Who is usually behind cyberattacks?

Asked by: Narciso Bashirian  |  Last update: March 21, 2026
Score: 4.1/5 (60 votes)

Cyberattacks are generally carried out by a diverse group of actors, ranging from financially motivated criminals to state-sponsored organizations, with over 80% of breaches involving external actors. The primary motivations driving these attacks are financial gain, espionage, or ideological disruption.

Who is behind cyber attacks?

Cyberattacks come from diverse actors, including organized cybercriminals (seeking financial gain), state-sponsored groups (espionage/political goals, e.g., Russia, China, Iran, N. Korea), hacktivists (ideological motives), malicious insiders (disgruntled employees), and even less skilled individuals using rented tools. These threats target individuals, companies, and governments for various reasons, from money to geopolitical advantage, often using sophisticated techniques.
 

Who is most targeted by cyber attacks?

Top 6 Cyber Attack Vulnerable Industries in 2026 and Why Hackers Are Targeting Them

  • Healthcare sector: High data value + urgent operational requirements. ...
  • Manufacturing & Industrial sector: Legacy systems, IoT exposure. ...
  • Financial Services & Insurance – Rich data + financial leverage.

Where do 90% of all cyber incidents begin?

Over 90% of cyber incidents begin with phishing, where malicious emails trick users into clicking links or opening attachments that steal credentials, install malware (like ransomware), or lead to data breaches, making the human element the most common entry point for attackers. These scams exploit emotions like fear or urgency to bypass technical defenses and get people to reveal sensitive information or grant unauthorized access.
 

Where do most cyber attacks come from?

Over 40% of global cyberattacks originate from China

Nearly half of all cyberattacks tracked worldwide can be traced back to Chinese IP addresses or hacker groups. These attacks often target industries like aerospace, healthcare, defense, and technology.

Who are the people behind cyber-attacks?

15 related questions found

What causes 95% of all cybersecurity breaches?

95% of cybersecurity breaches are attributed to human error, stemming from actions like clicking phishing links, using weak passwords, misconfiguring systems, or falling for social engineering, with studies from IBM and Mimecast highlighting this statistic as a major vulnerability, showing that human behavior, not just technology, is the weakest link in security. 

Where do most hackers originate?

China is by far and away the biggest source of hacking with nearly half of all attacks originating from the country. The US also houses its share of hackers – perhaps unsurprisingly, given that the US pretty much leads the charts for any web stat. What's amazing is tiny Taiwan's contribution to the total.

What is the root cause of cyber attacks?

Financial Gain: Among the most prevalent motivations driving cybercrime is the pursuit of financial profit. Cybercriminals exploit vulnerabilities in digital systems to access sensitive financial information, perpetrate online fraud, and extort money through ransomware attacks.

Can cyberattacks start from an email?

A staggering 91% of cyber-attacks start with a phishing email, often delivered with an air of legitimacy that can fool even seasoned professionals. Spoofed sender addresses, malicious attachments, and deceptive URLs are the launchpads for data breaches, reputational damage, and multimillion-dollar fraud.

How likely is leave the world behind to happen?

While this is a terrifying scenario, it is highly unlikely. Causing mass outages across an entire country and compromising all critical networks simultaneously, including ISPs, satellite networks, and radio transmissions, is far-fetched in our current world.

Which country is no. 1 in cyber security?

There's no single "No. 1" cyber security country, as rankings vary by metric (defense, offense, cybercrime), but the United States consistently leads in overall investment, capability, and market size, though countries like China, Russia, and Israel are major players, while Nordic nations like Finland, Denmark, and Estonia often rank high for low risk and strong frameworks, according to reports from 2024-2025. 

Who are the top 5 hackers in the world?

Here are seven of the most famous hackers of all time and the stories behind their cyber escapades.

