|“||politically and socially motivated individuals that use computer systems in order to protest and promote their cause. Moreover, they are usually targeting high profile websites, corporations, intelligence agencies and military institutions.||”|
|“||ideologically motivated individuals that can dynamically form groups/subgroups, usually lacking a central organisation structure. Their main motivation is usually the defence of ideas that are sometime manifested.||”|
|“||A disparate group containing a wide variety of ideologically oriented groups and individuals with varying motivations. There is considerable overlap between hacktivists and criminal subcontractors at the level of techniques.||”|
"Targets of hacktivists are selected in such a way, that media attention to successful cyber-attacks create high visibility (e.g. government sites, big companies, media, public and private infrastructure components, etc.). It is common that breached data are published to embarrass victims and achieve desired public attention. Although not considered to possess average capabilities, due to group dynamics and media visibility, hacktivists may achieve severe impact."
These groups and individuals overload e-mail servers and hack into websites to send a political message. Most international hacktivist groups appear bent on propaganda rather than causing damage to critical infrastructures.
"Hacktivists and individuals causing nuisance favour activities such as denial of service, web defacement and electronic graffiti to disrupt business and government activities. These activities are frequently opportunistic in nature rather than targeted, taking advantage of a victim's poor cyber security posture."
The term "is said to be originally coined by Omega, a member of Cult of the Dead Cow hacker collective in 1996, describing it as 'the use of legal and/ or illegal digital tools in pursuit of political ends.'"
- ↑ Smart Grid Threat Landscape and Good Practice Guide, at 21.
- ↑ ENISA Threat Landscape 2013–Overview of Current and Emerging Cyber-Threats, at 36-37.
- ↑ Cybersecurity Best Practices Guide, at 9.
- ↑ Id. at 37.
- ↑ ACSC 2015 Threat Report, at 9.
- ↑ Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy, at 5.