Hacktivism and Cybercrime: The Merging Threat Keeping CISOs Up at Night


Posted on by Troy Cruzen

Cybersecurity leadership is no longer facing separate and siloed threats of hacktivism and cybercriminals, they are increasingly facing an environment where they’re intertwined. This convergence creates a threat landscape that is more unpredictable, more ideologically charged, and often more dangerous. 

In the past, hacktivism was viewed as noisy, disruptive, but largely harmless. While cybercriminals were considered “serious,” financially motivated, and highly organized, today, the same ransomware tools used by profit-seeking criminals are also used by ideological groups to destroy or leak data. Criminal infrastructure is being rented by nation-state actors to mask espionage. And ideological motives are being used as cover for financially motivated attacks, or vice versa. This is now the era of blended threats.

Hacktivism and Cybercrime Are Now Interlinked

In 2023, Microsoft reported a surge in cyberattacks where politically motivated threat actors used criminal tools and tactics, such as ransomware or data wipers, to cause disruptions under the guise of financial gain. These campaigns often appeared to be standard cybercrime at first glance but were later revealed to be hacktivism, ideologically driven and/or backed by nation-states. 

Infamous hacktivist groups such as Killnet, NoName057(16), and Anonymous Sudan have launched politically charged attacks, primarily DDoS campaigns and data leaks, while sometimes mimicking the language and behavior of ransomware gangs. In other cases, traditional cybercriminal groups have adopted “activist” messaging to justify attacks and obscure their real intent – profit. This blurring of  lines makes attribution more challenging and also makes response planning more complex. 

Why Does This Matter? Unpredictability Meets Professionalism

 When ideology meets financial capability, two things happen:

1. Attacks become more chaotic. Ideologically motivated actors may not follow rational threat patterns. They may escalate quickly, publish data publicly, or change goals mid-attack.

2. Attacks become more capable. The professionalism and tooling of cybercriminals—Ransomware-as-a-Service (RaaS)platforms, dark web marketplaces, and phishing kits—are now available to anyone with a political cause and a Bitcoin wallet.

These actors might lock files one day, leak sensitive documents the next, and post public messages meant to damage trust in leadership. This combined hacktivism threat landscape forces CISOs and boards to rethink how they approach cyber risk. It's not just about stopping a data breach—it's about anticipating unpredictable attacks with multifaceted motives.

Hacktivism & Cybercrime: A Blended Risk to Business 

In this blended threat environment, every organization is potentially a target, even those without obvious financial or political value.

  • A healthcare provider may be targeted by ransomware actors one week, and then by a hacktivist group protesting government healthcare policy the next.
  • A financial institution might suffer a distributed denial-of-service (DDoS) attack labeled as ideological protest, when, in reality, it’s a cover for credential harvesting.
  • An energy firm could find itself in the crosshairs of both environmental activists and geopolitically motivated actors looking to disrupt critical infrastructure.

Whether the motivation is protest, profit, or sabotage, the tactics and tools are now shared, meaning every organization needs to prepare for the full spectrum of threats. Oh, were the days of the Nigerian Prince email scam.

What Security Leaders Should Do Differently

From frontline experience to executive advisory work, here are four essential shifts:

1. Stop Categorizing Threats by Motive—Focus on Impact

While attribution is valuable, it often comes too late. Instead, focus on the impact of an attack. Ask questions like “Can oursystems resist data theft, data leaks, and operational disruption regardless of motive?” Build playbooks that are motive agnostic. Prepare for the outcome, not the actor.

2. Double Down on Threat Intelligence—But Make It Strategic

Yes, indicators of compromise (IOCs) matter—but so does context. Strategic threat intelligence should include geopolitical awareness, social media sentiment, and ideological targeting trends. During the Israel-Hamas conflict in 2023, hacktivist groups globally began launching attacks on organizations with even tangential ties to the region.

3. Prepare for the PR Fallout

When an attack comes with a message, whether political, moral, or personal, it becomes a public incident, not just a technical one. Leaked emails, fake screenshots, or calls to “expose the truth” can quickly spiral into news stories. An organization’s crisis communication plan should be ready for these scenarios, not just traditional breach notifications. Organizational leadership must understand what could be coming. 

4. Monitor the Crossover Infrastructure

Many groups now share infrastructure—botnets, stolen credentials, cloud storage services, and more. What starts as a criminal campaign could be repurposed for hacktivism within days. Work with MSSP or XDR providers to detect re-used infrastructure and cross-campaign linkages.

Preparing for Complex, Converging Threats: Handling Hacktivism and Cybercrime

The world has changed and so have its cybercriminals. Hacktivism and cybercrime are no longer separate concerns. They’re threads in the same fabric, often tangled, always evolving. Security leaders can’t afford to treat these threats in isolation. They need strategies that account for both the emotion and the economics of cyberattacks. That means broader threat modeling, faster response coordination, and better alignment between security, communications, and leadership. This isn’t just about patching systems or blocking IPs. It’s about being ready for a new kind of adversary—one who doesn’t fit into a simple category and doesn’t always follow the rules.

Contributors
Troy Cruzen

vCISO, Fortified Health Security

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSAC™ Conference, or any other co-sponsors. RSAC™ Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs