Contact us today!

Network Solutions Unlimited Blog

Getting to Know Technology: Hackers

Getting to Know Technology: Hackers

It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Below, we explore what makes a hacker, and the kinds that exist in reality.

What Makes a Hacker?
A hacker is an individual or group that, using their programming skills, finds a way into systems by identifying and exploiting gaps in the security protocols protecting them. That said, should we always be afraid of them?

There are three overarching delineations that a hacker can fall into, as well as different subtypes that they could be classified into, based on their motives and modus operandi.

The Three Main Types
Black Hat
These are the hackers that most likely first pop into your mind. Using their skills to steal the information they want from their victims or to manipulate their victims into paying them, black hat hackers are the criminals that give the term “hacking” the reputation it has today. Their work is for their own personal gain, illegal, and usually results in the harm of others.

White Hat
On the side of the angels, you’ll find white hat hackers. These hackers use their skills to assist businesses and other entities in identifying weak points and vulnerabilities in their IT systems so that these weaknesses can be resolved. In fact, if we were to run a penetration test on your business, we would be acting as white hat hackers. A white hat hacker works for your benefit, and exclusively at your request - they do not hack into systems unless it is requested of them.

Gray Hat
As one might imagine based on their name, gray hat hackers are those hackers who are a little white hat and a little black hat. They aren’t quite black hat, because they aren’t personally profiting from the hack, but they aren’t quite white hat either, because they are hacking without the target’s consent or knowledge. Some grey hat hackers will inform an organization of their vulnerability, while others will enable others to leverage it by leaking it over the Internet.

Additional Subtypes
Script Kiddies
Script kiddies are very amateur hackers, in that they don’t care to learn how or why the codes they use work. Instead, they leverage the code that has been written by others to launch basic attacks, often to draw attention to themselves or to impress their peers.

Blue Hat
A blue hat hacker can be summed up as a script kiddie with an axe to grind. Rather than trying to impress others by launching basic cyberattacks, blue hat hackers are out for revenge against those who have angered them. Again, these hackers don’t want to learn how to actually hack, they simply want to strike back.

Green Hat
Another variation of script kiddie, green hat hackers are the field’s equivalent of a greenhorn - new and inexperienced, but ready to learn. Green hat hackers are those that grow and become better over time and are known to ask a lot of questions among hacking communities.

Red Hat
These hackers are effectively the vigilantes of the hacking world, striving toward a similar goal as a white hat hacker would but taking a much different approach. Rather than reporting an attack, a red hat hacker will go on the counteroffensive and give their black hat target a taste of their own medicine. Using cyberattacks and malware as their tools of choice, a red hat hacker aims to hamstring their target’s computing ability.

These hackers are those that are employed by a government body to obtain information that is valuable to the state. They have been known to attack entire nations, key individuals, and companies. Thanks to their government affiliation, they have considerable resources available to them.

Hacktivists and hacktivist groups use their hacking skills to spread their message, creating trouble for businesses, government bodies, and other entities that don’t share their beliefs. These online activists are committed to creating social change, whomever they have to hack to do it.

Whistleblower/Malicious Insider
These hackers are those that may not require any advanced hacking skills at all, instead relying on their position within the targeted company to steal trade secrets. Whether they are acting on the behalf of a rival company, or they have simply developed a grudge, these are employees who are seeking out the worst for your organization.

Changing Hats
Of course, hackers don’t always keep to one hat. There are a few examples of those who have moved from black hat to gray, one of which being Samy Kamkar. After hacking (and crashing) MySpace with the fastest-spreading worm to date at age 19 (in 2005), he was arrested and ultimately given a lifetime ban from the Internet. After three years of good behavior, his sentence was lifted, and Kamkar now works as a gray hat hacker, independently finding vulnerabilities and reporting them.

On the other hand (and providing an example of how convoluted these issues can get), Marcus “MalwareTech” Hutchins was praised in May of 2017 for effectively stopping the WannaCry attack but was later arrested in August of 2017 for allegedly writing and distributing the banking Trojan known as Kronos. While Hutchins was clearly working as a white hat hacker during his work on WannaCry, it is entirely possible he was acting as a gray hat hacker to create Kronos for someone else to use.

There are more examples as well: Professor Robert Morris of MIT became the first person ever convicted under the Computer Fraud and Abuse Act after creating the first computer worm during his graduate studies at Cornell. Mustafa Al-Bassam is now a security adviser, but was once part of the LulzSec group that hacked Sony and the CIA.

In short, there are many different kinds of hacker, and the lines between them can be pretty easily blurred. What other technology topics would you like to know more about? Let us know in the comments!

