The Thales Group and the Verint analysis company are launching a comprehensive guide to help business leaders secure their IT systems against cyber attacks. They dissect, in passing, the profiles of cyberattackers.

This is the first guide to understanding cyber threats. This report, co-produced by the electronics group Thales and the Verint analysis company, is a worldwide reference for all business owners. It results from studies of several thousand hours and nearly 500 cyberattacks in forty countries. It dissects one by one the different modes of action of more than sixty groups, and classifies them into four profiles: cybercriminals (whose goal is often to make money), cyberterrorists, cyberactivists and especially ... cyberattacks of states.

Driven by a desire for influence, espionage or the recovery of financial funds, states are indeed at the origin of one out of two cyberattacks, according to the report. Each crisis of the real world is superimposed on a parallel digital battlefield.

Money is never missing and they are constantly adapting to their target

Everyone has his area of ​​specialty. There is the destructive method of Russia, capable of plunging Ukraine into the dark by hacking local electricity suppliers. There is the scam and ransom tactics carried out by North Korea, suspected of stealing $ 2 billion to bail out its coffers. There is also the targeted strategy of China, whose cyberattackers each have expertise (in industry, health, defense ...).

>> READ ALSO: The website of the Ministry of Justice hacked by hackers close to the "yellow vests" during the "act 4"

These cyberattackers are sometimes mercenaries, sometimes employees of the state. Money is never lacking and they constantly adapt to their target, even if it means changing it. Faced with them, institutions and large corporations erect fortresses of protection. As a result, today they are targeting subcontractors.