Get powerful hacking protection

Install Norton 360 Deluxe to help protect your communications and personal information against hackers and other online threats.

Get powerful hacking protection

Install Norton 360 Deluxe to help protect against hackers and other online threats.

Get powerful hacking protection

Install Norton 360 Deluxe to help protect against hackers and other online threats.

15 types of hackers to watch out for

All hackers use some form of cyber-subterfuge to access devices and networks, but their motivations vary greatly. In this guide, you’ll learn about the types of hackers to be aware of, their motivations and goals, and how to protect yourself. Then install a trusted security tool like Norton 360 Deluxe to help keep your devices safer against intruders.

An image of cybersecurity specialists enhancing protections against different types of hackers.

Hackers have had years to perfect their methods, exploiting vulnerabilities in software and stealing any sensitive information they can get their hands on. But, we’ve had just as much time to adapt and learn how to protect ourselves, too.

Throughout this guide, we’ll discuss the types of hackers you should be aware of, dive into their motivations and goals, and share hacking protection tips that can help keep your devices, privacy, and identity safer.

So, without further ado, these are the types of hackers you must know about:

3 main types of hackers

The three most well-known hacker types are black hat hackers, who maliciously exploit security vulnerabilities for personal gain or to cause harm; white hat hackers, who ethically identify security vulnerabilities after obtaining permission; and gray hat hackers, who operate in a moral gray area between black and white hat hackers and generally seek compensation for exposing vulnerabilities.

Here’s a short breakdown of the three main hacker types:

1. Black hat hackers: Malicious criminals

Black hat hackers are your stereotypical cybercriminals. They work seemingly nonstop to hack into personal devices and networks in search of sensitive data they can steal and use to make a profit. Black hats are experts in launching malware, such as ransomware and spyware attacks — anything to get their hands on the information they’re after.

A graphic explaining what a black hat hacker’s motivation is, illustrating why they’re one of the types of hackers to look out for.
A graphic explaining what a black hat hacker’s motivation is, illustrating why they’re one of the types of hackers to look out for.
A graphic explaining what a black hat hacker’s motivation is, illustrating why they’re one of the types of hackers to look out for.

Recently, a black hat hacker known as Dark X stole the personal data of 350 million Hot Topic customers. The motivation seemed to be financial gain, as the data — which allegedly included partial credit card numbers, email addresses, phone numbers, and more — was up for sale on the dark web soon after the hack.

2. White hat hackers: Authorized security professionals

White hat hackers have the same skills as black hat hackers, but a different motivation: to break into systems (with permission) to find security flaws. They generally do this to help governments and businesses identify vulnerabilities in internal systems to avoid cyberattacks. Often, white hat hackers are employed by the very institutions they aim to help.

A graphic explains what a white hat hacker’s motivation is and why they’re one of the types of hackers to look out for.
A graphic explains what a white hat hacker’s motivation is and why they’re one of the types of hackers to look out for.
A graphic explains what a white hat hacker’s motivation is and why they’re one of the types of hackers to look out for.

For example, a business may be experiencing frustrating network issues, such as system crashes or reduced speed. Instead of upgrading the entire network, companies may hire a white hat hacker to spot any potential security flaws that could be allowing hackers to cause these issues.

3. Gray hat hackers: Hobby hackers

Gray hat hackers make a hobby of finding gaps in security networks and usually let the network admins know if they found a vulnerability. Sometimes, gray hats ask for payment for their work — a controversial practice that blurs the line between ethical and malicious hacking.

Though the gray hats’ motivation for hacking is often neutral (or even positive), this type of hacker can frustrate institutions because they haven’t given the hackers explicit permission to go hunting for security flaws.

In fact, a recent gray hat hacking incident saw one of Germany’s main political parties hacked. No information was leaked, and no damage was caused — it was a classic gray hat breach — but the party pressed charges against the hacker anyway. This blurring of legal and ethical boundaries is precisely why such hackers are known as gray hats.

Other types of hackers

There are many other types of hackers beyond the most well-known ones, ranging from beginners to software developers, cryptocurrency miners, cyberterrorists, and beyond. Some hackers seek financial gain, while others may be motivated by political ideology or the thrill of the challenge. Still others have altruistic intentions, aiming to expose system vulnerabilities to improve security.

Here are some of the other types of hackers out there today:

4. Red hat hackers: Ethical hackers

Red hat hackers are similar to white hat hackers, but instead of being hired by businesses or governments to find and fix vulnerabilities, they take a vigilante approach to directly stop black hats in their tracks — hence their nickname “Robin Hood hackers.” These hackers often use aggressive (sometimes even illegal) methods to disrupt black hats’ malicious agendas.

Red hat hackers may collectively target large-scale scamming operations, which use spear phishing, scareware, or other social engineering hacks to exploit victims. Red hats hack into scammer networks and devices to disrupt their activities, sometimes even using malware to take them offline for days or weeks at a time.

5. Green hat hackers: Educated novices

Green hat hackers are considered hackers-in-training. They often work under a mentor, who guides them on their path becoming independently proficient. Their motivations for joining the hacking world vary, and they may eventually choose to pursue any number of hacking types. Unfortunately, their inexperience can sometimes have dangerous consequences.

6. Script kiddies: True newbies

While green hat hackers may be inexperienced, script kiddies are true amateurs. They rely on pre-existing programs because they don’t have the experience or knowledge it takes to create their own. Because they lack technical knowledge, they often don’t understand the potentially dangerous consequences of using pre-written scripts.

A graphic explains a script kiddie’s motivation, illustrating why they’re one of the types of hackers to look out for.
A graphic explains a script kiddie’s motivation, illustrating why they’re one of the types of hackers to look out for.
A graphic explains a script kiddie’s motivation, illustrating why they’re one of the types of hackers to look out for.

Perhaps the most famous script kiddie incident occurred in 2022, when Uber’s internal systems were breached by a teenager. Using simple social engineering tactics and 2FA (two-factor authentication) spam to gain access, the fledgling hacker copied and pasted code scripts to wreak havoc on the Uber network. The perpetrator was swiftly identified and arrested, but by then, the damage had already been done.

7. Blue hat hackers: Security-focused software developers

Blue hat hackers closely resemble ethical white hat hackers, but instead of breaking into systems or software that a business is already using, a business gives the blue hacker access beforehand to test it for security flaws. That way, the organization can lower the potential risk before deciding to change or update current systems.

Let’s say a company wants to implement a new file-sharing system. The last thing they want is for hackers to easily break in and compromise their confidential data. So, they contract a hacker to test the system before making a final decision. If it proves to be sufficiently protected, the software is a go.

8. Elite hackers: Highly skilled developers

Elite hackers are the champions of modern-day hacking. Their years of experience put them at the top of their field, and they can choose to wear a black or white hacker hat depending on the day. Because they can do both so easily, they’re often the first to identify and create the newest cyberattack methods.

A noteworthy example is when elite hackers tried to hack into the World Health Organization (WHO) to gather information on COVID-19 in 2020. Their attempts failed, but the cyberattack displayed the true danger of phishing emails, as this was the method they used to try and steal passwords and other login credentials.

Hackers may have the skills it takes to try and break into your devices or networks, but Norton has four decades of cybersecurity experience defending against them. Install Norton 360 Deluxe today to help protect against malicious hackers, viruses, and malware that could expose you to privacy threats or leave your device unusable.

9. Gaming hackers: Cheaters and scammers

Gaming hackers target any video game enthusiast in their line of sight. They’re known for using the latest video game trends to manipulate online players into revealing login credentials, payment information, and other personal details attached to their accounts.

They may also use their hacking skills to cheat in games by gaining unfair advantages, such as unlimited resources, invincibility, or wallhacks to see through obstacles. This can ruin the experience for other players and undermine the game's rules.

An illustration accompanies a gaming hacker definition, explaining why they are one of the types of hackers to look out for.
An illustration accompanies a gaming hacker definition, explaining why they are one of the types of hackers to look out for.
An illustration accompanies a gaming hacker definition, explaining why they are one of the types of hackers to look out for.

Game hacking can come in all shapes and sizes. For example, the iconic cheat code from the original The Sims game, “rosebud;!;!;!;!;!”, which was used to generate endless amounts of in-game currency (Simoleons), is an example of fairly benign game hacking. The more “;!;!;!;” added to the end of the code, the more Simoleons were generated.

But game hacking can be much more malicious than generating in-game currency. One of the most notable video game hacks occurred in 2021 when Electronic Arts reported falling victim to a cyberattack compromising more than 780 GB of gaming source code. Luckily, they kept the private information of online players protected.

10. Botnet hackers: Compromised computer controllers

As the name suggests, botnet hackers carry out their cyberattacks using a network of infected devices (called a botnet). These are precoded minions designed by hackers to carry out malicious tasks that range from stealing sensitive files to taking complete control of your computer.

People witnessed the true danger presented by botnet hackers when Cloudflare found they were the target of a DDoS attack that used botnets to spread a virus throughout their private network. According to the company, hackers used around 20,000 botnets from 125 countries to overwhelm their systems with more than 330 million attack requests.

11. Cryptojackers: Cryptocurrency miners

Cryptojacking involves hacking into someone’s devices and covertly taking over their computing power for the sole purpose of mining cryptocurrency. A recent example occurred when cryptojacker Nitrokod launched miner malware that was disguised as desktop-native versions of Google Translate, Microsoft Translator, YouTube Music, and more. This Trojan-style malware helped cryptojackers gain malicious access to thousands of devices.

12. Whistleblowers: Principled informants

Whistleblowers expose or report corporate malfeasance or criminal activity, especially by the companies they work for. Whistleblowers may not have a ton of hacking experience, but they use what they do know to expose crime and corporate or governmental malpractice.

An illustration accompanies a whistleblower definition, explaining why they are one of the types of hackers to look out for.
An illustration accompanies a whistleblower definition, explaining why they are one of the types of hackers to look out for.
An illustration accompanies a whistleblower definition, explaining why they are one of the types of hackers to look out for.

