{"id":356843,"date":"2025-07-25T09:01:41","date_gmt":"2025-07-25T03:31:41","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=356843"},"modified":"2025-07-25T09:04:14","modified_gmt":"2025-07-25T03:34:14","slug":"hacker-com-cyber-criminal-subset-of-the-community-com-is-a-rising-threat-to-youth-online","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/hacker-com-cyber-criminal-subset-of-the-community-com-is-a-rising-threat-to-youth-online\/","title":{"rendered":"Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Online"},"content":{"rendered":"<header>\n<div class=\"fields\">\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The Federal Bureau of Investigation is warning the public about <\/span><dfn style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Hacker Com<\/dfn><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">, one of three subsets of the growing and evolving online threat group known as\u00a0<\/span><abbr style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The Com<\/abbr><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">, short for The Community.\u00a0<\/span><dfn style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The Com<\/dfn><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u00a0is a primarily English speaking, international, online ecosystem comprised of multiple interconnected networks whose members, many of whom are minors, engage in a variety of criminal violations. Members of Hacker Com typically have a shared interest, ideology, or goal and work together, adding others to the group and splintering when necessary, to achieve their mission.<\/span><\/p>\n<\/div>\n<\/header>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Hacker Com involves a broad community of technically sophisticated cyber criminals, some of whom are linked to ransomware-as-a service (<abbr>RaaS<\/abbr>) groups. Members of Hacker Com often sell technical services for a profit and use their technical capabilities to steal cryptocurrency to fund other criminal activity. Computer-related criminal activity within Hacker Com includes, but is not limited to, distributed denial-of-service (<abbr>DDOS<\/abbr>) attacks, compromise of personally identifiable information, sale of government email accounts, ransomware attacks, phishing, malware development and deployment, cryptocurrency theft, computer intrusions, and subscriber identity module (<abbr>SIM<\/abbr>) swapping<sup id=\"retfn1\"><\/sup>. Hacker Com actors use tools such as: remote access trojans, phishing kits, voice over internet protocol (<abbr>VOIP<\/abbr>) providers, voice modulators, virtual private networks (<abbr>VPNs<\/abbr>), spoofing technology, cryptocurrency cash out services, live streaming services, and encrypted email domains to facilitate their criminal activity and conceal their true identities. While many of these tools and methods are used throughout the entirety of The Com, some are more prevalent within Hacker Com subgroups. Open-source information indicates Hacker Com groups are responsible for high-profile attacks and intrusions and have affiliations with ransomware organizations.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Cryptocurrency theft is the primary motivator for many Com actors, which often leads to internal conflicts and Com members themselves becoming the targets of SIM swaps and other cyber-related crime. Perceived slights, membership in a rival group, or boasts about cryptocurrency balances can provoke Com actors to attack each other. Notoriety and perceived status within Hacker Com groups are derived from a member&#8217;s skill sets and account balances. Members screen share and brag about profits resulting from cryptocurrency thefts, which sometimes exceed millions of dollars. In many cases, this leads to a member becoming a target of cryptocurrency theft. In addition to SIM swapping and network intrusions, physical extortion is another means of stealing cryptocurrency. This can involve kidnapping, torture, threats of violence toward family members, and the use of firearms. The intensification of these online conflicts has resulted in the emergence of a new layer of The Com known as In Real Life (<abbr>IRL<\/abbr>) Com, which includes subgroups that aim to facilitate real world acts of violence, oftentimes resulting from online conflicts. Members may start their Com participation in IRL Com, make friends with other members in Hacker Com, develop the necessary cyber skills, and then begin participating in Hacker Com while continuing their association with IRL Com. Others may use funds gained through participation in Hacker Com to participate in Extortion (<abbr>Extort<\/abbr>) Com.\u00a0<dfn>Extortion<\/dfn>\u00a0Com primarily involves the exploitation of children. Members extort minors, typically females, through threats of doxing<sup id=\"retfn2\"><\/sup>, swatting<sup id=\"retfn3\"><\/sup>, and IRL violence if member demands are not met.<sup id=\"retfn4\"><\/sup><\/span><\/p>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Swatting and Hacker Com<\/span><\/strong><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Some Com subgroups offer swat-for-hire services via communication applications and social media platforms. Infighting among Com subgroups often leads to targeted swatting and doxing of members. The Com actors who offer these swatting services use platforms and technologies to obscure their true identities and are often paid in cryptocurrency.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Hacker Com groups use swatting to divert attention away from mobile devices or company networks during cryptocurrency thefts or corporate intrusions. The relative ease with which swatting is arranged makes it an attractive retaliation option.<\/span><\/p>\n<section><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Victim Reporting and Additional Resources<\/span><\/strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If you or someone you know may be a victim of a crime using the tactics outlined above, the following resources may help:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If it is an immediate, life threatening emergency, dial 9-1-1.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Consult a health care provider who can provide an initial evaluation or referral to a mental health professional.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Connect to a mental health resource who can help with health coping skills for intense emotions and help reduce the risk of a serious injury.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The National Center for Missing and Exploited Children (<abbr>NCMEC<\/abbr>) provides a free service known as\u00a0<strong>Take It Down<\/strong>, which helps minor victims, or adults who were victimized as minors, with removing or stopping the online sharing of nude, or sexually explicit content taken while under 18 years old. For more information, visit\u00a0<a href=\"https:\/\/www.ic3.gov\/Egress\/https\/takeitdown.ncmec.org\/443\/B3AB22CC7ACCE981A99C8F787F51BBE6BF1484ADDF7BAF8EBC9B0B541D9F5FCC\" target=\"_blank\" rel=\"noopener\">https:\/\/takeitdown.ncmec.org<\/a>.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Contact your account providers immediately to regain control of your accounts, change passwords, and place alerts on your accounts for suspicious login attempts and\/or transactions.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Retain all the information regarding the incident (e.g. usernames, email addresses, monikers, websites, platforms used for communication, names, photos, or videos) and immediately report it to:<\/span>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">FBI&#8217;s Internet Crime Complaint Center:\u00a0<a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noopener\">www.ic3.gov<\/a><\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">FBI Field Office:\u00a0<a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\" target=\"_blank\" rel=\"noopener\">www.fbi.gov\/contact-us\/field-offices<\/a>\u00a0or\u00a0<a href=\"tel:+1(800)225-5234\">1-800-CALL-FBI<\/a>\u00a0(225-5324)<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">National Center for Missing and Exploited Children (NCMEC):\u00a0<a href=\"tel:+1(800)843-5678\">1-800-THE-LOST<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.ic3.gov\/Egress\/https\/report.cybertip.org\/443\/B144AE1A444A360E687E858B62C3D8913EADD8B1D19AB98AEBD01849ABF34204\" target=\"_blank\" rel=\"noopener\">report.cybertip.org<\/a><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/section>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigation is warning the public about Hacker Com, one of three subsets of the growing and evolving online threat group known as\u00a0The Com, short for The Community.\u00a0The Com\u00a0is a primarily English speaking, international, online ecosystem comprised of multiple interconnected networks whose members, many of whom are minors, engage in a variety [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":208462,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":{"0":"post-356843","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=356843"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/208462"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=356843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=356843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=356843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}