{"id":60452,"date":"2026-04-08T21:09:51","date_gmt":"2026-04-08T21:09:51","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/"},"modified":"2026-04-08T21:09:51","modified_gmt":"2026-04-08T21:09:51","slug":"criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/","title":{"rendered":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief"},"content":{"rendered":"<p><span class=\"label\">interview<\/span> It&#8217;s the biggest threat today, but it took her a while to appreciate it. After spending two decades at the FBI and much of that time working to intercept and stop cyber threats from the likes of China and Russia, Halcyon Ransomware Research Center SVP Cynthia Kaiser says she was a &#8220;latercomer to really wanting to focus on ransomware.&#8221;<\/p>\n<p>&#8220;I was a Section Chief at the FBI, I was over in the nation state analysis &#8211; so North Korea, Iran, China, Russia &#8211; and at the time <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/03\/12\/volt_tyhoon_experience_interview_with_gm\/\">China was pre-positioning<\/a> on our <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/07\/us_chinas_volt_typhoon_attacks\/\">critical infrastructure<\/a>, posing this existential threat,&#8221; she told <em>The Register<\/em> during an interview at RSA Conference.&nbsp;<\/p>\n<p>&#8220;Ransomware was a slower evolution for me to realize that&#8217;s who is stealing from us today, that&#8217;s the threat facing us today &#8211; it&#8217;s not the potential catastrophic threat of tomorrow,&#8221; Kaiser said. &#8220;I&#8217;m also really angry about ransomware because ransomware targets hospitals today, it kills people today.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In June 2025, Kaiser left her post as <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/04\/29\/fbi_china_ai\/\">deputy assistant director at the FBI&#8217;s cyber division<\/a> to lead security firm Halcyon&#8217;s new Ransomware Research Center. It debuted a month later at Black Hat, and the center aims to stomp out the ransomware scourge, which combined with straight extortion attacks, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/04\/07\/cybercrime_losses_reach_alltime_high\">cost American businesses and consumers nearly $155 million<\/a> last year.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Over the last couple of months, her team has investigated ransomware infections ranging from an attack against a US healthcare organization attributed to an Iranian-government-linked group, Pay2Key, to intrusions carried out by much less sophisticated, newer ransomware-as-a-service operations like Sicarii.<\/p>\n<p>Both ends of the ransomware spectrum can have disastrous, destructive impacts on business operations.<\/p>\n<h3 class=\"crosshead\">Iran-linked ransomware crew hits US healthcare<\/h3>\n<p>The <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.halcyon.ai\/ransomware-research-reports\/pay2key-iranian-linked-ransomware-is-back-back-again\">Pay2Key infection<\/a> happened in late February, around the start of the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/09\/kettle_2026_episode_01_iran_war\/\">US and Israel military strikes<\/a> against Iran. Halcyon&#8217;s investigation found that the Iran-backed crew had gained access to a compromised admin account for several days before the attack &#8211; and then deployed ransomware and encrypted the environment in just three hours.<\/p>\n<p>&#8220;They had to have been on the network before the attack, that access was already existing,&#8221; Kaiser said, adding that she can&#8217;t definitely link the ransomware infection to the war in the Middle East.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;What it says is that there are existing accesses that a government-linked group like Pay2Key can operationalize at any given time,&#8221; she said. &#8220;And when I look at that, I think of the Albania attacks of 2022.&#8221; The US government <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/09\/10\/us_sanctions_iran_mois\/\">issued sanctions<\/a> against Iran&#8217;s Ministry of Intelligence and Security and its Minister of Intelligence in response to these earlier cyberattacks that <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/07\/18\/albania_down\/\">shuttered Albania&#8217;s online public services<\/a> and websites.<\/p>\n<blockquote class=\"pullquote\" readability=\"7\">\n<p>There&#8217;s this really distinct ransomware threat that has some government connections, and it appears in this case it was much more aimed at destruction than just the ransom and financial gain<\/p>\n<\/blockquote>\n<p>&#8220;Iran was on those networks for 14 months, conducting espionage, collecting emails, and then they turned it over to an attack group to operationalize that access,&#8221; Kaiser said about the 2022 intrusion.&nbsp;<\/p>\n<p>In the more recent Pay2Key attack against the healthcare organization, Kaiser said that the ransomware variant the group used showed a massive upgrade from its <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/07\/09\/iranian_ransomware_crew_reemerges\/\">July 2025 intrusions<\/a>, with better anti-detection capabilities built in. Plus, there&#8217;s no evidence that any data was stolen during this attack, which is unusual for this particular crew and goes against the larger, more lucrative trend toward double-extortion ransomware infections.