The head of Group-IB Mr. Sachkov described the portrait of a typical Russian hacker

The head of Group-IB Mr. Sachkov described the portrait of a typical Russian hacker

Not only a programmer but also just a expert with a good expertise of mathematics can turn into a hacker in Russia, stated the head of Group-IB Ilya Sachkov. The entrepreneur thinks that for these types of people today funds is a priority.

“This is a gifted youthful male, whose undertaking is to receive funds and which is all. He is not usually very well-educated in the humanities, not another person who will cause you sympathy. The precedence is dollars, high priced automobiles, highly-priced watches, vacations abroad,” mentioned Sachkov.

10 many years in the past, the vocation of a hacker was picked out solely by pupils, largely small children from deprived people. However, the situation has changed: this career is now picked out by people who “dwell in quite wealthy families, with ordinary relations between mother and father”.

A usual Russian hacker “tries to perform Don Corleone”, communicates with former or latest legislation enforcement officers, and also seems to be for political assistants who will demonstrate to him that serious Russian hackers steal revenue from foreigners since of the “war with The usa”.

He famous that the creators of viruses are usually people today with exclusive requires, autistic youngsters who have fallen into an intense setting. At the exact time, the impression that Russian-talking hacker teams are primary in the globe is presently out-of-date. Now, all of them are mixed by nationality, although in the 90s, it was people from the publish-Soviet area who had been amid the first to engage in these types of factors, who communicated amongst them selves in Russian.

Team-IB specializes in products that enable shield from cyber assaults and battle on the net fraudsters. In specific, the firm investigates cybercrimes and helps to watch attacking hackers. The group cooperates with Europol and Interpol.

Impression and Post Supply url

Read More on Cyber Hacking News

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *