Black hats are criminal hackers who use security gaps within systems for their own gain and often cause a lot of damage. Their motives and methods are, however, very different.

What is a black hat hacker?

At first glance, old western movies and modern computer systems don’t have a lot in common. However, there is one overlap and it’s in the choice of headwear you would typically see in the wild west. Back when everything was filmed in black and white, it was important to dis­tin­guish char­ac­ters from one another. The dashing hero would be wearing a white cowboy hat, while the bad guy would appear wearing a black hat. These ant­ag­on­ists are how black hats got their name. You can assume then, that black hat hackers are up to no good. This is true as their actions are normally illegal.

Note

Although the words ‘black’ and ‘white’ in this use aren’t normally con­sidered racist, they do imply a colour binary that could be mis­un­der­stood as racist.

Black hat hackers gain access to computer systems to cause damage. They use their access to either find personal in­form­a­tion or take down the system they’re attacking. In most cases, the processes used by black hat hackers are illegal and can be pro­sec­uted by the au­thor­it­ies. Black hats look for weak points in networks or computers and exploit them for their own gain. The victims are often not aware of the attack until the damage has been done. That’s why it’s import to choose the right anti-virus programs Ad­di­tion­al measures for pro­tect­ing in­form­a­tion in the event of an attack include updating your system regularly, requiring two-factor au­then­tic­a­tion for accounts and using strong passwords for sensitive data.

What type of black hats are there?

There are different types of black hat hackers, but many of them have a lot in common. To dif­fer­en­ti­ate them, it’s best to look at in­ten­tions and processes.

In many cases, black hat hackers are looking to make money. Using malware they take over systems, access passwords and bank data, or blackmail the owners of affected computers or networks. Black hats often work in groups, have developed struc­tures and operate like gangs of outlaws, albeit primarily in the online world. These hackers also take on contracts and pro­pos­i­tions.

Other black hats are less concerned with direct (financial) benefits, pre­fer­ring instead to focus on causing damage. This could be grounded in ideo­lo­gic­al beliefs, for example, when the in­fra­struc­ture of or­gan­isa­tions, au­thor­it­ies or other companies are attacked and then damaged or destroyed. Revenge or showing off are ad­di­tion­al reasons for black hat hackers to operate. However, we can only really speculate about the exact motives that hackers have.

The third group of black hats use cy­ber­at­tacks to gain in­form­a­tion. This could be the address of citizens, industry secrets from competing companies or even state secrets. Gov­ern­ments are also getting involved since for most black hat hackers it’s con­sidered taboo to work together with the au­thor­it­ies. Bots are also sometimes used to carry out cy­ber­at­tacks, to cause confusion and overload systems.

How are black hats different to other hackers?

Black hat hackers are the ones most closely as­so­ci­ated with the commonly held view of hackers: a shady computer expert using the weak­nesses in a system to cause damage. The name black hat, however, serves to dis­tin­guish this type of hacker from other types of hackers. They are different from white hat hackers and grey hat hackers.

Black hats vs. white hats

White hat hackers are the polar opposite of black hats since their name comes from the heroes of the old western movies. White hat hackers operate in a very similar way to black hat hackers and exploit the weak points in a system. However, unlike their criminal coun­ter­parts, they don’t use their knowledge for their own benefit or to damage a system. Instead, they use their expertise to inform the affected or­gan­isa­tion or company. They do this on their own ini­ti­at­ive or because they’ve been hired by a network operator. Ethical hacking saves firms a lot of money and protects them from attacks.

The dif­fer­ence between black hats and grey hats

Gray hats are, as you can imagine, a mix between white hats and black hats. Grey hat hackers often operate outside of the legal framework since they also attack and exploit weak points without the per­mis­sion or knowledge of the operator. While black hats use these attacks for (financial) gain, grey hats inform the operators about what has happened so that they have the op­por­tun­ity to close any holes in their system. Their mo­tiv­a­tion is again varied: they want to be re­cog­nised, test their own skills, or receive financial com­pens­a­tion. Some, however, simply want to make the internet a safer place.

However, grey hats as well as black hats are looked at neg­at­ively by many companies. Since they access external systems without per­mis­sion, they are operating outside of the law and still cause damage. Es­pe­cially if the (unwanted) discovery of a weak point or its fix is followed by a request for a reward, since this blurs the lines with the blackmail methods used by black hats. The dif­fer­ence between good and bad is, therefore, not so crystal clear. This is, for example, how the hacker col­lect­ive Anonymous operates. Even though they use the methods of black hat hackers, they are still seen by many people as hackers that are fighting for important things.

Famous black hat hackers

Over time there have been many incidents and attacks carried out by black hat hackers. Those re­spons­ible weren’t always caught or the incidents didn’t become public knowledge. There are some well-known black hats though:

Kevin Mitnick

Possibly the most well-known hacker of all time is the American Kevin Mitnick, aka Condor. Together with his Roscoe gang, they hacked the US De­part­ment of Defense, among other systems. He was arrested and sentenced to prison in the 1980s and again in 1995. Following his release in 2000, he became an author and security advisor.

Albert Gonzalez

Albert Gonzalez was charged with three counts of data theft and credit card scams for millions of hacks that took place between 2008 and 2009. He was sentenced to 20 years in jail. In the meantime, he became an informant, however, still carried on with his criminal activ­it­ies. Together with his ac­com­plices, he is said to have stolen 250 million US dollars from the TJX retail group.

Jonathan James

The 15-year-old black hat hacker Jonathan James also found security gaps in the US De­part­ment of Defense. He in­ter­cep­ted countless clas­si­fied documents and attracted the attention of federal au­thor­it­ies. The US citizen also in­filt­rated NASA, the BellSouth holding company and a school ad­min­is­tra­tion district. He was arrested in 2000 and was sentenced to six months in prison for breaking probation. After the au­thor­it­ies ques­tioned him about the black hat attack on TJX in 2008, he committed suicide on 18 May.

Go to Main Menu