Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Black hat (computer security)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Description == Criminals who intentionally enter computer networks with malicious intent are known as "black hat hackers".<ref name=":2">{{Cite web |date=2022-05-11 |title=Black hat, White hat, and Gray hat hackers β Definition and Explanation |url=https://www.kaspersky.com/resource-center/definitions/hacker-hat-types |access-date=2022-11-27 |website=www.kaspersky.com |language=en}}</ref> They may distribute [[malware]] that steals data (particularly login credentials), financial information, or [[Personal data|personal information]] (such as passwords or credit card numbers). This information is often sold on the [[dark web]]. Malware can also be used to hold computers hostage or destroy files. Some hackers may also modify or destroy data in addition to stealing it. While hacking has become an important tool for governments to gather intelligence, black hats tend to work alone or with organized crime groups for financial gain.<ref name="What is a Black-Hat hacker"/><ref>{{Cite web |date=2020-09-14 |title=Kevin Mitnick - Once the world's most wanted hacker, now he's getting paid to hack companies legally {{!}} Black Hat Ethical Hacking {{!}} Black Hat Ethical Hacking |url=https://www.blackhatethicalhacking.com/articles/hacking-stories/kevin-mitnick-once-the-worlds-most-wanted-hacker-now-hes-getting-paid-to-hack-companies-legally/ |access-date=2024-01-09 |language=en-US}}</ref> Black hat hackers may be novices or experienced criminals. They are usually competent infiltrators of computer networks and can circumvent [[security protocol]]s. They may create malware, a form of software that enables illegitimate access to computer networks, enables the monitoring of victims' online activities, and may lock infected devices. Black hat hackers can be involved in [[cyber espionage]] or protests in addition to pursuing personal or financial gain.<ref>{{Cite web |title=What is a black hat hacker? |url=https://www.techtarget.com/searchsecurity/definition/black-hat |access-date=2022-11-27 |website=SearchSecurity |language=en}}</ref> For some hackers, cybercrime may be an addictive experience.<ref>{{Cite news |date=2016-10-24 |title=Teen hackers study considers link to addiction |url=https://www.bbc.com/news/technology-37752800 |access-date=2024-08-12 |work=BBC News |language=en-GB}}</ref><ref>{{Cite web |date=2023-06-12 |title=How European authorities want to tackle child hacking |url=https://www.euronews.com/next/2023/06/12/are-the-kids-alright-how-european-authorities-want-to-tackle-child-hacking |access-date=2024-08-12 |website=euronews |language=en}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)