&nbsp;<\/p>\n<p>&#8220;It shows that there&#8217;s this really distinct ransomware threat that has some government connections, and it appears in this case it was much more aimed at destruction than just the ransom and financial gain,&#8221; Kaiser said.<\/p>\n<p>Meanwhile, sophisticated financially motivated criminals like Akira&#8217;s ransomware operatives are becoming even speedier in their attacks, moving from initial access to encryption in <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.halcyon.ai\/ransomware-research-reports\/akira-ransomware-attacks-in-under-an-hour\">less than one hour<\/a>. In most of their hundreds of compromises over the last 12 months, Akira spent less than four hours from initial access to full encryption, according to Halcyon&#8217;s investigations.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Plus, the ransomware operators&#8217; decryption tool uses a special &#8220;checkpoint&#8221; system to ensure large files can be recovered even if there&#8217;s an interruption in the encryption process, and this makes paying the ransom sound more appealing to victims.<\/p>\n<p>For defenders, this means &#8220;you don&#8217;t have the dwell time that you used to have,&#8221; Kaiser said. &#8220;Ransomware is so different today than it was two years ago among these really sophisticated threat-actor groups.&#8221;&nbsp;<\/p>\n<h3 class=\"crosshead\">And \u2026 the wannabes<\/h3>\n<p>And then there are ransomware operations like <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.halcyon.ai\/ransomware-alerts\/alert-sicarii-ransomware-encryption-key-handling-defect\">Sicarii<\/a>. This criminal group seemed to emerge in December, and it&#8217;s most notable for its flawed malware. The Sicarii encryptor generates a new cryptographic key pair during every execution &#8211; but then discards the private key, meaning there&#8217;s no recoverable master key and victims may or may not be able to decrypt their files.<\/p>\n<p>&#8220;You need three things to make ransomware successful. You need a lock, you need a key &#8211; that&#8217;s what the victims pay for &#8211; and you need to be able to put the key in the lock,&#8221; Kaiser said. &#8220;They forgot to make that keyhole, so it&#8217;s destruction-ware now.&#8221;<\/p>\n<p>Kaiser believes the &#8220;ransomware wannabes,&#8221; as she calls them, used AI &#8211; but it didn&#8217;t help them write better code or increase the sophistication of their attacks.<\/p>\n<p>&#8220;They&#8217;d obviously used AI at every stage, and then they ugly-chained it together &#8211; I don&#8217;t think they used an agent, it was just ugly coding at every stage,&#8221; Kaiser said, adding that this illustrates the risk of cybercriminals, and not just the ones who are good at their jobs, incorporating AI into their attack chains.<\/p>\n<p>&#8220;You&#8217;re seeing criminals, wannabes who, in their hands, AI is even scarier than sophisticated actors who are incorporating some type of this technology,&#8221; Kaiser said. &#8220;You have a bunch of wannabes, and if they can go from 0 percent to 5 percent or 10 percent effectiveness, that&#8217;s great for them. But for IT and security professionals inside organizations, the biggest threat is the increased volume of these terrible, just ugly attacks.&#8221;<\/p>\n<p>These attacks aren&#8217;t very stealthy, and they will likely set off all kinds of security alerts. &#8220;But if you have such a huge volume that, and you&#8217;re dealing with that, and especially if you don&#8217;t use automation on your network, then as you&#8217;re dealing with that, what other sophisticated threats are coming in?&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2026\/04\/08\/cynthia_kaiser_interview\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If they don&#8217;t know what they&#8217;re doing, you might never get your data back interview\u00a0 It&#8217;s the biggest threat today, but it took her a while to appreciate it. After spending two decades at the FBI and much of that time working to intercept and stop cyber threats from the likes of China and Russia, Halcyon Ransomware Research Center SVP Cynthia Kaiser says she was a &#8220;latercomer to really wanting to focus on ransomware.&#8221;\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-60452","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-08T21:09:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief\",\"datePublished\":\"2026-04-08T21:09:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/\",\"name\":\"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2026-04-08T21:09:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/","og_locale":"en_US","og_type":"article","og_title":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-04-08T21:09:51+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief","datePublished":"2026-04-08T21:09:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/","url":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/","name":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2026-04-08T21:09:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2adcUjU2vbTH53COcRSc-SQAAAEs&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/criminal-wannabes-even-more-dangerous-than-the-pros-says-ex-fbi-cyber-chief\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60452"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60452\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}