In a 2022 bombshell revelation, Peiter Zatko, then-Chief Security Officer of Twitter, used his unmatched level of access and insider knowledge to blow the whistle on the social media giant, accusing it of violating multiple security regulations and having a lax approach to handling data.

13. State-sponsored hackers: Government-backed specialists

State-sponsored hackers are the James Bonds of the hacking community. Government agencies hire these individuals to gain confidential data on other foreign countries to help them manage potential and existing threats.

For example, Cozy Bear is a state-sponsored hacking group known by many for accusations of meddling in America's 2016 presidential election. In the past, the group has targeted energy companies, governments, and other high-profile entities.

14. Cyberterrorists: Tech-savvy extremists

Cyberterrorists are generally politically motivated cybercriminals. They use their hacking expertise to bring attention to their cause by disrupting information systems. These disruptions may then threaten the physical safety of people and even lead to the loss of life.

Between 2015 and 2016, a series of hacks targeting top U.S. intelligence officials were described as “a campaign of cyberterrorism.” The sophisticated attacks were carried out using a combination of email spoofing and social engineering, resulting in the theft and release of sensitive information. The cyberterrorist hacker was ultimately arrested and imprisoned.

15. Malicious insiders: Employees and contractors

Malicious insiders aren't concerned with honesty and justice like whistleblowers. They intentionally break into their own company networks to exploit confidential data that could put the company and its customers at risk — but they’re not doing this to benefit the less fortunate or report malpractice. The information they expose could just put a pretty penny in their pocket if they find the right interested party.

This might occur when an employee receives a tempting offer to steal private corporate files in exchange for small or large payments. The second employees access the network for the purpose of siphoning private data, they become malicious insiders.

Hacking protection tips

While hackers get a pretty bad rap, not all the different hacker types are working against us. But you’ll want to be protected against the ones that are. That involves installing a powerful hacking protection tool like Norton 360 Deluxe, then following some hacking protection best practices:

Keep personal information safer

Black hat hackers, elite hackers, and script kiddies are just some of the different types of hackers who target personal information for their malicious plans.

Make it harder for them to get it by never including personally identifiable information — such as addresses or phone numbers — on online profiles. If you must send sensitive information via email or other online correspondence, make sure you know who has permission to see such details.

Avoid public Wi-Fi

Some hackers use unprotected public Wi-Fi networks to try and infect devices with different types of malware. Try to avoid doing your banking or online shopping while connected to an unsecured public network. And if you do find yourself out and about, try to only use secure internet connections that are harder for hackers to breach. Be sure to look for “HTTPS” in the URL, as well as security badges.

These are great indicators that the website you’re using is secure and trustworthy.

Consider using a VPN

Consider using a VPN to keep your online activity encrypted. Without being able to track your IP address and browsing history, hackers will find it harder to use things like adware and spyware against you.

Norton 360 Deluxe has built-in VPN capabilities, making its cybersecurity protection against malicious threats even more comprehensive. Install Norton 360 Deluxe and turn on its VPN to encrypt your online connection and help protect your online communications against hacking.

Use secure passwords

Passwords are your first line of defense against cyberattacks like password spraying and credential stuffing, which are often carried out by black hat, green hat, and gaming hackers. Create strong, unique passwords for all your accounts — aim for 15 characters minimum. The more random the password, the better. You can even use a trusted password manager to organize and create secure passwords for you.

Be wary of suspicious links and attachments

Phishing emails containing infected links and attachments are among malicious hackers’ favorite tools. Pay attention to slight URL differences and downloadable files from unknown senders.

An image overviewing the difference between a real and phishing link.
An image overviewing the difference between a real and phishing link.
An image overviewing the difference between a real and phishing link.

Practice mobile device security

Your cybersecurity encompasses both your personal computers and mobile devices. Avoid compromising private contact information, text messages, and photos stored on your cell phones and tablets by:

  • Setting security PINS or biometric locks
  • Keeping operating systems and apps up to date
  • Downloading apps from official app stores

Enable two-factor authentication

Two-factor authentication, or multifactor authentication, adds an extra layer of security to your login process. Biometrics help secure your devices and accounts with fingerprint or facial recognition technology to verify your identity and help keep hackers out. According to a study by Microsoft, 99.9% of hacking attempts can be blocked just by enabling multi-factor authentication in your accounts.

Install security updates immediately

Hackers work tirelessly to spot security flaws and zero-day exploits that they can use as gateways into your system. And while zero-day exploits are, by nature, impossible to prevent completely, updating software and apps as soon as the updates are available can help protect your devices against would-be hacking intrusions.

Protect your devices against hacking

Think of Norton 360 Deluxe as your very own guard dog, protecting you from the different types of hackers looking to break into your devices and steal your data. With the 360° protection it provides, you can be confident that you’ve got what it takes to keep yourself and your devices more secure. Subscribe today to start defending against hackers and other malicious threats.

Ellie Farrier
  • Ellie Farrier
  • Cybersecurity writer
Ellie Farrier is a Prague-based cybersecurity writer interested in how technology and society overlap, especially the impacts of device security. Previously, she worked as a technical writer, diving into product troubleshooting, how-to guides, and tech usability.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 

Contents

    Want more?

    Follow us for all the latest news, tips and updates.