  • Kevin Mitnick. Kevin Mitnick became “the world's most famous hacker” after stealing computer code from tech companies like Nokia and Motorola. ...
  • Anonymous. ...
  • Astra. ...
  • Gary McKinnon. ...
  • Steve Wozniak. ...
  • Gummo. ...
  • Adrian Lamo.

Who do hackers target?

Financial Institutions: It may seem obvious, but hackers often target financial institutions in hopes of exposing personal information, such as Social Security numbers, or gaining fraudulent access to financial services, such as credit cards. Savvy hackers can find any number of ins to a customer's private profile.

What is the main reason people get hacked?

The biggest motivation is often financial gain. Hackers can make money by stealing your passwords, accessing your bank or credit card details, holding your information to ransom, or selling your data to other hackers or on the dark web.

Who is ultimately responsible for cyber security?

Chief Executive Officer (CEO)

Besides ensuring regulatory compliance, the CEO must understand the entity's risk profile and effectively manage risk across the enterprises. Additionally, this leader should set aside sufficient funds in the budget for implementing stringent cybersecurity measures.

What do cyber attackers want?

Financial gain remains the most common motivation for cyber attacks. Cybercriminals employ various methods to achieve this: Theft of sensitive financial information: Attackers may target banking details, credit card information, or other financial data.

Where do 90% of cyber incidents begin?

Over 90% of cyber incidents begin with phishing, where malicious emails trick users into clicking links or opening attachments that steal credentials, install malware (like ransomware), or lead to data breaches, making the human element the most common entry point for attackers. These scams exploit emotions like fear or urgency to bypass technical defenses and get people to reveal sensitive information or grant unauthorized access.
 

What happens if a hacker gets your email address?

When your email is hacked, hackers can steal your identity, lock you out of accounts, send spam from your address, and access sensitive personal data like financial info or medical records; key signs include login issues, unfamiliar sent emails, password reset alerts, and security warnings about new logins. They use this access to reset passwords for banking, social media, and other services, essentially taking control of your digital life, potentially leading to financial loss or reputation damage. 

Should I ignore a sextortion email?

Yes, you should ignore and delete a sextortion email; do not respond or pay, as it's likely a mass scam, but do save the email and report it to authorities like the FBI, FTC, and your email provider to help stop future attacks. The scammers rely on fear, often using breached data (like passwords) to seem legitimate, but they usually don't have actual compromising material and only gain by getting you to panic and pay, which confirms your address is active. 

Where do most cyberattacks originate?

(credits: 2024 Bruce et al.) Overall, Russia came top, followed by Ukraine, China, the United States, Nigeria and Romania. Each of these countries also ranks in the top 10 for each of the five threat categories.

What commonly motivates cybercriminals?

Money, Let's be real — most cybercriminals are in it for the cash. Whether it's through ransomware, phishing scams, or stealing and selling data, money is usually the end goal.

What is the #1 cause of security breaches?

One of the primary causes of data breaches is human error in data security. Even the most sophisticated security systems can be undermined by simple mistakes, such as misdirected emails or weak passwords.

Will unplugging a computer stop a hacker?

Yes, turning off your computer stops most hacking by cutting network connections and stopping running malware, making it vulnerable only if features like Wake-on-LAN are enabled or if sophisticated firmware-level attacks exist, but a full shutdown (unplugging) provides maximum security against remote threats, while regular shutdowns prevent ongoing attacks and allow essential security updates. 

What ethnicity are most hackers?

Hackers also hailed from more than 70 countries, with India, the United States, and Russia having the most concentration of hackers.

Who is the world's top 1 hacker?

There's no single "world's No. 1 hacker," as it's subjective and hackers often work in anonymity, but Kevin Mitnick is widely considered the world's most famous hacker, known for his legendary exploits in the '80s and '90s, becoming the FBI's Most Wanted before turning into a respected cybersecurity consultant, author, and speaker until his passing in 2023. Today, notorious groups like the Lazarus Group or individuals like IntelBroker are known for major 2025 attacks, while ethical hackers like Ryan Montgomery ("0day") gain fame for positive impact.