The Modern Hacker: Who They Are, Where They Live, & What They're After

Author: Andrew Douthwaite

CTO at VirtualArmour – With 17 years at VirtualArmour, I’ve had the privilege of shaping and growing the organization into a trusted name in the Network and Cyber Security industry. Heading up Managed Services, Professional Services, Technical Solutions, and First Line Support Departments. Based in the UK, I lead the day-to-day operations of these departments, overseeing engineering activity across both our US and UK offices, as well as our network operations centres. With over a 20 years in the cybersecurity field, I’ve held pivotal roles including Security Engineer, Senior Engineer, Director of Managed Services and now CTO at VirtualArmour, giving me hands-on experience in both technical execution and strategic leadership.

Modern cybersecurity incidents rarely come from a lone individual in a hoodie guessing passwords for fun. Modern day hackers operate as businesses, collaborate across borders, and follow repeatable playbooks designed to make money efficiently. Understanding who they are, how they work, and what motivates them is no longer just a security team concern – it’s a business imperative.

In this article, we’ll break down what “modern hackers” really means today, how cybercriminal groups organize themselves, why financial gain dominates their objectives, and what this really means for your security program. Along the way, we’ll connect attacker behavior to practical defensive priorities so you can focus effort where it actually frustrates adversaries.

What “Modern Day Hackers” Really Means

The popular image of a hacker acting alone has been replaced by structured, specialized teams. Today’s attackers resemble startups more than hobbyists, with defined roles, revenue models, and supply chains.

A typical operation may include:

  • Recon specialists who profile targets and harvest credentials
  • Initial access brokers who sell footholds into compromised networks
  • Operators who deploy ransomware or conduct fraud
  • Money-out teams who handle laundering, cryptocurrency movement, and cash-out

This specialization has lowered the barrier to entry. Services like malware-as-a-service (MaaS) and ransomware-as-a-service (RaaS) allow less technical actors to rent proven tools, complete with documentation and support. The result is a scalable cybercrime economy where access, exploits, and stolen data are traded openly on dark web marketplaces.

This ecosystem approach explains why attacks feel polished and repeatable. It also explains why takedowns rarely eliminate a threat entirely – roles are replaceable, and the market adapts quickly.

Where Hackers Operate: Why Spotting Exact Location is Tricky

Pinpointing the physical location of attackers is far more difficult than most headlines suggest. Modern day hackers route activity through layers of VPS infrastructure, VPNs, proxies, and previously compromised systems. By the time an alert fires, traffic may have crossed half a dozen jurisdictions.

Analysts sometimes infer regions based on:

  • Working hours and cadence
  • Language artifacts in code comments or phishing lures
  • Reused infrastructure or known tactics, techniques, and procedures (TPPs)

Even then, attribution is probabilistic – not definitive. Affiliates in a single ransomware gang may operate across multiple countries, often choosing regions with weak extradition laws or limited cybercrime enforcement. This distributed model makes legal consequences unlikely and persistence more achievable.

What They’re After

For most attackers, the goal is simple: money. Financially motivated campaigns dominate incident response queues, driven by speed, scale, and predictable payouts.

Common objectives include:

  • Ransomware deployment and extortion
  • Business email compromise (BEC) and invoice fraud
  • Cryptocurrency theft and carding operations

The data that enables these outcomes is equally valuable:

  • Personally identifiable information (PII) and protected health information (PHI)
  • Payment card data and credentials
  • API keys, source code, and access tokens

There are exceptions. Nation-state threat actors focus on espionage, trade secrets, and long-term access. Hacktivist campaigns prioritize disruption and signaling. Insider threats blur the line entirely, combining legitimate access with malicious intent. But even these operations often intersect with the broader cybercrime economy for tooling or monetization.

Diverse computer hacking shoot

Top Modern Hacker Groups to Know

Not every threat actor deserves equal attention. The groups below stand out because of their scale, sophistication, and influence on attacker tradecraft.

Lazarus Group (North Korea)

Lazarus Group is a state-linked collective that blends espionage, sabotage, and large-scale financial theft. The group is best known for SWIFT banking fraud, cryptocurrency exchange compromises, and destructive malware campaigns that support both economic and geopolitical objectives.

