In the public imagination, hacking is inevitably a crime. Poorly socialized hackers lurk in basements across the globe, just itching to access a bank account or dream up a new Nigerian prince to steal identities. People more familiar with computer culture know that hacking, like so many other things, exists on a continuum.
Decades ago, children’s cartoons made detecting the good and bad guys easy. The nice guys wore a white hat, while the good guys donned a black one. The terms white hat, gray hat, and black hat are shorthand for the degree to which a hacker helps people or participates in a criminal hacking culture.
But as with all things in the increasingly layered world of hacking and mobile app development, the image of hackers is more nuanced than it appears at first.
Here’s what you need to know about each type of hacker — and how they can help or hurt your mobile app.
Knowing that someone is a black hat hacker tells you little about what specifically they intend to do, though. Black hat hackers come in as many varieties as there are crimes. Some are highly skilled coders, who use their experience to gain access to passwords and hack consumer data. Others are opportunists, who use behavioral engineering to convince consumers to give away sensitive data.
Understanding how black hat hackers work can help you protect your app from them. Some of the many goals black hat hackers may set out to achieve include:
Some hackers will take any information they can get — whether it’s your users’ private health care data, or even the notes they make in your app. These hackers have one of two goals.
Sometimes they have a personal vendetta. They want information on a specific person or entity, so that they can use that information later. These hackers might be ex-boyfriends and girlfriends (or the people they hire), or others with a personal ax to grind. Occasionally a black hat hacker seeks information about a user or group of users in an attempt to harm an entity. For instance, a hacker might leak consumer data from a company after that company fires them, in an attempt to undermine the company’s reputation.
In most cases, the goal is purely financial. Information is power in a data-driven world. Someone, somewhere will pay for just about anything, ranging from a list of passwords to an idea of users’ deepest fears. Hackers who can get this information stand to earn a tidy profit.
Perhaps the most straightforward — but also one of the most difficult — hack is one that allows a user to transfer money or credit from one person’s account to another’s. If you collect financial or credit card data on your app, or if your app offers access to bank accounts, your users are vulnerable to black hat hackers looking to seamlessly transfer their money into someone else’s account.
Money isn’t the only valuable commodity in an economy driven by services. Corporate intellectual property — proprietary lines of code, marketing plans, even financial information — is valuable to competitors, consumers, government entities, and a host of other actors. By accessing corporate information, a hacker may be able to start their own competitive company.
Competitors may be able to steal what makes your business unique. Consumers gain a way to access data for free. The options are virtually limitless. If the app you develop isn’t protected, you’re endangering the business for which you developed it.
Most hacking is, to some degree or another, about money. Black hat hackers target consumer, government, and corporate financial data in myriad ways. They may hack even a completely unrelated app to gain access to information that can help them access another app.
For instance, by learning a user’s mother’s maiden name, a hacker might be able to access her bank account. And if you operate an app that maintains any sort of financial data, even if it’s just credit card records, your app could be hacked, exposing government, corporate, or consumer data.
The wealthier the people who use your app are, the more valuable their data is. So apps that target governments and corporations are of a higher value, both because they offer more valuable financial data, and because hackers may be able to sell this information.
Black hat hackers don’t limit themselves to a specific set of goals. They will gleefully seek out any and all information that offers them any value.
Some other reasons black hat hackers might hack an app include:
White hat hackers are generally sticklers for the rules. That’s especially true when they’re hired for security purposes. Some have law enforcement or military backgrounds, and received their training for these roles.
So they’re big sticklers for the rules. White hat hackers will not hack your competition, use stolen code, or break the law in other ways — at least not knowingly. For businesses that want to keep a leg up on the competition, this can feel stifling.
Yet having a white hat hacker on your team is one of the best ways to protect your business without breaking the law. Some of the many roles white hat hackers can play include:
Not all white hat hackers are exclusively white hat. Some are white hat in their professional lives, but spend their evenings on criminal endeavors — or trying to hack other enterprises just for fun. This means that you’ll need to be careful about whom you hire. The information they are hired to protect during the day could be a source of profit at night when they turn around and sell the information, or use it to hack your customers.
That doesn’t mean you have to be skeptical of all hackers, or even that the majority are bad. But it does mean that in a competitive market, the valuable skills you pay for might be even more valuable to someone else. Choose white hat hackers wisely — and know that a disgruntled former security worker might be your very worst enemy. So treat your staff well, pay them fairly, check their background, and establish clear policies that help you monitor for signs of trouble with your staff, contractors, or any other people you or the companies that hire you work with.
So what exactly do gray hat hackers do? It’s a mixed bag. The simplest, and perhaps least ethically questionable, version of gray hat hacking occurs when white hat hackers strike out on their own.
They attempt to hack into apps and other sources of data, then notify the business of leaks. In a modified version of this scheme, gray hat hackers notify
Some other versions of gray hat hacking include:
Because the world of data hacking is complex, there’s significant disagreement about the difference between a gray hat and black hat hacker. This is especially true in the world of law enforcement, where behavior that seems perfectly reasonable to most people — such as hacking a company’s data, then notifying them of where the issue is — can land a hacker in jail. Developer should proceed with caution when using any hacking techniques, especially ethically and legally dubious gray hat approaches.
Though gray, black and white hat hackers are probably the best known hacking styles in the world outside of hackers, in the hacking world they’re just the beginning. Knowing how hackers identify can help you spot potential problems, screen potential employees, and make decisions informed by how hackers actually work.
Some other types of hackers include:
The world of hacking is complex, with its own culture, lexicon, and social norms. There’s a continuum from ethical and legal to unethical and illegal, and many hackers occupy many spots on this continuum throughout their careers.
If you feel overwhelmed by the number of hackers, the damage they can do, and the precautions you need to take against them, you’re not alone. And we can help. AppSolid offers the protection developers and large entities alike need. We take care of the security, freeing you to get back to business. Check out our industry-leading binary protection today!
Credential leaks have become alarmingly common in today's digital landscape. What's more concerning is that…
Automated penetration testing has become a new way to replace and/or complement the traditional manual…
According to Gartner, OT (Operational Technology) is “hardware and software that detects or causes a…
One of the most effective ways to identify security weaknesses is to simulate attacks with…
Cybersecurity is essential for every organization, not only for enterprises but also for SMBs and…
Software development is a complex process that typically requires a lot of time and effort.…