Why Do Bad Actors Compromise Sites

Why are sites hacked?

1. Monetary Gain
The primary motivation for most bad actors is financial profit. This can be achieved through:

  • Malware Distribution: Injecting malicious code to infect visitors, leading to data theft, ransomware, or botnet inclusion.
  • Phishing Campaigns: Using a legitimate domain to host fake login pages for financial institutions or other services, tricking users into revealing credentials.
  • SEO Spam: Manipulating search engine rankings, hosting spammy links, or redirecting users to other sites, often without the knowledge of those paying for such services.
  • Ransomware: Locking website owners out of their sites and demanding cryptocurrency payments for restoration.
  • Credit Card Skimming: (For e-commerce) Intercepting credit card details during customer transactions.

2. Resource Exploitation
Bad actors can leverage a website’s server power and access for their own purposes:

  • Cryptocurrency Mining (Cryptojacking): Using server processing power to mine cryptocurrencies, leading to slow site performance and increased hosting costs.
  • DDoS Attacks (Distributed Denial of Service) and Botnets: Incorporating compromised sites into a network of machines to launch attacks against other online services.
  • Large Language Model (LLM) Training and Fine-tuning: Aggregating server power from multiple compromised sites to meet the intensive computational demands of training or fine-tuning LLMs, potentially for malicious AI.

3. Data Theft and Espionage
Websites often store valuable data that is attractive to hackers:

  • Sensitive Data Exposure: Stealing user data, customer information, or internal documents, leading to identity theft, corporate espionage, or dark web sales.
  • Defacement/Vandalism: Changing a website’s content, often for political statements, showing off, or causing disruption.

4. Grudge Attacks or Activism (Hacktivism)
Though less common, some individuals or groups target sites for ideological reasons, protest, or spite. However, the vast majority of attacks are automated and untargeted.The “Business” of Hacking

Hacking is often an organised, large-scale industry:

  • Automation: Most compromises are not targeted human attacks but automated scans exploiting known vulnerabilities in millions of websites. An outdated plugin, for instance, can be an easy entry point.
  • “As-a-Service” Models: Hacking tools and services (e.g., DDoS attacks, lists of compromised websites) are readily available, lowering the barrier to entry for less technical individuals.
  • The Dark Web Marketplace: Compromised data, botnet access, and exploits are bought and sold, turning a hacked site into a potential commodity in a complex exploitation chain. For example, persistent access to an e-commerce site might be sold, followed by the implantation of a credit card skimmer by another party, and then the sale and validation of stolen card details to further groups for fraudulent purchases.

In essence, while a site’s content might seem insignificant, its underlying resources and potential data are highly valuable to bad actors. Understanding these motivations is key to effective cybersecurity. Cybercrime, largely comprising website hacking, would rank as the world’s third-largest economy if it were a legitimate industry.

Web Resources

Introduction To WordPress Security
Update Management (coming soon)

Browser Security (coming soon)

Configuration Management (coming soon)

Hosting and Backups (coming soon)

Monitoring (coming soon)

Compliance (coming soon)

Putting it all together (coming soon)