Script Kiddie

3rd January 2020 | Cybrary Script Kiddie


scrpit kiddie cybrary term

A Script Kiddie, also known as a skiddie, or skid; is an unskilled individual who uses scripts or programs developed by other individuals to attack computer systems and networks as well as deface websites. These users generally are juveniles who lack the skills to write their own programs or exploits and use these scripts to impress people or to gain credit in the cyber security communities.

Related Terms: Organized Crime, Nation States, Hacktivists, Insiders

Additional ReadingThe origin of Script Kiddies.

Source: “Script Kiddies: The Net’s Cybergangs”

What does this mean for an SMB?

SMB owners should worry about script kiddies but not nearly as much as Organized Crime.  Script Kiddies are out to hack for street credit and notoriety and commonly attempt website defacements, denial of service attacks, or other less harmful attacks than organized crime or nation states.  That is not to suggest you let your guard down.  All the critical protections you need to implement to protect against other hacker groups will help protect you from the average script kiddie.  This information is helpful when seeking to identify attribution for incidents in your business.

To protect yourself from Script Kiddies, but also Organized Crime, Nation States, and Hacktivists, please read and follow the suggestions in CyberHoot’s Top 10 SMB Protections blog article.

For more info, watch (actually listen) this 2 min. video on Script Kiddies.

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more