The typical cybercriminals in the cyber world in the early days were youngsters or hobbyists. Their attacks generally limited to pranks and vandalism. But now, the cybercriminals become very dangerous. The attackers are individuals or groups. They try to make use of the vulnerabilities for their mission. These criminals are interested in the thing as of credit cards, product designs, and anything with some value. The type of cybercriminals are the following:
Amateurs are also called script kiddies. They have only some skills and want to be a hacker. They lack any serious technical expertise and usually use existing tools to start attacks. Some of these are just curious and others try to show their skills and cause damage. They are just using basic tools and usually be able to attack very weakly secured system, but the results can be very destructive.
A term hacker is first used in the early days of the 1960s. It describes a programmer or somebody who can hack computer code. Usually work secretly and create tools for hacking. They often break into computers or networks to gain access for a variety of reasons. The goal of the break-in determines the categorization of these hackers as white, gray, or black hats. The figure below illustrates the type of hackers.
White Hat Hackers
These are ethical hackers and used their programming skills for good and legal process. They break into networks or computers with the permission of the owners to find weaknesses of these systems to improve security aspects. White hat hackers use their skills to discover network vulnerabilities and report to developers and owners for fixing these issues before the vulnerabilities can make damage.
Black Hat Hackers
The black hat attackers are people who take advantage of any vulnerability for illegal missions. Blackhat hackers are unethical hackers. These hackers compromise the network permission for their personal gain. They also attack a network for malicious.
Gray hat hackers
These hackers are between white and black hat attackers. The gray hat attackers may find the vulnerability and report it to the owners of the system to fix the problem and some gray hat hackers publish the facts about the vulnerability on the Internet so that other attackers can exploit it.
These are the organization of cybercriminals, which include hacktivists, terrorists and state-sponsored hackers. These criminals are generally groups of skilled criminals focused on control, power and wealth.
The hacktivists working for making political statements to create wakefulness to different issues to their rights. Hacktivists also publish awkward information about their victims publicly.
State-sponsored attackers collect intelligence or situate damage on behalf of their government. These attackers are very high and well-trained. Their attacks focus on particular goals that are helpful to their government. These attackers are usually members of their countries armed forces.