{"id":12548,"date":"2025-09-24T09:20:50","date_gmt":"2025-09-24T08:20:50","guid":{"rendered":"https:\/\/mspglobal.com\/blog\/?p=12548"},"modified":"2025-10-01T12:01:29","modified_gmt":"2025-10-01T11:01:29","slug":"inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle","status":"publish","type":"post","link":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/","title":{"rendered":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle"},"content":{"rendered":"\n<p>Jesse Tuttle \u2013 better known in hacking circles as Hackah Jak \u2013 has lived on both sides of the digital battlefield. Once one of the world\u2019s most\u2011wanted hackers, he\u2019s now an ethical threat actor, using the same persistence, adaptability and ingenuity that once fueled high\u2011profile breaches to help organizations bolster their defenses.<\/p>\n\n\n\n<p>At MSP GLOBAL 2025, Jesse will lift the lid on the real psychology of attackers \u2013 from hacktivists chasing a cause, to profit\u2011driven scammers and nation\u2011state operatives playing the long game. His mission: to show MSPs how understanding an adversary\u2019s mindset can be the difference between a near\u2011miss and a catastrophic breach.<\/p>\n\n\n\n<p>Ahead of his session, we sat down with Jesse to talk about his journey from curious teenager, to hacktivist, to combatting cyber terrorism as an intelligence asset. Now he shares the operational blind spots that leave MSPs exposed, and how to turn \u201cthinking like a hacker\u201d into a practical, proactive defense strategy.<\/p>\n\n\n\n<p><em>Disclaimer: Any opinions expressed below are those of the subject and are not necessarily shared by MSP GLOBAL.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What MSPs are missing about cybercriminals\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/E2acoTPi1VU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"youve-just-come-back-from-gtia-and-defcon-tell-us-the-headlines\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">You\u2019ve just come back from GTIA and DEFCON. Tell us the headlines.<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>I think the one thing I took away is: you don&#8217;t know what you don&#8217;t know. We took several MSP owners to DEFCON with us, and we\u2019ve consistently seen the shock and awe in MSP owners because they thought things were different than what they really are.<\/p>\n\n\n\n<p>They did not understand some of the tools out there. They thought every cybercriminal or threat actor is the same. They didn&#8217;t understand the evolution of tactics, tools and motivations because they typically see a narrative from the news, and most vendors are catering to solutions based on what is popular in the news, not necessarily what&#8217;s truly happening out there.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"what-first-drew-you-into-hacking\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">Let\u2019s go back to the beginning. What first drew you into hacking? How did your motivations evolve from curiosity to more serious exploits?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>I was a teenage kid in the mid 1990s. The internet was on the horizon. I was on dial-up BBS and then IRC\u2014internet relay chat\u2014and on AOL in 1994 right as all these other tools were starting to emerge.<\/p>\n\n\n\n<p>I could go to my local computer store and buy software, or I could just download it and not need to use the registration key. And suddenly that curiosity hits me: why is that? How did someone remove the registration key function?<\/p>\n\n\n\n<p>I started hanging out with software crackers and that curiosity grew. Then I wanted to help distribute software, so I became a distro. For this you need a top site, which is a super-fast site that you can host software on and move it. Government, military systems and universities had some of the best connections. So I started hacking and using them to seed pirated software to build a reputation.<\/p>\n\n\n\n<p>The curiosity evolved even further. I became a website defacer for what would be considered an early APT (advanced persistent threat) group, HackWeiser, and that led into a vigilante streak and becoming a hacktivist.<\/p>\n\n\n\n<p>Then in the spring of 2001 the US was involved in a global incident that I watched unfold on the news. This is when I made the shift to use my skills and talents for good. I want to be a good guy, but I was going about it in all the wrong ways, resulting in billions of dollars of damage globally<\/p>\n\n\n\n<p>During this initial cyberwar, I had a knock on the door from the FBI, and that was the start of a major pivoting point. I still was involved in HackWeiser, but I lived a dual life as an intelligence asset, working with a division of the FBI, helping them fortify government and military systems while keeping my reputation. Then 9\/11 unfolded and I found myself immersed into a national security incident, hunting the al Qaeda Cyber Army, and a second cyberwar.<\/p>\n\n\n\n<p>And that was where that vigilante-hacktivism side of me was used. Law enforcement gave me the opportunity to take what I wanted to do, how I wanted to do it, and use it for the better, for society and mankind.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"what-are-the-common-psychological-traits-of-threat-actors\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">What are the common psychological traits of threat actors, regardless of whether they&#8217;re a hacktivist or a cybercriminal or a state-sponsored operative?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>The first one is persistence, no matter the threat actor. But there are some distinctions.<\/p>\n\n\n\n<p>Hackers tend to not be financially motivated. They could be driven by curiosity or attention seeking, perhaps by defacing websites. They could be a hacktivist who&#8217;s driven by a cause.<\/p>\n\n\n\n<p>A scammer is someone that&#8217;s financially driven and motivated, they may use hacker tools but their lack of morals and drive for financial gain is what fuels them.<\/p>\n\n\n\n<p>Spammers are not typically intending to cause harm, but they&#8217;re delivering unsolicited mass messages and unintentionally cause problems.<\/p>\n\n\n\n<p>Hacktivists are mission-driven, and a nation-state actor is driven by typically government- or military-based objectives.<\/p>\n\n\n\n<p>All these different types of threat actors are extremely persistent. You don&#8217;t get a cause and a passion to do something and then just drop it overnight.<\/p>\n\n\n\n<p>Every criminal cybercriminal is also highly adaptive. They can shift their methods. They look for upcoming technologies. They will use something as long as it works, and as soon as it stops working, they shift.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"what-do-you-think-MSPs-specifically-can-learn-from-those-different-kinds-of-mindsets\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">What do you think MSPs specifically can learn from those different kinds of mindsets?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>Understand each type of threat actor and how they&#8217;re motivated. Hacktivists often believe they&#8217;re acting for the better of society. Whether to expose corruption, find censorship or promote a cause, they aim for visibility and impact more than stealth.<\/p>\n\n\n\n<p>Sometimes these are the people that are defacing large websites, and unfortunately sometimes the people that are taking over hospitals or government agencies and holding them ransom. Not necessarily a financial ransom, but to make a statement. They get the media attention \u2013 the more attention they get, the more it fuels them.<\/p>\n\n\n\n<p>With scammers, they are 100% profit driven. They seek quick, repeatable wins with minimal risk. They use proven tactics. They rely typically on social engineering. They do ransom hacks, they blackmail, they extort, and typically they&#8217;re the least technical. They act as a business. They will have a sales team, a leads team, and a recon team.<\/p>\n\n\n\n<p>If you&#8217;re working in government agencies, military subcontractors or critical infrastructure, you&#8217;re probably going to see nation-state actors more, but most businesses are going to see \u201cspray and pray\u201d campaigns from scammers and spammers.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"when-a-hacker-or-threat-actor-is-profiling-a-target,-what-are-the-vulnerabilities-that-they-look-for\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">When a hacker or threat actor is profiling a target, what are the vulnerabilities that they look for?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>Here is a magic question that everyone always misses!<\/p>\n\n\n\n<p>At DefCon, I was walking past one of the villages and there was a sponsor\u2014who didn\u2019t know who I was\u2014and he said, \u201cImagine you&#8217;re a threat actor and you breach, what&#8217;s the first thing you&#8217;re going to do?\u201d I say, \u201cWell it depends on my target. But for most threat actors, which spray and pray, they\u2019ll observe and understand the landscape, establish persistence, and start to exfiltrate\u201d. And he goes, \u201cWrong! You would sit back and watch for weeks or months to understand how to blend in before establishing any persistence or anything else\u201d.<\/p>\n\n\n\n<p>It showed that vendors\u2014even those trying to tap into hacker culture\u2014don&#8217;t always get it. This guy missed the mark because most threat actors are what I would call spray and pray. Most of them are sending out mass campaigns and emails, text messages, voice calls or doing SEO poisoning or abusive browser notifications. It&#8217;s huge.<\/p>\n\n\n\n<p>As soon as something sticks, they&#8217;ll take what they can get. Then they move to the next phase of establishing a persistent presence and exfiltrating data so that they have it as ransom, or whatever the case may be.<\/p>\n\n\n\n<p>When they understand how it works and they learn it, they become more capable. And that is where you start seeing more sophisticated attacks.<\/p>\n\n\n\n<p>What most MSPs are missing is understanding the human side, the low-tech side, the manipulation, the phone call, the deep-fakes, emails, text messages, voice calls. Most threat actors think, \u201cHey, what tools are at my disposal?\u201d<\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What MSPs are getting wrong with cybersecurity training\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/5m9Z4DiMHII?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"how-can-msps-translate-these-insights-about-threat-actor-and-attacker-psychology\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">How can MSPs translate these insights about threat actor and attacker psychology into more impactful training and client awareness programs?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>MSPs are the gateway to technology for the entire world. They need to be able to deliver training that&#8217;s not just compliance-based awareness training, security awareness training or threat actor training.<\/p>\n\n\n\n<p>In my opinion, awareness training means something different to what most providers call it. Because most providers are taking a template based on, say, a 2012 Netflix scam campaign, and rinsing and repeating, making this as obvious as possible so people don&#8217;t click on it, because failure is scary.<\/p>\n\n\n\n<p>But failure is how you move forward. Delivering a phishing simulation once a year or once a month is crazy because the threat actors are delivering to your users every hour of every day. Stop penalizing users when they click on extremely real emails that are simulations. Because without that learning opportunity, the company is set up to have a breach. Awareness training is supposed to teach you the threats out there, basic standard security steps, how threat actors think.<\/p>\n\n\n\n<p>MSPs need to understand the different types of awareness training out there, the different methodologies, and what works best for your clients. I think having a positive atmosphere where we can celebrate the learning opportunities and have a high fail rate so that people create muscle memory is better. These teach you to think like the adversary.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"what-are-the-top-operational-blind-spots-at-msps\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">What are the top operational blind spots at MSPs, corporates and companies that make them or their customers easy targets?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>Most threat actors enter through endpoint devices\u2014cell phones, tablets, laptops. And a lot of the time it&#8217;s a phone call. It&#8217;s a text message. It&#8217;s an email. It&#8217;s a social media message.<\/p>\n\n\n\n<p>That endpoint device is no longer tied to an office. Everyone has their workstation walking with them. Most people now are remote or hybrid. People need to understand that their device that they&#8217;re carrying with them is the gateway to everything.<\/p>\n\n\n\n<p>You need endpoint security, and you need awareness training. Without both, you are a sitting duck.<\/p>\n\n\n\n<p>Should people be delivering malware and other attacks to steal data or hold it for ransom? No, not at all! But will they? Yes. And we need to acknowledge that, and plan for it. Awareness training and proper endpoint security are both mission critical.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-base-color has-text-color has-link-color wp-elements-c7cdb1aafcbeb3b79b7e8fdbc729ee25 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-radius:8px;padding-top:0px;padding-bottom:0px;flex-basis:66px\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png\" alt=\"MSPGlobal\" class=\"wp-image-12195\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1.png 512w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fav_mspg-1-150x150.png 150w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-medium-font-size wp-container-content-164459c7 cfs-article-inner-heading\" id=\"how-does-everything-youve-experienced-and-learned-shape-the-way-you-guide-people-today\" style=\"margin-top:0px;margin-left:0px;font-style:normal;font-weight:600;line-height:1.3\">How does everything you\u2019ve experienced and learned shape the way you guide people today?<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-780494b0 wp-block-columns-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--large)\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66px\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png\" alt=\"\" class=\"wp-image-12550\" style=\"width:50px\" srcset=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1.png 1000w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-150x150.png 150w, https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Tuttle-Jesse_2025-03-01-BW-1920x1920x300ppi-1-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p>When my daughter was growing up, I had people being extorted for money coming to me saying, \u201cHey, I looked you up because you&#8217;re Hackah Jak. Can we meet?\u201d The questions were always the same, \u201cWhat do I do? How do I navigate this? How do I explain this to my significant other? How do I keep this from happening to my staff? How do I keep this from happening to my friends and family?\u201d To this day, we get those questions every week.<\/p>\n\n\n\n<p>And we get to help in all that. As a former threat actor, my drive was always curiosity. It was never financially driven. It was not about destroying lives. I saw lives being destroyed when I was taking down a human trafficking network as part of my work with the FBI. I&#8217;ve always been passionate about that personal connection and keeping people positive and healthy. That&#8217;s the most important thing out there.<\/p>\n\n\n\n<p>And it&#8217;s exactly what MSPs want to do. They want to create a healthy atmosphere for their clients to grow. But you also must understand that there&#8217;s bad guys out there. They don&#8217;t care about anything. That&#8217;s why you have to have that adversarial mindset. You need to have the right tools to combat it and the right training to understand it. You need to engage the right people to help.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><em><em>Drawing on decades of first\u2011hand experience, Jesse will share how tactics evolve, why most attacks start with low\u2011tech human manipulation, and what defenders can do to anticipate the next move. Join him at The Expert Stage at MSP GLOBAL 2025 on Wednesday October 22, 4:20pm-5:20pm.<\/em><\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/mspglobal.com\/blog\/category\/msp-global\/#newsletter\"><em>Sign up for MSP GLOBAL newsletter<\/em><\/a><em> for your free registration code, saving \u20ac399.<\/em><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jesse Tuttle \u2013 better known in hacking circles as Hackah Jak \u2013 has lived on both sides of the digital battlefield. Once one of the world\u2019s most\u2011wanted hackers, he\u2019s now an ethical threat actor, using the same persistence, adaptability and ingenuity that once fueled high\u2011profile breaches to help organizations bolster their defenses. At MSP GLOBAL [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":12555,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"mark_post_sync":false,"footnotes":""},"categories":[1514],"tags":[],"class_list":["post-12548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interviews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle<\/title>\n<meta name=\"description\" content=\"Go inside the mind of former hacker Jesse Tuttle and discover attacker psychology and lessons MSPs can use to strengthen cyber defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle\" \/>\n<meta property=\"og:description\" content=\"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/\" \/>\n<meta property=\"og:site_name\" content=\"MSP GLOBAL BLOG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100089083200946\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T08:20:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T11:01:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Francesca Cotton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:site\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesca Cotton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/\"},\"author\":{\"name\":\"Francesca Cotton\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/93fec8f66d570471e04e31ae8b5c3b96\"},\"headline\":\"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle\",\"datePublished\":\"2025-09-24T08:20:50+00:00\",\"dateModified\":\"2025-10-01T11:01:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/\"},\"wordCount\":2105,\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Jesse-Tuttle-Background-Right_001.png\",\"articleSection\":[\"Interviews\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/\",\"name\":\"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Jesse-Tuttle-Background-Right_001.png\",\"datePublished\":\"2025-09-24T08:20:50+00:00\",\"dateModified\":\"2025-10-01T11:01:29+00:00\",\"description\":\"Go inside the mind of former hacker Jesse Tuttle and discover attacker psychology and lessons MSPs can use to strengthen cyber defense.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Jesse-Tuttle-Background-Right_001.png\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Jesse-Tuttle-Background-Right_001.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interviews\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/category\\\/interviews\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"name\":\"MSP INSIGHTS - The MSP GLOBAL Blog\",\"description\":\"The latest news for MSPs and Tech Experts.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\",\"name\":\"MSP GLOBAL\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"width\":536,\"height\":63,\"caption\":\"MSP GLOBAL\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=100089083200946\",\"https:\\\/\\\/x.com\\\/MSPglobalevent\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mspglobalevent\\\/\",\"https:\\\/\\\/www.instagram.com\\\/mspglobalevent\\\/\"],\"ownershipFundingInfo\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/93fec8f66d570471e04e31ae8b5c3b96\",\"name\":\"Francesca Cotton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/cropped-fran-cotton-scaled-2-96x96.jpg\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/cropped-fran-cotton-scaled-2-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/cropped-fran-cotton-scaled-2-96x96.jpg\",\"caption\":\"Francesca Cotton\"},\"description\":\"Francesca is an experienced copywriter, copy editor and journalist with a background in B2B content across the finance, food and technology sectors, as well as in luxury ecommerce and consumer publishing. As part of the Cloudfest and MSP Global writing team, Francesca uses her journalism background to get to the heart of industry trends and stories to deliver insightful and compelling content and commentaries.