Types of hackers

Black Hat: Criminal Hackers

A black hat hacker is a cybercriminal who breaks into computer systems with malicious or criminal intent.

Their advanced technical knowledge and ability to navigate the cybersecurity landscape is what makes them so skilled in carrying out their attacks. They go out of their way to find vulnerabilities in computer systems and software, which they exploit for financial gain or other malicious purposes.

click to edit

White Hat: Authorized Hackers

The key difference between them, however, is that white hat hackers are authorized to hack these systems for the purpose of spotting security vulnerabilities before a criminal hacker can.

Typically hired by governments or large businesses, white hat hackers identify and fix loopholes or weaknesses found in organizational security systems to help prevent an external attack or data breach.

Similar to black hat hackers, white hat hackers are cybersecurity experts who use their skills to find vulnerabilities in organizational networks and computer systems.

Grey Hat: “Just for Fun” Hackers

Script Kiddies: Ametuer Hackers

A grey hat hacker is a cybersecurity expert who finds ways to hack into computer networks and systems, but without the malicious intent of a black hat hacker.

A grey hat hacker is a cybersecurity expert who finds ways to hack into computer networks and systems, but without the malicious intent of a black hat hacker.

click to edit

Typically, they engage in hacking activities for the pure enjoyment of finding gaps in computer systems, and they might even let the owner know if any weak points are found. However, they don’t always take the most ethical route when employing their hacking activities—they may penetrate systems or networks without the owner’s permission (even though they aren’t trying to cause any harm).

Motives: Personal enjoyment

Who’s most at risk? Anyone who doesn’t want unauthorized access to their systems and networks

Green Hat: Hackers-in-Training

click to edit

Who’s most at risk? Anyone who doesn’t want unauthorized access to their systems and networks

Motives: Personal enjoyment

Typically, they engage in hacking activities for the pure enjoyment of finding gaps in computer systems, and they might even let the owner know if any weak points are found. However, they don’t always take the most ethical route when employing their hacking activities—they may penetrate systems or networks without the owner’s permission (even though they aren’t trying to cause any harm).

  1. Red Hat: Government-Hired Hackers

Red hat hackers are hired by government agencies to spot vulnerabilities in security systems, with a specific focus on finding and disarming black hat hackers. They’re known to be particularly ruthless in their hunt for black hat criminals, and typically use any means possible to take them down. This often looks like using the same tactics as black hat hackers and using them against them—using the same malware, viruses and other strategies to compromise their machines from the inside out.

State/Nation Sponsored Hackers: International Threat Prevention

State/nation sponsored hackers are appointed by a country’s government to gain access to another nation’s computer systems. Their cybersecurity skills are used to retrieve confidential information from other countries in preparation for a potential upcoming threat or attack, as well as to keep a pulse on sensitive situations that could pose a threat in the future. These types of hackers are hired solely by government agencies.

Malicious Insider: Whistleblower Hackers

click to edit

Malicious insider hackers are individuals who employ a cyberattack from within the organization they work for. Also known as whistleblowers, their motivation for attack can vary from acting on a personal grudge they have against someone they work for to finding and exposing illegal activity within the organization.

Motives: To expose or exploit an organization’s confidential information

Who’s most at risk? Internal executives and business leaders

click to edit

A green hat hacker is someone who is new to the hacking world but is intently focused on increasing their cyberattack skills. They primarily focus on gaining knowledge on how to perform cyberattacks on the same level as their black hat counterparts. Their main intent is to eventually evolve into a full-fledged hacker, so they spend their time looking for learning opportunities from more experienced hackers.

Motives: To learn how to become an experienced hacker


Who’s most at risk? No one (yet)

Hacktivists: Politically Motivated Hackers

click to edit

A hacktivist is someone who hacks into government networks and systems to draw attention to a political or social cause—hence why the name “hacktivist” is a play on the word “activist.” They use hacking as a form of protest, retrieving sensitive government information, which is used for political or social purposes.

Motives: To shed light on an alarming social or political cause (or to make a political or ideological statement)

Who’s most at risk? Government agencies

Elite Hackers: The Most Advanced Hackers

click to edit

Elite hackers are the cream of the crop in the world of cybercriminals, and are considered to be the highest skilled hackers in their field. They’re often the first ones to discover cutting-edge attack methods, and are known to be the experts and innovators in the hacking world.

Motives: To perform advanced cyberattacks on organizations and individuals

Who’s most at risk? High-revenue corporations

Cryptojackers: Cryptocurrency Mining Hackers

Cryptojackers are known to exploit network vulnerabilities and steal computer resources as a way to mine for cryptocurrencies. They spread malware in a variety of ways, often by planting infectious viruses across the web. These viruses and ransomware-like tactics are used to plant malicious code on victims’ systems, which work quietly in the background without the victims’ knowledge. Once the code is planted, it sends the results back to the hacker.

click to edit

Cryptojackers are tough to spot, since the malicious code can go undetected for a long time. Since their motive isn’t to steal victims’ data, but rather to use their system as a vehicle for cryptocurrency mining, it’s difficult to trace the source of the infection once it’s discovered.

Motives: Cryptocurrency mining

Who’s most at risk? Any individual or organization with unsecured networks

Motives: To monitor and prevent international threats

Who’s most at risk? International hackers and criminals

  1. Blue Hat: Authorized Software Hackers

click to edit

Blue hat hackers are hired by organizations to bug-test a new software or system network before it’s released. Their role is to find loopholes or security vulnerabilities in the new software and remedy them before it launches.

Motives: To identify vulnerabilities in new organizational software before it’s released

Who’s most at risk? Criminal hackers

Who’s most at risk? Black hat hackers

Motives: To find and destroy black hat hackers