top of page

Hackers: who are they, and what do they do?

Hackers have shaped the digital world in ways most people don’t realise. While some work to strengthen cyber security, others have caused massive disruptions, stolen millions, and even changed the course of history.


In this blog, we’ll dive into the world of hackers and lift the lid on who they are, what they do, where they lurk, and unveil some of the most famous hacker stories ever recorded.

 

Who or what are hackers?


A hacker is someone skilled in computer systems, programming, and cyber security. However, not all hackers have the same intentions. They generally fall into three main categories:


1. White Hat Hackers (Ethical Hackers)


These are the "good guys" of the hacking world. They work for companies, governments, and cyber security firms to find and fix security vulnerabilities before malicious hackers exploit them.

If you receive our Security Awareness Training, the students who deliver the input are all trained by ethical hackers.


2. Black Hat Hackers (Cybercriminals)


These hackers break into systems illegally to steal data, cause damage, or make money. They engage in activities like ransomware attacks, data breaches, and identity theft.


The image we have used to illustrate this blog is stereotypical of the image associated with ‘illegal’ hackers: the black hood, the mystique, a system being hacked for the wrong reasons, sometimes the adornment of a mask. That is a societal perception. In reality, hackers look just like you and I.


3. Grey Hat Hackers (A bit of both)


Grey hats operate in the middle ground. They may break into systems without permission but do not intend to cause harm. Sometimes, they expose vulnerabilities to the public or inform companies about security risks - often asking for a reward in return.


There are also hacktivists (like the notorious Anonymous group), who hack for political or social causes, and script kiddies, who use pre-made hacking tools without deep technical knowledge.



What do hackers do?


Hackers engage in a variety of activities, both legal and illegal. Some of their most common actions include:


Ethical Hacking & Penetration Testing


White hat hackers test the security of networks, websites, and applications to find vulnerabilities before cybercriminals do.


Cybercrime & Hacking Attacks


Black hat hackers exploit vulnerabilities to steal data, disrupt services, or extort money through ransomware and phishing scams.


Bug Hunting & Security Research


Many hackers participate in bug bounty programs, where companies like Google and Facebook pay them for finding security flaws.


Hacktivism


Groups like Anonymous and LulzSec use hacking to expose government secrets, fight censorship, or protest injustices.


Social Engineering


Some hackers don’t even rely on technical skills. Instead, they trick people into revealing passwords or security details - this is called social engineering (think phishing emails and scam calls).


Famous hacker stories that shook the world


1. Kevin Mitnick – The Most Wanted Hacker


Kevin Mitnick was one of the first hackers to gain worldwide fame. In the 1980s and 1990s, he hacked into major companies like IBM, Nokia, and Motorola, stealing software and secrets. He used social engineering to manipulate employees into revealing passwords. The FBI pursued him for years, and he was eventually arrested in 1995. After serving time, Mitnick switched sides and became a cyber security consultant.


2. Gary McKinnon – The Man Who Hacked NASA


In 2001, British hacker Gary McKinnon breached 97 U.S. military and NASA computers looking for information on UFOs. He allegedly deleted critical files, causing damage worth over $700,000. The U.S. government called it "the biggest military hack of all time." He fought extradition for years and was never sent to the U.S. for trial.


3. Anonymous – The Internet’s Hacktivists


Anonymous is a decentralised hacker collective known for cyberattacks on governments, corporations, and extremist groups. Their famous hacks include:

  • Operation Payback (2010) – Retaliation against anti-piracy organisations.

  • Hacking the Church of Scientology (2008).

  • Exposing police brutality and corruption through leaked documents.


4. Albert Gonzalez – The $170 Million Heist


Albert Gonzalez was the mastermind behind one of the biggest credit card frauds in history. He and his team hacked retailers like TJ Maxx and Heartland Payment Systems, stealing over 170 million credit card numbers. He used SQL injection attacks to infiltrate systems and later sold the stolen data on the dark web. He was arrested in 2008 and sentenced to 20 years in prison.


5. Adrian Lamo – The Hacker Who Turned into a Whistleblower


Adrian Lamo hacked into Microsoft, Yahoo, and The New York Times, but he’s most famous for turning in Chelsea Manning, a U.S. Army soldier who leaked classified military documents to WikiLeaks. Lamo discovered Manning’s identity and reported her to the authorities, leading to her arrest.


6. WannaCry Ransomware Attack (2017)


A group of hackers used stolen NSA cyberweapons to launch WannaCry, a massive ransomware attack that infected over 230,000 computers in 150 countries. The attack shut down hospitals, businesses, and government agencies. The hackers demanded Bitcoin payments to unlock the encrypted files.


Where can hackers be found?


Hackers don’t just lurk in the dark corners of the internet. They exist in both legal and illegal spaces, including:


Cyber security conferences


Ethical hackers attend conferences like DEF CON, Black Hat, and BSides to share knowledge and showcase their skills.


The Dark Web


Black hat hackers operate in underground forums on the dark web, where they buy and sell stolen data, hacking tools, and malware.


Hacker communities & forums


Places like Reddit, Hack The Box, and Stack Overflow are full of hackers discussing security, sharing knowledge, and competing in challenges.


Government agencies & tech companies


Many skilled hackers work for organisations like the NSA, FBI, Google, and Microsoft, helping to defend against cyber threats.


Bug bounty platforms


Sites like HackerOne and Bugcrowd connect ethical hackers with companies willing to pay for vulnerability discoveries.


So, are hackers good or bad?


The word "hacker" doesn’t automatically mean criminal. Hackers play a vital role in cyber security, uncovering vulnerabilities and improving digital defences. While some choose a darker path, many hackers are ethical professionals working to make the internet safer.


The world of hacking is complex, fascinating, and ever-evolving. Whether they wear white hats, black hats, or something in between, hackers are an integral part of the modern digital landscape.

 

Reporting

Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).

 

Comments


The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.

 

EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page