What distinguishes Lazarus is its ability to operate patiently and strategically. Initial access often comes from spear-phishing, supply-chain compromise, or exploitation of newly disclosed vulnerabilities, followed by deliberate movement toward high-value financial systems. Recent reporting links Lazarus to record-setting crypto heists used to fund state programs.

APT29 / “Cozy Bear” (Russia)

APT29, also known as Cozy Bear, is a stealth-focused espionage actor associated with long-term intelligence collection. The group primarily targets government agencies, diplomatic organizations, and policy institutions, often prioritizing persistence over immediate impact.

APT29 is known for abusing identity and cloud features rather than relying on loud malware. Its extensive use of living off the land techniques allows it to blend into normal administrative activity, underscoring the importance of identity visibility and long-term log retention.

APT41 / “Double Dragon” (China)

APT41 is a hybrid threat actor combining state-sponsored espionage with profit-driven cybercrime. The group is frequently linked to software supply-chain compromises and the rapid exploitation of newly discovered vulnerabilities.

APT41’s ability to weaponize zero-day exploits and scale access across industries makes it particularly disruptive. Its operations highlight the risk posed by trusted software and the need for rapid patching and dependency visibility.

FIN7 / “Carbanak”

FIN7 is a highly professional, financially motivated threat group known for point-of-sale intrusions, phishing campaigns, and business email compromise (BEC). The group operates with defined roles and polished infrastructure, often resembling a legitimate enterprise.

Despite arrests and takedowns, FIN7 has repeatedly resurfaced under new tooling and branding. Its consistent success demonstrates how refined social engineering and disciplined operations continue to drive financial fraud.

LockBit (Ransomware-as-a-Service)

LockBit is one of the most prolific ransomware gangs, operating a large ransomware-as-a-service (RaaS) ecosystem. Affiliates commonly obtain access through initial access brokers and move quickly to deploy ransomware.

LockBit is known for fast lateral movement and aggressive multi-extortion tactics, including data leaks and botnets and DDoS attacks. Despite major takedowns, LockBit’s model has proven resilient. Its continued influence illustrates how decentralized affiliate programs and shared tooling keep RaaS operations alive even under sustained law enforcement pressure.

How Modern Day Hackers Get In

Initial access is where most successful intrusions begin – and where defenders have the greatest opportunity to break the attack chain early. Modern attackers favor entry points that are reliable, repeatable, and scalable across many organizations at once. Rather than chasing exotic exploits, modern day hackers overwhelmingly rely on social engineering techniques that exploit trust, identity, and basic hygiene gaps.

Phishing remains the single most effective access method, but it has evolved well beyond poorly written emails. Today’s campaigns combine carefully researched lures with technical bypasses:

  • Targeted phishing attacks that impersonate vendors, executives, or internal IT teams
  • MFA fatigue attacks that bombard users with push requests until one is accepted
  • QR-code phishing that bypasses traditional email filters
  • Deepfake voice or video used in real-time social engineering scenarios

Credential theft doesn’t always require tricking a user directly. Large-scale credential stuffing campaigns reuse passwords harvested from prior breaches, while password spraying tests common patterns across thousands of accounts. When combined with weak MFA implementations or legacy protocols, these attacks can succeed quietly.

Attackers also aggressively target exposed infrastructure. Unpatched VPN concentrators, firewalls, remote access portals, and cloud admin panels offer high-value access with minimal effort. Default credentials, forgotten test accounts, and internet-facing management interfaces remain consistent entry points – especially for SMBs with limited patch windows.

Supply Chain & Third Parties

Third-party compromise amplifies attacker reach. By breaching a shared vendor, managed service provider, or widely used application, attackers gain downstream access to multiple organizations at once. This reality makes vendor risk management a core security requirement, not an afterthought.

Common Hacker Tactics, Techniques & Procedures

Once initial access is achieved, attackers tend to follow highly repeatable playbooks. These behaviors map cleanly to the MITRE ATT&CK framework and align with stages of the cyber kill chain, making them predictable – even when individual tools change.