Help! My Staff Hates My Company’s IT!
Why Should Your Vendors Decide What’s Right for Yo...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Employer Employee Relationship Recovery Mobile Devices Phone System Utility Computing Wi-Fi VPN Spam BYOD Facebook Company Culture IT Solutions Legislation Tech Support Operating System Content Network Security NFL Proactive Streaming Media Keyboard Shortcuts Wireless Technology Managed IT Services Cybersecurity Monitoring Storage Shadow IT Augmented Reality PowerPoint Fraud Humor History Virtual Reality Managing Stress Alert Save Time Alexa for Business Google Drive Gifts Training Outsourced IT Twitter Big Data The Internet of Things Saving Time Google Value Wasting Money Software as a Service Mobile Device Management Ciminal Computer Care Innovation Hosted Solutions Data Theft Cortana Administration Blockchain Camera Two Factor Authentication Hard Drive IT Support IT Services Productivity Automation Emails Licensing Data Protection Managed IT Access Control Business Intelligence Financial Technology MSP Wasting Time CrashOverride Networking Remote Monitoring Identity Theft Video Games USB Cache Nanotechnology WPA3 Evernote Data Computing Infrastructure Government Telephone Hackers Settings Cast Telephone Systems PDF Computing HBO Solid State Drive Display Router Thank You Business Continuity Transportation Laptop Productivity Chrome Webinar Physical Security Screen Mirroring Microsoft Excel Charger IT Management Law Enforcement Content Filter Computer Accessories Quick Tips Vendor iOS Search Backup Connectivity Employer-Employee Relationship Upgrades Marketing Unified Communications Best Practice Avoiding Downtime Privacy HaaS Gadgets Public Cloud Hiring/Firing Memory Data Backup Personal Information Mobility Customer Analysis Office Tips Business Computing Internet Meetings Entertainment Update File Storage Bandwidth Smart Tech Politics Financial Black Market Windows 10 Vulnerability Bring Your Own Device Projects Amazon Windows 7 Virtual Assistant Comparison Identity Hybrid Cloud Excel Rootkit Office 365 Printing WiFi Virus Malware How To Peripheral Edge Email Work/Life Balance Browser Data Loss Education Spam Blocking Windows Ink Office Downtime Saving Money Device Security Going Green Workplace Tips Artificial Intelligence Battery Conferencing Unsupported Software Sports Assessment Computer Managed Service Provider Efficiency Ransomware Apps Maintenance Automobile Disaster Recovery Smart Technology eWaste Remote Workers Bluetooth How to Redundancy Electronic Medical Records Virtualization Mobile Security Data Management File Sharing Server Smartphone Scam Monitors Television Workers Data Security Hyperlink Apple Business Owner Regulation Printers Accessory User Tips Proactive IT Managed Service Windows Public Computer Relocation Upgrade Co-Managed Services Files Windows 10 Technology Audit Books Two-factor Authentication Unified Threat Management Money Tip of the Week Business Application Collaboration Identities User Error Credit Cards Employee-Employer Relationship Chromecast IoT Content Filtering Cost Management Internet Exlporer Small Business IT Support Gmail Sales Scalability Emergency App store Managed IT Services Holiday WIndows Server 2008 Miscellaneous Security hacker Websites OneNote BDR Google Maps Document Management Save Money Cloud Computing Congratulations WannaCry Best Practices Touchscreen Communications Mobile Techology Keyboard Worker Commute Hardware Internet exploMicrosoft Social Media Payroll Health Computers Wireless Charging Data Storage Consultant Private Cloud Instant Messaging IT Service Microsoft Word Admin Applications Testing Updates Sync Android Computer Forensics Microsoft Word Gamification Remote Computing Software Monitor Social Engineering Management Communication Internet of Things VoIP Mobile Device HIPAA Colocation Data storage Budget Dark Web Commerce Firewall Samsung Information Antivirus Specifications Wireless Internet Network Legal Root Cause Analysis Loyalty Robot Advertising Computer Fan Outlook Google Assistant Lifestyle Safety Language Users Microsoft Office Project Management Hard Disk Drive Hacking Shortcut Cybercrime Encryption Travel Reputation Retail Cleaning App Data Recovery Experience Adobe Information Technology iPhone Flexibility Passwords IT solutions Smartphones Risk Management Benefits SaaS Compliance Google Docs Worker FAQ Cloud Phishing Students Professional Services Tech Term Managed IT Service Troubleshooting Business Management Data Breach Chromebook Vendor Management Data Privacy Wireless Hard Drives Tablets Human Resources Spyware Business Technology IT budget Hosted Solution intranet Audiobook SMB Password Touchpad Windows 10s End of Support Devices Patch Management