• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Hackers’ Ethics Evolution: Special Features of Modern Hacking Groups Operations

Student: meretukova ruzana

Supervisor: Panos Kompatsiaris

Faculty: Faculty of Creative Industries

Educational Programme: Critical Media Studies (Master)

Year of Graduation: 2022

Today the term ‘hacker’ has not only various connotations but also implies different meanings depending on the type of attack and, sometimes, on the way hackers perform their attacks. While some might label infamous hacking groups as criminals others would consider their work as a part of the fight for free information flow, political transparency as well as an act of fighting for liberal values. Today, hackers are not only to gain financial profit but also to promote a political agenda and social change. Many attacks find social approval while the hacking collectives behind them are being called ethical since the attackers root for some values that people support. At the same time, hackers developed their own codes of ethics, provide various service and make generous donations. But can hacking ever be ethical? Most of the academic literature devoted to hackers’ ethic covers the issue through the prism of the Anonymous collective. However, it has already been six years from the peak of hacktivists activity nowadays and other hacking subgroups of hackers with their unique toolsets and positioning methods stepped in to the big game. The era of hacktivists came to an end, while the era of ransomware hackers started its development. I considered it is necessary to extend the existing studies with more relevant cases since hacktivists activity reduced significantly from 2016 conceding the primacy to other hacker subgroups who use other tools, namely, ransomware operators. This research aims to define the main features of the modern hacking groups not from a technical point of view but from the standpoint of critical media researcher. This study employs digital ethnography method as well as a qualitative case study and content analysis to define how hackers’ self-conceptualize themselves internally. My research is narrowed to the case studies of two hacking groups – the Babuk and Darkside.

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses