• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

    French National Bank Authority, FICOBA, CNIL

    French National Bank Authority Breach Exposed 1.2 Million Accounts

    Responsible AI

    What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

    Israel Data Breach

    Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

    UMMC cyberattack

    Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

    VS Code extensions

    Critical Security Flaws Discovered in Four VS Code Extensions Affecting Millions

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Advantest Cyberattack, Advantest, Cybersecurity Incident

    Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network

    CVE-2026-2447

    Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    French National Bank Authority, FICOBA, CNIL

    French National Bank Authority Breach Exposed 1.2 Million Accounts

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Lockdown Mode, ChatGPT

    OpenAI’s New Enterprise Security Mode Locks Down ChatGPT Against Prompt Injection

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    Grok AI, Grok, Elon Musk, Case against X, Platform X,

    Ireland Opens GDPR Probe Into Grok’s AI-Generated Deepfakes of Children

    India AI Impact Summit 2026

    AI a Tool for Inclusion, Jobs and Global Cooperation: India AI Impact Summit 2026

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    AI-generated Content

    India Brings AI-Generated Content Under Formal Regulation with IT Rules Amendment

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

    French National Bank Authority, FICOBA, CNIL

    French National Bank Authority Breach Exposed 1.2 Million Accounts

    Responsible AI

    What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

    Israel Data Breach

    Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

    UMMC cyberattack

    Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

    VS Code extensions

    Critical Security Flaws Discovered in Four VS Code Extensions Affecting Millions

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Advantest Cyberattack, Advantest, Cybersecurity Incident

    Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network

    CVE-2026-2447

    Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    French National Bank Authority, FICOBA, CNIL

    French National Bank Authority Breach Exposed 1.2 Million Accounts

    AI in education

    AI Has Entered Schools—But What About Its Responsible Use?

    Responsible AI

    Responsible AI at Scale Demands Cyber Readiness, Experts at India AI Impact Summit Warn

    Lockdown Mode, ChatGPT

    OpenAI’s New Enterprise Security Mode Locks Down ChatGPT Against Prompt Injection

    Cyber Essentials

    Think You’re Too Small to Be Hacked? NCSC Says Think Again

    Grok AI, Grok, Elon Musk, Case against X, Platform X,

    Ireland Opens GDPR Probe Into Grok’s AI-Generated Deepfakes of Children

    India AI Impact Summit 2026

    AI a Tool for Inclusion, Jobs and Global Cooperation: India AI Impact Summit 2026

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    AI-generated Content

    India Brings AI-Generated Content Under Formal Regulation with IT Rules Amendment

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Exploiting Digital Playground: Why Are More Kids Becoming Hackers, Turning to Cybercrime?

While it is evident that teens hack, the question is why? Why are so many hackers kids? What urges them to step into the dark side and indulge in lawlessness.

Avantika by Avantika
May 21, 2023
in Features
0
Kids Becoming Hackers
706
SHARES
3.9k
VIEWS
Share on LinkedInShare on Twitter

At the age of 5, an American boy Kristoffer von Hassel became the youngest hacker after he found a vulnerability in the Microsoft Live Xbox system that allowed him to bypass the parental blocks put in his dad’s gaming console to prevent him from playing.

By repeatedly trying multiple password combinations, Hassel found a glitch that let him enter the wrong password and then allowed access when he entered a series of spaces. Hassel was soon discovered by his parents playing the video game, which led to the reveal of the security glitch and the massive media coverage that followed.

However, not all hacking stories have a happy ending. Many lead to arrests.

A simple Google search will list multiple hacking incidents involving teenagers and young adults. A recent report highlighted how some of the biggest cybercrimes were being orchestrated by individuals who were not old enough to graduate high school.

In 2022, a 16-year-old was accused of being one of the leaders of the infamous extortion hacker group Lapsus$. The teen allegedly amassed $14m through his hacking activities and managed to infiltrate tech giants and corporations such as Microsoft. The police arrested seven individuals between the age of 16-21 in connection with the hacking group investigation.

17-year-old Graham Ivan Clark was the mastermind behind the massive 2020 Twitter hacking that impacted over 130 Twitter accounts, including those of Elon Musk, Bill Gates, Barack Obama, and Joe Biden. Clark was sentenced to 3 years of jail.

report-ad-banner

While it is evident that teens hack, the question is why?

Why are so many hackers kids? What urges them to step into the dark side and indulge in lawlessness?

hackers, Kids Becoming Hackers, children hackers, teen hackersCuriosity: The Double-Edged Sword

Children, by nature, are curious beings, and while “hacking” may have a negative connotation, especially with regard to children, it often is not the motivation. Many teens are drawn to technology and explore hacking out of curiosity.

A recent study shows that 70% of children spend at least three hours on devices daily. At the same time, only about half of parents use parent-controlling apps or supervise children as they use digital devices, while the rest pay less attention to their children’s digital behavior.

The freedom to explore often gives children a chance to stumble into activities which they may not entirely understand.

teen hackers, children into hacking, teen cybercriminals

Many, especially those with technical aptitude and an inclination towards critical thinking and problem-solving, explore hacking to understand how systems work and satisfy their inquisitive nature.

In a study conducted by the National Crime Agency, it was found that teenage hackers were motivated by “idealism and impressing their mates rather than money,” The Guardian reported.