Understanding these tactics matters because defenses that disrupt early stages force attackers to spend more time, create more noise, and increase their risk of detection.

Privilege Escalation & Lateral Movement

After gaining a foothold, attackers focus on expanding access and increasing privilege. Token theft, credential dumping, Pass-the-Hash, and Pass-the-Ticket techniques remain common, especially in Windows-heavy environments.

With elevated credentials, attackers move laterally using remote management tools, file shares, and directory services. Lateral movement allows them to reach domain controllers, backup systems, and cloud admin accounts – the assets that ultimately determine how much leverage they gain.

In mature intrusions, this movement is deliberate and low-noise. Attackers may wait days between actions to blend into normal administrative behavior, making continuous monitoring essential.

Command & Control (C2) and Evasion

Modern command-and-control infrastructure is designed to look boring. Encrypted HTTPS traffic, cloud-hosted endpoints, and DNS-based communications help attackers hide in plain sight.

Rather than deploying obvious malware, many adversaries rely on living off the land – abusing legitimate tools such as PowerShell, WMI, scheduled tasks, and cloud-native services. This approach minimizes custom binaries and reduces the chance of signature-based detection.

From a defensive perspective, this shifts the burden from “finding malware” to identifying abnormal behavior and misuse of trusted tools.

Data Staging, Exfiltration, and Extortion

Before taking overt action, attackers typically stage data internally. Files are aggregated, compressed, and prepared for theft. Only then does data exfiltration occur – often over encrypted channels or via cloud storage services that blend into normal traffic.

Extortion has evolved well beyond encryption alone. Many campaigns now use multi-extortion models that combine ransomware, public data leaks, and service disruption. In some cases, attackers supplement pressure with botnets and DDoS attacks, increasing urgency for victims.

Server room, training and people on tablet for cybersecurity, diagnostics test or maintenance. IT team, meeting and workers with boss on digital tech for network, online database or technical support.

Why SMBs Are in the Crosshairs

Small and mid-sized businesses are no longer collateral damage – they are primary targets.

High-Return Sectors

Healthcare, financial services, SaaS providers, manufacturing, and retail consistently attract attackers. These sectors combine sensitive data with high uptime requirements, making downtime and disclosure particularly costly.

Why SMBs Get Hit

From an attacker’s perspective, SMBs offer a strong return on effort. Security teams are smaller, controls are often inconsistently deployed, and monitoring coverage may be limited to business hours. Third-party dependencies further expand the attack surface.

Ransomware gangs and fraud operators don’t need perfection – just one weak link to succeed.

Remote & Hybrid Work as an Attack Surface

Remote work has permanently changed network boundaries. Home networks, unmanaged personal devices, and shadow IT introduce blind spots, especially in BYOD environments. Credentials compromised outside the office often become the entry point for larger intrusions.

The Tools of the Trade

Commodity vs. Bespoke Malware

Most campaigns rely on commodity tooling delivered via malware-as-a-service (MaaS). These tools are inexpensive, reliable, and continuously updated. Custom implants are typically reserved for high-value or strategic targets.

Abuse of Legitimate Tools

Attackers increasingly favor legitimate remote monitoring and management (RMM) tools, cloud admin consoles, and scripting engines. When these tools are abused, malicious activity can be indistinguishable from authorized administration without strong behavioral baselines.

Automation & AI Usage

Automation enables attackers to operate at scale. Password spraying, reconnaissance, and infrastructure deployment can be executed rapidly and repeatedly. Generative AI further improves phishing realism and reduces language barriers, increasing success rates.

The Money Flow (Follow the Funds)

Monetization is where attacks turn into business operations. Ransom payments, fraudulent transfers, and stolen assets move through mixers, money mules, gift cards, and prepaid financial rails.

In ransomware-as-a-service (RaaS) models, operators take a percentage of each payout and provide affiliates with tooling, infrastructure, and negotiation support. This revenue-sharing structure reinforces loyalty and accelerates reinvestment into new capabilities – fueling the broader cybercrime economy.

