The Hacktivist Zoo

Intro

Have you ever tried to go to a website and the expected webpage was replaced or altered? The original contents gone and in it’s place are references to geo, political, or religious views?   This is such a common occurrence that a word was coined, hacktivism, to differentiate these styles of attacks from hackers seeking different goals. As is the case with most things, even further classification of this diverse and truly complex hacking group is warranted and today we will cover three of the most common formations of hacktivist groups. As we build our defenses to protect our virtual borders from cyber threat actors it important to understand not only who they are and how they attack, but especially with this class of hacker, we must realize their “triggers”.

Hacktivist Class #1

This group has become the face of all hacking in media today. Due to their strong use of social media and desire to be heard at all cost, attacks carried about by these groups tend to gain large visibility.  The question you must ask yourself is “Who is 4-chan?” (if you do not know the answer, read on).

Starfish

This group is by far the largest in members but fewest in unique separate organizations. This is because is like a hive or collective mind, it’s a group that acts under anonymity as the voice for the people.  The starfish classification is because its has no head. There is no single leader that could be removed.  This often leads to different

Trigger

describes a problem this person has. An obstacle they face, a challenge they must overcome

Methods of Attack

describes the solution our protagonist put into place.

Hacktivist Class #2

The headline is a summary of what this section of the pattern is about. This can be a product you’re reviewing, a step in a multi-step process or recipe, a core idea you want to convey.

Guerrillas

describes a person or a story. It sets the scene and helps readers relate

Trigger

describes a problem this person has. An obstacle they face, a challenge they must overcome

Methods of Attack

describes the solution our protagonist put into place.

Hacktivist Class #3

The headline is a summary of what this section of the pattern is about. This can be a product you’re reviewing, a step in a multi-step process or recipe, a core idea you want to convey.

Lone Wolf

describes a person or a story. It sets the scene and helps readers relate

Trigger

describes a problem this person has. An obstacle they face, a challenge they must overcome

Methods of Attack

describes the solution our protagonist put into place.

Conclusion and Call to Action

closes off your post. This is where you tell your readers what to do next, whether that’s leaving a comment, checking out another, related post, signing up to your newsletter or anything else that’s important to your business.​

Bryan Yale
 

Click Here to Leave a Comment Below 0 comments

Leave a Reply: