The illusion of good intentions

Issue 7 2023 Security Services & Risk Management

“Interacting with ransomware criminals should be exclusively handled by experts with proper training,” warns the well-known cybersecurity strategist Jon DiMaggio. DiMaggio issued this important cautionary advice while analysing the psychology of cyber criminals and the behaviours displayed by the founder of LockBit, a type of ransomware that encrypts data on target systems, making it inaccessible to the system and network resources.


Anna Collard.

Although this individual may come across as respectful and engaging, DiMaggio discovered that he exhibited narcissistic, sexist, and racist traits when communicating with others. “Numerous cybercriminals do not perceive themselves as being inherently malicious individuals,” notes Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 AFRICA.

“It is called the neutralisation effect,” she explains. “What cybercriminals do, particularly with ransomware, is they neutralise perceptions of what they are doing by using business terminology. They refer to the companies they hack not as victims, but as customers. They pretend that what they are doing is good, claiming to help companies become more secure and offer a service.”

This is partly true. Cybercriminals sometimes offer advice to organisations on how to secure their environments and avoid future ransomware attacks. Some advertise the charities they support; others claim that a percentage of the funds received is donated for charitable purposes. However, these actions are merely tactics used by cybercriminals to justify their illegal activities. According to Collard, the Bonaci Group is an example of such behaviour. A cyber defence whitepaper examines their actions, revealing how they use business language and present themselves as benevolent, while “ignoring basic realities like law, mutual agreement, and the negative impact on society.”

“Another tactic they use is referred to as the ‘disinhibition factor’,” says Collard. “This factor highlights the lack of empathy people feel towards victims who are physically distant. This principle also applies to internet trolls and other negative individuals in the online realm, as they are detached from the direct consequences of their actions.”

This aligns with research that used the Elemental Psychopathy Assessment, which is based on the big five personality traits, to assess how psychopathy is associated with cyber offences. It revealed that individuals inclined towards cybercrime exhibited traits such as antagonism, narcissism, and disinhibition.

“The last really interesting trait is how arrogant the leaders of the cybercriminal groups can be,” says Collard. “In 2022, a researcher obtained access to the internal chats of a Ransomware-as-a-Service group called Yanluowang. It revealed a lot of insights about how these groups function and the individuals who control them. Notably, the LockBit group leader, recognised as one of the largest and most active groups, has given multiple interviews.”

Experts are finding that cybercriminals are arrogant, believing themselves to be superior and more knowledgeable than others. They are not afraid of law enforcement and think they cannot be caught. They also display narcissistic tendencies. The leader of LockBit, for instance, has openly expressed his lack of fear towards the government on multiple occasions. In fact, he has even initiated a LockBit tattoo campaign and a writing competition, demonstrating his bold and audacious behaviour.

“Mikhail Pavlovich Matveev, also known as Wazawaka, posted a picture of himself wearing snakeskin pants in a defiant gesture after the FBI offered a $10 million reward for information leading to his arrest,” says Collard. “There is the arrogance, the know-better-than-you attitude. Yet, when Jon DiMaggio engaged with the LockBit founder, it had little impact. These criminals are in it for the money. They may use these tactics to neutralise perceptions of their actions and portray themselves as virtuous, but ultimately, they are criminals.”

This is perhaps the strongest warning; the leaders of these groups are smart, arrogant and perfectly capable of bribing, scaring and intimidating people into doing what they want. If your business is hacked, do not engage – get a professional to step in and handle the negotiations, or things could very easily get worse.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...