantly.

The researchers highlight how in a commercial setting, such revenge could take many forms, from bad-mouthing your former employer to revealing trade secrets. So what might this have to do with cybersecurity, you ask? New research from the University of Kent shows that when people are unhappy with an organization, they tend to legitimize cyberattacks against that organization.

Justifying attacks

The research highlights how people were likely to experience anger when an organization ignored the pursuit of justice on their behalf. Indeed, anger would also rise if people felt that their demands were being ignored. While these people would not actively participate in cybercrime against this organization themselves, they would nonetheless justify the attacks as a manifestation of their anger towards that organization.

The researchers argue that their findings are crucial given the heightened risk of cyberattacks on organizations throughout the COVID-19 crisis. Especially so given the increased potential for organizations to do wrong by people during such an uncertain time and unpredictable time.

Participants in the research were given a number of fictional scenarios, each of which contained some form of unfair treatment from authorities whereby complaints were either pursued or dismissed. They were then told that hackers had broken into the websites of each offending organization and defaced them. Last, but not least, the participants were asked to say how much they supported the actions of the hackers.

The results reveal that people overwhelmingly supported the hackers’ actions when they were regarded as a way to get back at organizations and systems that people felt were not responsive to their own demands or concerns.

Suffice to say, the “hacking” in question was something as relatively harmless as the defacement of an organization’s website, so there are perhaps different levels of “redemption” that people are happy for organizations to suffer or not suffer as a result of their supposedly poor behavior. It’s not clear, for instance, whether people would be happy for organizations who have slighted them in some way to suffer from a ransomware attack.

“When individuals perceive a system as unjust, they are motivated to participate in political protest and collective action to promote social change,” the researchers nonetheless explain. “However, if they believe they will not have a voice, they will legitimize groups and individuals who disrupt the system on their behalf.”

Revenge hacks

The potential for such “revenge attacks” was emphasized all too clearly earlier this year when hackers broke into the servers of a cybersecurity firm and stole data from over 8,000 databases. The attack was made against the data leak monitoring firm DataViper, with the attacker believed to have spent a few months inside the company’s servers pilfering data.

As the saga unfolded, it was suggested that the alleged attack on Night Lion Security, who runs DataViper, was a revenge attack on Vinny Troia, the noted cybersecurity researcher who runs the company.

Troia alleged that the attack was timed to undermine his reputation prior to a talk he gave at the SecureWorld conference, where he outlined not only the activities of the attackers but also their supposed real-world identities.

“When people think they are above the law, they get sloppy,” Troia said. “So much so they forget to look at their own historical mistakes. I literally detailed an entire scenario in my book where I allowed them to gain access to my web server in order to get their IPs.”

While this alleged attack has more than an element of soap opera about it, the potential not only for COVID-19 to produce a large number of “slighted” individuals willing to do our organizations harm, but also a public that may be less willing to sympathize with those attacked should be cause for concern for cybersecurity staff the world over.

Share23TweetShareShare

Related Posts

Woman running with VR glasses on

Let’s get phygital: the convergence of physical and digital worlds

26 January 2021
Mobile phishing attacks are scary and on the rise: 85% are outside of email

Mobile phishing attacks are scary and on the rise: 85% are outside of email

26 January 2021
Google on laptop and mobile

Google vs Australia: the battle of the precedents

25 January 2021
Is there life on Mars?

Is there life on Mars?

22 January 2021
Next Post
Bitcoin on record-setting spree, jumps 5% on day

Bitcoin on record-setting spree, jumps 5% on day

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    83053 shares
    Share 83043 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • 8 best cybersecurity podcasts for 2021

    56 shares
    Share 56 Tweet 0
  • Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

    13365 shares
    Share 13361 Tweet 0
  • Network Attached Storage

    0 shares
    Share 0 Tweet 0
Wall Street vs Main Street fight quashes hedge funds as GameStop keeps rallying

Wall Street vs Main Street fight quashes hedge funds as GameStop keeps rallying

27 January 2021
Google to stop using Apple tool to track iPhone users, avoiding new pop-up warning

Google to stop using Apple tool to track iPhone users, avoiding new pop-up warning

27 January 2021

‘World’s most dangerous malware’ Emotet disrupted

27 January 2021
The satellite-hacker’s guide to the space industry: don’t panic (yet)

The satellite-hacker’s guide to the space industry: don’t panic (yet)

27 January 2021
Man in front of multiple computers

North Korea has been targeting threat researchers

27 January 2021
GameStop extends Reddit driven hyper-rally after Musk tweet

GameStop extends Reddit driven hyper-rally after Musk tweet

27 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • About Us
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!