{"id":15909,"date":"2026-03-06T09:08:34","date_gmt":"2026-03-06T09:08:34","guid":{"rendered":"https:\/\/newestek.com\/?p=15909"},"modified":"2026-03-06T09:08:34","modified_gmt":"2026-03-06T09:08:34","slug":"teenage-hacker-myth-primed-for-a-middle-age-criminal-makeover","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15909","title":{"rendered":"Teenage hacker myth primed for a middle-age criminal makeover"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>The Hollywood image of criminal hackers being largely teenage ne\u2019er do wells is due for an update.<\/p>\n<p>That\u2019s because profit-seeking career criminals \u2014 often approaching middle age \u2014 make up the largest cohort of today\u2019s cybercriminals, according to an analysis of criminal cases carried out by Orange Cyberdefence.<\/p>\n<p>The Orange Group\u2019s cybersecurity unit analysed 418 publicly announced law enforcement activities conducted between 2021 and mid-2025, finding that cyber offenders\u2019 engagement in crime peaks between the ages of 35 and 44, with this demographic accounting for 37% of all the cybercrime cases reviewed.<\/p>\n<p>Collectively, the combined age groups of from 25 to 44 make up well over half (58%) of analysed cybercrime cases. This all goes against the Hollywood image of the maladjusted teen hacker living in their mum\u2019s basement and up to no good.<\/p>\n<p>Profit-motivated cybercrime escalates with age \u2014 unlike other forms of crime where criminal behaviour emerges in adolescence, peaks in the late teens or early adulthood, and then sharply declines.<\/p>\n<p>The review of criminal cases found that 18- to 24-year-olds were the defendants in 21% of cybercrime cases, a figure that drops to 5% for the 12-to-17 age range.<\/p>\n<h2 class=\"wp-block-heading\" id=\"offender-profiling\">Offender profiling<\/h2>\n<p>The <a href=\"https:\/\/www.orangecyberdefense.com\/uk\/security-navigator\">study<\/a> found a notable progression in cybercrime activity as offenders age.<\/p>\n<p>Among 18- to 24-year-olds, cybercriminal activity is highly diverse, with a focus on hacking (30%), followed by selling stolen data and DDoS attacks (10% each).<\/p>\n<p>\u201cThe variety of activities indicates the experimental, multifaceted nature of this demographic\u2019s engagement in cybercrime as they test boundaries and trial tactics,\u201d according to Orange Cyberdefence.<\/p>\n<p>This begins to shift among offenders aged 25 to 34, where activities such as selling stolen data (21%), cyber extortion (14%), and malware deployment (12%) lead the way \u2014 indicating a move toward profit-motivated crime.<\/p>\n<p>The trend intensifies among the 35-44 cohort, where cyber extortion (22%) is the dominant offence, followed by malware (19%), cyber espionage (13%), hacking (10%), and money laundering (7%).<\/p>\n<p>\u201cWhile younger, less experienced hackers engage in highly diverse crime they may be less likely to engage in calculated, profit-seeking activity,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/charl-van-der-walt\/?originalSubdomain=za\">Charl van der Walt<\/a>, head of security research at Orange Cyberdefense. \u201cInstead, cybercrime careers appear to peak much later into adulthood, accompanied by vastly more sophisticated and intentional techniques.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"cybercrime-cartels\">Cybercrime cartels<\/h2>\n<p><a href=\"https:\/\/www.huntress.com\/authors\/dray-agha\">Dray Agha<\/a>, senior security operations manager at managed detection and response services firm Huntress, said the analysis illustrates that the \u201cHollywood image of a teenage lone wolf hacking for bragging rights\u201d is vastly outdated since the threat landscape is dominated by \u201chighly organised, profit-driven syndicates.\u201d<\/p>\n<p>\u201cWhile young people may still engage in digital vandalism or act as low-level affiliates, the architects orchestrating large-scale extortion and malware campaigns are mature adults operating what are essentially illicit technology companies,\u201d Agha said.<\/p>\n<p>Agha argued that the 35-44 age group aligns perfectly with the skills required to run <a href=\"https:\/\/www.csoonline.com\/article\/4116508\/cybercrime-inc-when-hackers-are-better-organized-than-it.html\">modern cybercrime operations<\/a>, such as <a href=\"https:\/\/www.csoonline.com\/article\/563507\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware-as-a-service<\/a> (RaaS). These professionally run campaigns require project management, software development lifecycles, human resources (recruiting affiliates), and customer service (negotiating with victims).<\/p>\n<p>\u201cThis level of operational maturity is rarely found in teenagers; it requires the business acumen typical of midcareer professionals,\u201d Agha said.<\/p>\n<p>While it might be relatively easy to breach a vulnerable system, successfully cashing in on illicit access is a tricky process that requires experience.<\/p>\n<p>\u201cThe prominence of cyber extortion and money laundering in the 35-44 demographic highlights the need for a deep understanding of corporate pressure points, cryptocurrency tumbling, and illicit financial networks,\u201d Huntress\u2019 Agha added. \u201cOlder offenders have the real-world experience necessary to navigate these complex financial logistics and turn stolen data into usable cash.\u201d<\/p>\n<p>While younger offenders often act as \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3952041\/malicious-actors-increasingly-put-privileged-identity-access-to-work-across-attack-chains.html\">initial access brokers<\/a>\u201d \u2014 finding the initial way into a network \u2014 this access is typically sold onto older, more experienced threat actors who execute the high-stakes extortion and espionage.<\/p>\n<p>\u201cThe young \u2018pick the locks,\u2019 while the adults \u2018run the syndicate,\u2019\u201d Agha said.<\/p>\n<h2 class=\"wp-block-heading\" id=\"career-ladder\">Career ladder<\/h2>\n<p>Andra Zaharia, cybersecurity community lead at Pentest-Tools.com, said that many cybercrime operations look \u201cless like solo activity and more like organised networks with roles, handoffs, and repeatable processes.\u201d<\/p>\n<p>\u201cThat structure naturally skews older because it rewards operational discipline and trust networks that take time to build,\u201d Zaharia told CSO. \u201cTechnical skill matters, but so does reliability and consistency over months and years.\u201d<\/p>\n<p>Zaharia added: \u201cProfit motive also reshapes the \u2018career path.\u2019\u201d<\/p>\n<p>Extortion and malware campaigns often involve different people for different jobs: access, tooling, infrastructure, negotiation, and moving money.<\/p>\n<p>\u201cReputation becomes a form of currency in those environments,\u201d Zaharia concluded. \u201cActors build it, protect it, and use it to climb into higher-earning roles.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Hollywood image of criminal hackers being largely teenage ne\u2019er do wells is due for an update. That\u2019s because profit-seeking career criminals \u2014 often approaching middle age \u2014 make up the largest cohort of today\u2019s cybercriminals, according to an analysis of criminal cases carried out by Orange Cyberdefence. The Orange Group\u2019s cybersecurity unit analysed 418 publicly announced law enforcement activities conducted between 2021 and mid-2025,&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15909\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15909","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15909"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15909\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}