\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/author\\\/francesca-cotton\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle","description":"Go inside the mind of former hacker Jesse Tuttle and discover attacker psychology and lessons MSPs can use to strengthen cyber defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/","og_locale":"en_US","og_type":"article","og_title":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle","og_description":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle","og_url":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/","og_site_name":"MSP GLOBAL BLOG","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100089083200946","article_published_time":"2025-09-24T08:20:50+00:00","article_modified_time":"2025-10-01T11:01:29+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png","type":"image\/png"}],"author":"Francesca Cotton","twitter_card":"summary_large_image","twitter_creator":"@MSPglobalevent","twitter_site":"@MSPglobalevent","twitter_misc":{"Written by":"Francesca Cotton","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#article","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/"},"author":{"name":"Francesca Cotton","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/93fec8f66d570471e04e31ae8b5c3b96"},"headline":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle","datePublished":"2025-09-24T08:20:50+00:00","dateModified":"2025-10-01T11:01:29+00:00","mainEntityOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/"},"wordCount":2105,"publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png","articleSection":["Interviews"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/","url":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/","name":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#primaryimage"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png","datePublished":"2025-09-24T08:20:50+00:00","dateModified":"2025-10-01T11:01:29+00:00","description":"Go inside the mind of former hacker Jesse Tuttle and discover attacker psychology and lessons MSPs can use to strengthen cyber defense.","breadcrumb":{"@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#primaryimage","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Jesse-Tuttle-Background-Right_001.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mspglobal.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Interviews","item":"https:\/\/mspglobal.com\/blog\/category\/interviews\/"},{"@type":"ListItem","position":3,"name":"Inside the mind of a hacker: understanding cybercriminal psychology, with Jesse Tuttle"}]},{"@type":"WebSite","@id":"https:\/\/mspglobal.com\/blog\/#website","url":"https:\/\/mspglobal.com\/blog\/","name":"MSP INSIGHTS - The MSP GLOBAL Blog","description":"The latest news for MSPs and Tech Experts.","publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mspglobal.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mspglobal.com\/blog\/#organization","name":"MSP GLOBAL","url":"https:\/\/mspglobal.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","width":536,"height":63,"caption":"MSP GLOBAL"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100089083200946","https:\/\/x.com\/MSPglobalevent","https:\/\/www.linkedin.com\/company\/mspglobalevent\/","https:\/\/www.instagram.com\/mspglobalevent\/"],"ownershipFundingInfo":"https:\/\/mspglobal.com\/blog\/imprint\/","actionableFeedbackPolicy":"https:\/\/mspglobal.com\/blog\/imprint\/"},{"@type":"Person","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/93fec8f66d570471e04e31ae8b5c3b96","name":"Francesca Cotton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fran-cotton-scaled-2-96x96.jpg","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fran-cotton-scaled-2-96x96.jpg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/cropped-fran-cotton-scaled-2-96x96.jpg","caption":"Francesca Cotton"},"description":"Francesca is an experienced copywriter, copy editor and journalist with a background in B2B content across the finance, food and technology sectors, as well as in luxury ecommerce and consumer publishing. As part of the Cloudfest and MSP Global writing team, Francesca uses her journalism background to get to the heart of industry trends and stories to deliver insightful and compelling content and commentaries.","url":"https:\/\/mspglobal.com\/blog\/author\/francesca-cotton\/"}]}},"_links":{"self":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/12548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/comments?post=12548"}],"version-history":[{"count":5,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/12548\/revisions"}],"predecessor-version":[{"id":12554,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/12548\/revisions\/12554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media\/12555"}],"wp:attachment":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media?parent=12548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/categories?post=12548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/tags?post=12548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}