This paper explores the behavior of malicious hacker groups in cyberspace and how they organize into structured networks. Using social network analysis and a validated dataset, it empirically investigates the interactions among these groups. The findings reveal that hacker groups often form close-knit networks where they consult, coordinate, and assist one another in carrying out attacks. The analysis identifies a "small world" phenomenon: actor-groups are tightly interconnected but also maintain a few external links, enabling efficient communication and coordination. This structure enhances the resilience and effectiveness of their malicious operations. By combining quantitative methods with network theory, the study provides insights into the cooperative dynamics of cyber threat actors and the systemic risks they pose to global cybersecurity.
Colajanni, M., Giacomello, G., Iovanella, A., Martino, L. (2025). An Empirical Assessment of Hacker Groups Behaviour in Cyber-attacks: A Small World of Bad Guys. IEEE [10.1109/ieee-ch65308.2025.11279278].
An Empirical Assessment of Hacker Groups Behaviour in Cyber-attacks: A Small World of Bad Guys
Colajanni, Michele;Giacomello, Giampiero;Martino, Luigi
2025
Abstract
This paper explores the behavior of malicious hacker groups in cyberspace and how they organize into structured networks. Using social network analysis and a validated dataset, it empirically investigates the interactions among these groups. The findings reveal that hacker groups often form close-knit networks where they consult, coordinate, and assist one another in carrying out attacks. The analysis identifies a "small world" phenomenon: actor-groups are tightly interconnected but also maintain a few external links, enabling efficient communication and coordination. This structure enhances the resilience and effectiveness of their malicious operations. By combining quantitative methods with network theory, the study provides insights into the cooperative dynamics of cyber threat actors and the systemic risks they pose to global cybersecurity.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


