Black hat (computer security)
|Part of a series on|
The term's origin is often attributed to hacker culture theorist Richard Stallman (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair. The black/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively, to resemble the contrast of good and evil. The black versus white hat dichotomy was also prominently displayed in the Spy versus Spy cartoon in Mad Magazine.
Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks and systems with the motive of destroying, modifying, or stealing some sensitive data, or to make the networks unusable for authorized network users.
Unlike the white hat hackers, black hat hackers do not have any common and standardized code or internal regulation. Albeit, there exist some forms of organization: black hat call centers, malicious software resellers and vendors.
- Silic, Mario; Lowry, Paul Benjamin (2019-09-04). "Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes". Information Systems Frontiers. 23 (2): 329–341. doi:10.1007/s10796-019-09949-3. ISSN 1387-3326.
- Laskow, Sarah (January 27, 2017). "The Counterintuitive History of Black Hats, White Hats, And Villains". Atlas Obscura. Archived from the original on June 29, 2018. Retrieved June 29, 2018.
In early hacking circles, there was a whole separate term to refer to malicious hacking: those people were called crackers. Across the internet, Richard Stallman, who founded the GNU Project and Free Software Foundation, is often credited with coining the term 'black hat' hacker, but he says that’s not correct. 'I have never used the terms 'X-hat hacker' because I reject the use of 'hacking' to refer to breaking security,' he says. Where did the term come from then? 'I don't know where,' he says.
- O'Brien, Marakas, James, George (2011). Management Information Systems. New York, NY: McGraw-Hill/ Irwin. pp. 536–537. ISBN 978-0-07-752217-9.
- Wilhelm, Thomas; Andress, Jason (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Elsevier. pp. 26–7. ISBN 9781597495899.
- Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9.
- "Here Are The Top 5 Hackers Arrested in 2016". Techworm.net.
- Filiol, Eric; Mercaldo, Francesco; Santone, Antonella (2021). "A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach". Procedia Computer Science. 192: 2039–2046. doi:10.1016/j.procs.2021.08.210.
- Silic, Mario; Lowry, Paul Benjamin (April 2021). "Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes". Information Systems Frontiers. 23 (2): 329–341. doi:10.1007/s10796-019-09949-3. ISSN 1387-3326.
- Ric Messier (2021). CEH v11 Certified Ethical Hacker Study Guide. ISBN 9781119800286.
- "What is a Black-Hat hacker?". kaspersky.com.
- Whitney, Monsay (2017). "Box Clever". Box Clever. doi:10.5040/9781784606299.00000002.