The study, which interviewed teens as young as 12 arrested for computer-related crimes, found that the children were inspired by their desire to solve technical problems, seek attention and prove themselves to their friends.

“Conquering the challenge, proving oneself to the group and intellectual satisfaction are more important motivations than financial gain,” the report stated.

Jake Davis, aka Topiary, was a former member of the infamous hacker collective Anonymous. At the age of 18, Davis was arrested in July 2011 for criminal activities, including cyber raids and hacking of government websites.

In an interview, Davis shared how his purpose was to challenge secrecy. “It was not financially motivated at all, as the NCA report says, it was mostly politically motivated. I was motivated as a teenager by the idea that this internet was this utopian space that shouldn’t be controlled or filtered or segmented or chopped up into little blocks and distributed out, and that it should be open and free, and anyone in the world should be able to use it.”

Davis was only 13 when he began exploring the internet.

While curiosity, peer pressure, and the need to challenge technology plays a crucial role in stimulating children towards hacking, unsupervised exposure to the digital landscape also leaves them vulnerable to exploitation, especially by the perpetrator who are always on the lookout for the innocent.

Hacker:HUNTER, a four-part series, explores the different phases of teen hacking and tells the stories of children for whom hacking turned into their favorite game.

Directed by Hugo Berkeley, Didi Mae Hand, and Lara Maysa Ingram, the cybercrime series provides an overview of children hackers, how they get acquainted with the hacking world, what stance the penal system takes with regard to minor offenders and, finally, raises the question of whether there is a way out.

Hackers Recruiting Children Through Online Gaming

Kids Becoming Hackers

In recent years, gaming has captured the attention of children worldwide, exposing them to a world of unlimited virtual possibilities.

However, with this, they have also become easy targets for hackers, who often lurk on gaming platforms to identify skilled children and groom them into carrying out hacking tasks.

“Kids are curious. Kids want to play. And that’s just amazing! For this season, we asked ourselves what happens if that curiosity turns into criminal behavior? Is it even possible for a 14-year-old to figure out that they are doing something illegal while sitting on their computer in their kid’s room?” asks Rainer Bock, hacker:HUNTER’s Executive Producer.

Rehabilitating Teen hackers, is That a Possibility?

Kids Becoming Hackers

Over the years, the number of teen hacking incidents has continued to rise, urging law enforcement agencies to take a harder look at the issue impacting young minds. However, it is often wondered whether hackers can be rehabilitated and if they can eventually be trusted.

There have been several incidents where teen hackers have confessed to being in a “dark place” while indulging in hacking-related activities and regretted their actions.

In an interview, former hacker Cal Leeming, who was convicted of using over 10,000 stolen identities to buy £750,000 worth of goods, shared how he got into illegal activities at the age of 11.

“I was convicted of ‘causing a computer to perform a function with intent to secure unauthorized access’, under The Computer Misuse Act (1990), at the age of 12. I’m still the UK’s youngest convicted hacker,” he told Metro News.

In his interview, Leeming shared how things quickly escalated into crime and he was “breaking into various ISPs [internet service providers] and companies to steal data.” However, things got to a point where Leeming said that he “wanted to get caught”.

Charlton George, who brought down the websites of the FBI and Home Office at the age of 16, regretted his actions. “I honestly regret doing that type of thing now. I got caught up in a world that is rather dark, but it gives you a home when you’re not quite happy with real life,” he said, Coventry Telegraph reported.

While many know Marcus Hutchins as the hacker “who saved the internet” as he stopped the WannaCry ransomware attack, not many know that he was arrested for the hacking he had done during his teen.

Hutchins was accused of being part of a conspiracy where he created and distributed malware ‘Kronos’, which targeted banking websites. He was sentenced to “time served” and one year of supervised release.

Talking about teen hacking becoming an issue in the future, Hutchins told online magazine Slate that it was a “very hard problem to solve.”

“It is very hard to put an end to teen mischief without putting them in jail, and no one wants to see teens in jail, especially not myself. It’s very hard to think of any way that’s enough deterrence to stop them from doing it without just being completely overboard. I personally can’t think of any punishment that would have stopped me at that age that wasn’t way over the top,” he said.

While clearly, there is no one solution to the prevalent problem of teen hackers, it is essential to look at all aspects of individuals, especially teens indulging in criminal activities.

In a bid to deter cybercrimes committed by teens, law enforcement agencies need to look beyond the crime and take initiatives such as rehabilitation programs to help them move towards the right path.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Kids Becoming HackersTeen hackers
Previous Post

Users Beware of The CapCut Phishing Website Scams Targeting Video Editors

Next Post

OpColombia: ‘Org0n’ Arrest Leads to 30 Colombian Radio Broadcasts Cyber Attacks

Next Post
Colombian Radio Broadcasts Cyber Attacks

OpColombia: 'Org0n' Arrest Leads to 30 Colombian Radio Broadcasts Cyber Attacks

Upcoming Webinar

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

The Cyber Express Weekly Roundup
Firewall Daily

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

February 20, 2026
French National Bank Authority, FICOBA, CNIL
Cyber News

French National Bank Authority Breach Exposed 1.2 Million Accounts

February 20, 2026
Responsible AI
Cyber News

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

February 20, 2026
Israel Data Breach
Firewall Daily

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

February 20, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information