Do you know who Dark Basin are and what is the difference between Green, Blue, Black, White and Gray Hat hackers?
The original definition of a hacker says that a hacker is a computer enthusiast, whether it is programming or an interest in how it works (hardware). Today, we consider hackers to be people who try to access someone else’s computer without permission (with dishonorable intentions) or people who fight against them. However, there is a far wider range of motives that drive hackers.
Some hackers create various tools and applications for the security of users on the Internet, while others tirelessly search and report detected vulnerabilities and malware. Others, on the other hand, spend their time creating malware and figuring out how to steal money from people. So, a hacker may have malicious or tribal intentions, but even those with the best intentions can stray. Some hackers admit that they are driven by a sense of power they have over others, the fame and reputation of a notorious persona that often goes hand in hand with large-scale hacking attacks. Personal problems such as low self-esteem, impulsivity and anger attacks are factors that can push a hacker to the “dark side”.
Initially, most hackers were driven by curiosity and a need for learning and challenges. For the most part, there were no malicious intentions. However, advances in technology have opened up almost limitless opportunities to make money through illegal activities, and as a result, criminal hacker groups have emerged that operate in a similar way to legitimate companies.
Below is an overview of the basic types of hackers and the motives that drive them:
1. Beginner hackers (Script Kiddies and others)
Script Kiddies are hackers with a low level of knowledge of the subject. They usually use code written by someone else and prefer tools that are easy to use. They mostly dwell on techniques such as doxing and performing DDoS attacks.
Green Hat hackers are also beginners, but unlike the Skids, they have ambitions to expand their knowledge and skills. Curiosity motivates them to spend hours and hours learning, practicing and improving their skills.
Blue Hat hackers are vindictive skids hackers who aim to get revenge on their enemies.
2. Black Hat
These are hackers whose motives are of a financial nature. They often enjoy challenges and are competitive with each other. They engage in various hacking activities – exploiting vulnerabilities, breaking into computers, stealing identities, vandalizing systems, publishing secret government and / or business documents, spreading malware and ransomware, etc.
3. Ethical hackers (White Hat)
They use their skills to help individuals, companies and government agencies. Among other things, they fight malicious hackers, detect vulnerabilities that need patches, detect new malware, help protect computer networks, educate users about Internet security, and more.
4. Gray Hat hackers
They are not necessarily good or bad, nor are they motivated by earnings. For example, they sometimes hack a particular site and then send a message to the site owner explaining what the vulnerability made. Also, sometimes as part of hacktivism, they publicly announce how they carried out the attack.
There is a fine line between different types of hackers. For example, someone mostly deals with ethical hacking, but sometimes switches to the other side. Some make money from illegal activities, but at the same time they are involved in hacktivism. The famous hacker group ‘Anonymous’ includes all the above types of hackers.
These are hackers who advocate a certain issue, idea, goal. They are motivated by the need to correct what they think is wrong. For example, they carry out DDoS attacks on the sites of organizations accused of animal cruelty, terrorist sites, sites of dictatorial regimes, sites of countries with whose policies they do not agree, etc. They publicly publish the information they obtain, engage in doxing, report terrorist orders on social networks and raise awareness of the important problems of today. An important aspect of hacktivism over the years has been the struggle against legal solutions that restrict human freedoms. Sometimes online activities are coordinated with protests and rallies “on the ground”.
Sometimes hacktivism, despite good intentions, causes collateral damage whose guild is paid by the innocent. Also, the motives of hacktivists are not always noble (desire for positive change), but it is a matter of desire for fame or contempt and jealousy towards the target of the attack.
6. APT hackers (state sponsored hackers)
These are hackers hired by the state to carry out espionage, social engineering, computer intrusion and malware activities in order to gain confidential information and gain an advantage over another state.
7. Malicious insiders This can be a person employed by the company or a person working for a partner company. It is most often a dissatisfied worker, a person hired by a competitor to steal business secrets, or a fired worker who managed to steal confidential information before leaving the company.