Tracking money flows has become one of the most effective ways for law enforcement to disrupt operations, but from a defensive standpoint, prevention and early detection remain far more reliable than recovery after payment.

Defense That Actually Frustrates Modern Hackers

Identity-First Controls

Identity is the new perimeter. Phishing-resistant MFA, conditional access policies, privileged access management (PAM), and least-privilege enforcement significantly reduce the value of stolen credentials.

Detection & Response

Assume attackers will get in – and focus on how fast you can detect them. 24/7 monitoring, EDR/XDR, centralized logging, and proactive threat hunting reduce dwell time and limit blast radius.

Resilience & Recovery

Immutable and offline backups, network segmentation, and practiced restore procedures reduce extortion leverage. When recovery is predictable, attackers lose negotiating power.

A practical 30/60/90-day roadmap helps organizations prioritize high-impact controls without overwhelming teams or budgets.

Read More: Key Differences between XDR and SIEM in Cybersecurity

A Practical 30/60/90-Day Security Roadmap

Knowing which controls matter is only half the battle. The organizations that reduce risk fastest focus on sequencing – deploying high-impact improvements in manageable phases rather than attempting to fix everything at once.

First 30 Days: Reduce Easy Wins for Attackers

The initial focus should be on eliminating the most commonly abused gaps. Enforce MFA everywhere it’s supported, especially for email, VPNs, and cloud admin access. Disable legacy authentication, review external-facing assets, and patch known exposed services. At the same time, begin phishing-resistant user awareness efforts to reduce the success of social engineering-driven attacks.

Days 31-60: Improve Visibility and Detection

With baseline controls in place, shift attention to visibility. Centralize logs, ensure endpoint detection is deployed consistently, and validate alerting for identity misuse and lateral movement. Tabletop exercises focused on ransomware or BEC help teams pressure-test response plans and clarify roles before a real incident occurs.

Days 61-90: Strengthen Resilience and Response

The final phase prioritizes limiting blast radius and recovery time. Segment critical systems, validate offline and immutable backups, and test restoration procedures. Formalize incident response playbooks and escalation paths so technical teams and leadership can act decisively under pressure.

This phased approach allows security teams to demonstrate measurable improvement quickly – while building toward a more resilient, renewal-ready security posture.

Read More: The Importance of Cybersecurity Awareness Training for Employees

System hacked alert after cyber attack on computer network. compromised information concept. internet virus cyber security and cybercrime. hackers to steal the information is a cybercriminal

What This Means for Your Security Program

Map Attacker Goals to Your Assets

Identify crown-jewel systems and the attack paths most likely to reach them. Controls should align to what attackers want – not just generic best practices.

Validate with Exercises

Tabletop exercises and purple team engagements focused on ransomware and business email compromise (BEC) expose gaps before attackers do.

Prove & Improve Continuously

Security posture should be measurable. Scorecards, detection metrics, and control evidence support insurance underwriting and demonstrate continuous improvement year over year.

Leave No Server Unturned

The most effective way to defend against modern day hackers is understanding which adversaries are most likely to target your organization – and how they operate. VirtualArmour offers a no-cost, 45-minute threat-model review to map real-world attacker playbooks to your environment and deliver a prioritized, actionable control plan and ongoing awareness training. When defenses align with real attacker behavior, attackers are forced to move on to easier targets.

Share:

Related Blog Posts

What is Cybersecurity Insurance and Does Your Business Need It?
15Jan

What is Cybersecurity Insurance and Does Your…

Cybersecurity insurance helps businesses manage the financial fallout of cyberattacks like ransomware, data breaches, and email compromise. While…

The Modern Hacker: Who They Are, Where They Live, & What They're After
07Jan

The Modern Hacker: Who They Are, Where…

Modern cybersecurity incidents rarely come from a lone individual in a hoodie guessing passwords for fun. Modern day…

What is the Principle of Least Privilege (POLP)?
10Dec

What is the Principle of Least Privilege…

The Principle of Least Privilege is one of the highest-ROI security practices available—especially for lean teams. This guide…