The Cybercriminal’s Playbook: How Attackers Choose Their Targets

The Cybercriminal’s Playbook: How Attackers Choose Their Targets

Every day, cybercriminals are scanning, probing, and quietly mapping the digital world looking for their next target. If you think your small or medium business (SMB) is too small to be on their radar, think again.

Cybercriminals are strategic. They don’t waste time on hard targets when easier ones are just a click away. Understanding how attackers thinkwhat they look for, and why they choose certain victims is the first step toward defending your business.

Let’s crack open the cybercriminal’s playbook and explore their methods, motives, and real-world case studies that reveal how they operate.


The Attacker’s Mindset: Who Makes the Hit List?

Cybercriminals are not random opportunists. They are profit-driven, risk-averse, and efficient. Their key questions:

  • Where’s the low-hanging fruit?
  • Who has valuable data with weak defenses?
  • How fast can I get in, monetize, and get out?

They profile targets based on:

  • Industry (healthcare, finance, legal, education are prime targets)
  • Company Size (small enough to have weak security, big enough to have valuable data)
  • Technology Stack (unpatched systems, outdated software)
  • Attack Surface (public-facing apps, remote access, exposed services)
  • Employee Behavior (are users trained, do they use MFA, do they click phishing links?)

Tactics Attackers Use to Choose Targets

1️⃣ Shodan Scans: The Internet of Exposed Devices

Attackers use tools like Shodan.io, a search engine for internet-connected devices, to find:

  • Unsecured databases (MongoDB, Elasticsearch)
  • Exposed Remote Desktop Protocol (RDP) ports
  • Unpatched web servers

Case Study: In 2020, attackers targeted thousands of SMBs by scanning for exposed RDP ports during the COVID-19 pandemic surge in remote work. Many of these businesses were later hit with ransomware.


2️⃣ Mass Phishing Campaigns: Wide Net, Narrow Focus

Phishing remains the top attack vector. Criminals craft emails based on:

  • Publicly available data (LinkedIn, websites, press releases)
  • Industry-specific lures (invoices for finance, patient forms for healthcare)
  • Current events (COVID-19, tax season, government regulations)

Example: The Emotet malware gang targeted SMBs with phishing emails disguised as invoices and COVID-19 advisories, tricking employees into clicking malicious links.


Attackers know that small businesses often provide services to larger enterprises. Compromise the SMB, and you can pivot into bigger targets.

Case Study: The Target breach in 2013 started when attackers compromised a small HVAC vendor with weak security, then used their access to infiltrate Target’s payment systems.


4️⃣ Social Engineering: Human Hacking

Cybercriminals study social media, company websites, and press releases to tailor their attacks. They know your CEO is traveling. They know your accounting department is hiring. They know your IT guy just left.

They use this knowledge to craft highly convincing emails or phone calls that trick employees into giving up credentials or installing malware.


5️⃣ Dark Web Recon: Buying Access

For well-funded attackers, the Dark Web is a marketplace of opportunity. They purchase:

  • Stolen credentials (from previous breaches)
  • Access to compromised endpoints (RDP, VPN)
  • Malware kits and ransomware-as-a-service packages

Example: In 2021, threat actors behind Conti ransomware used credentials bought on the dark web to breach SMB networks and deploy ransomware.


Why SMBs Are Prime Targets

Let’s be clear: SMBs are not “too small to hack.” In fact, they’re ideal targets because:

  • They often lack dedicated security teams.
  • They use legacy systems and outdated software.
  • They hold sensitive data (customer records, payment info, IP).
  • They’re less likely to have strong backups and incident response plans.

Attackers know this and they exploit it.


How to Make Your Business a Hard Target

✅ Patch and Update

Unpatched systems are easy wins for attackers. Regularly apply security updates to all software and hardware.

✅ Enable MFA Everywhere

Stolen passwords are cheap. MFA makes them useless.

✅ Train Your Team

Your employees are your first line of defense. Invest in phishing awareness and cybersecurity training.

✅ Reduce Attack Surface

Limit external-facing services. Close unused ports. Use a VPN.

✅ Monitor for Unusual Activity

Don’t just wait for an alert. Consider threat hunting to proactively search for signs of compromise.


Final Thoughts

Cybercriminals are running a business and your SMB is in their sights. If you look like an easy target, you become an easy target.

By understanding how attackers choose their victims, you can make informed decisions that push your business off their hit list.

Let’s stay vigilant. Let’s stay informed. And as always, let’s discuss security.