Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Breaking down the politics of gender and nationality on cybercriminal forums

cybersecurity-laptop
September 25, 2020

Recently, broader social dynamics, related to gender and nationality, in particular, are shaping the activity of cybercriminal forums. Digital Shadows explored this trend in a new analysis blog, "Unpicking Cybercriminals’ Personalities - Part 1: Gender and Nationality," that looks at how the dynamics of gender and nationality play out in cybercriminal forums and how it’s shaping cybercrime trends as a result. 

In the largely-male dominated world of cybercriminal forums, Digital Shadows’ researchers identified cultures of misogyny that transcend national borders. Researchers observed users commented that even if females are present on cybercriminal forums, they hide their gender and pretend to be male, so they do not attract unwanted attention. Numerous examples of sexism and misogyny include:

  • In 2019 a user on the Russian-language cybercriminal forum Exploit initiated a thread in which they posited that all world problems originate from women and that all wars started because of women. If adequately “controlled,” they continued, a woman could be an “angel”, but would be “a messenger from hell” if left to run riot. In the ensuing discussion, although forum members expressed views on both sides of the argument, they posted images such as a woman ready to eat a brain on a plate, with the caption “A woman’s favourite dish.”
  • Also in 2019 one Exploit user initiated a thread to wish women a happy March 8 (International Women’s Day, celebrated as a holiday in Russia). A later respondent to the thread specifically called out the fact that two users had replied, “thank you,” saying, “It’s more interesting to me why [they] wrote ‘thank you.’” Another user commented, “Clearly we don’t know anything about them.”
  • In July 2020 a user on the Russian-language cybercriminal forum XSS organized a contest with a prize fund of $250 to be awarded to the user who posted in the thread with the best naked picture of a female torso. Thus far, the competition has proven popular, with multiple entries submitted, many of which were sexual or pornographic.

The overwhelmingly male and male-presenting audience on most these of forums reinforce both negative and positive stereotypes of women, even if individual users sometimes push back. It is these cultural norms that likely influenced the launch of DarkMarket, an English-language forum claiming to be the first female-run cybercriminal market. This reveals that even among cybercriminals, ostensibly dedicated to profit alone, are not immune from broader social trends and motivations, and often typify them.

According to Digital Shadows, one of the most common ways in which threat researchers separate and distinguish between cybercriminal forums is to divide them by language or nationality communities. This division may seem counterintuitive in a globally connected world; a cybercriminal in China can just as easily target a victim in New York as a hacker in the southern United States can. Yet cybercriminal forum users congregate in communities with a common language, both because of the ease of communication and the shared values and rules. 

"There is a very prevalent sense of nationality and nationalism on Russian-language cybercriminal forums in particular, say the researchers. "We see frequent arguments about how much these forums should allow the use of English, with many users opining that non-Russian-speaking users should not be catered for and that those without Russian-language skills should be disadvantaged."

In a sense, gender and nationality are two easy personal attributes to conceal, yet providing indications of these two attributed are also two of the most common ways to express individuality on cybercriminal forums, the researchers note. In the second part of the series, Digital Shadows researchers will examine cybercriminal morality and forum dynamics, two "slightly less less straightforward aspects of cybercriminal personalities that may not be as easy to conceal or feign."

For more information, including more details, please visit https://www.digitalshadows.com/blog-and-research/unpicking-cybercriminals-personalities-part-1-gender-and-nationality/

KEYWORDS: cyber security Dark Web hacker information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Hoodie Image for Cybersecurity

    Breaking down morality and forum dynamics on cybercriminal forums

    See More
  • Hacktivist

    Digital Shadows research: Escrow systems on cybercriminal forums

    See More
  • How Continous Is Continous Monitoring?

    Digital Shadows Report: Competitions on English-Language Cybercriminal Forums

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing