Skip to Main Content

Want to stay up-to-date with the latest IT news?
Subscribe to our mailing list to hear the latest news, events, free resources, and more for your industry.

Subscribe now
Blog

The types of hackers, both the good and the bad, seen most in 2025

3 minute read

Kelsey Smith

July 24th, 2025

The types of hackers, both the good and the bad, seen most in 2025

3 minute read

Kelsey Smith

July 24th, 2025

This year has already been a prevalent one for cyber threats. We’ve seen major retailers targeted by ongoing attacks, but why do people hack and what are the different types of hackers? 

Hackers, often referred to as threat actors (TA’s) or cyber criminals, are individuals or groups of people who use sophisticated computer skills and tools to break into an organisation’s digital environments containing sensitive information. 

The intent of these actions differs depending on the hacker and scenario. Understanding cyber security and how to protect yourself from rising threats starts with knowing the different types of hackers out there and the threat they pose. 

First off, why do people hack? 

When most people think of a hacker, they think of a person head down over a laptop, hood over their head, looking mysterious and stealthy.  

But that’s not usually the case. Hackers are often a part of bigger projects, groups, or even nation states, and their reasons for doing what they do can range from financial to political. Understanding why hackers hack is the key to stopping them.

Financial gain

Many hackers are motivated by money. They may steal credit card numbers, credentials, or other sensitive information to sell as a broker to the highest bidder on the dark web or use in further attacks. Ransomware is often used to extort organisations, a growing approach for threat actors is to do both, this can be called a double extorsion. This is the most common motive among cyber criminals and is typically associated with malicious hackers.

Political or social causes (Hacktivism)

Hacktivists they use cyber crime as a form of protest or activism. They target government sites, large corporations, or institutions they see as unethical. Their goal is to raise awareness, disrupt services, or leak sensitive information to support a political or social agenda.

State-sponsored attacks

State-sponsored threat actors or corporate spies infiltrate networks to gather intelligence or steal proprietary data. This form of hacking is often long-term and highly targeted, aiming to gain political, military, or economic advantages over rivals.

Ethical hacking

Ethical hackers hack systems with permission to identify and fix vulnerabilities. They help organisations improve their cyber security and prevent malicious attacks. This ethical form of hacking is essential for organisations to stay on top of cyber security and is often carried out by penetration testers or security consultants. 

Types of hackers

Ethical hackers

  • Intent: good
  • What they do: use their skills to find and fix security vulnerabilities before malicious hackers can exploit them
  • Work for: organisations, security firms, or independently as penetration testers or cyber security consultants
  • Legal?: yes with agreed scope

Malicious hacker

  • Intent: malicious
  • What they do: break into systems to steal data, disrupt services, install malware, or profit illegally
  • Examples: cyber criminals, ransomware groups, state sponsored groups
  • Legal?: no

Grey Hat Hackers

  • Intent: mixed
  • What they do: may break into systems without permission but don’t have malicious intent, often to expose vulnerabilities or highlight flaws
  • Legal?: usually illegal, even if intentions are good

Script Kiddies

  • Intent: disruptive or mischievous
  • What they do: use pre-made hacking tools and scripts without fully understanding how they work
  • Skill level: low
  • Motivation: fun or minor to major disruption

Hacktivists

  • Intent: political or social
  • What they do: hack to promote a cause or expose injustice, e.g., leaking documents or taking down websites in protest
  • Examples: anonymous
  • Legal?: typically illegal

State-Sponsored Hackers

  • Intent: political, military, or economic gain
  • What they do: work for governments to conduct espionage, disrupt infrastructure, or steal intellectual property
  • Highly skilled and often well-funded
  • Examples: Salt Typhoon, Lazarus, APT31

Insider threats

  • Intent: varied (revenge, profit, error)
  • What they do: individuals within an organisation who misuse their access, either maliciously or unintentionally
  • Examples: disgruntled or careless employees

By understanding the different types of hackers and why they perform these attacks, you’ll be better prepared for potential threats. Whether it’s strengthening internal security, conducting regular risk assessments, or staying informed about new tactics, awareness is the first step towards better cyber resilience. 

Get in touch with our cyber security specialists for support on your security strategies now.  

Contact us
Image of a smiling IT support professional talking on a headset
Headshot of Kelsey Smith

About the author

Kelsey joined Phoenix in late 2022 as the Content and Social Media Apprentice, moving into Content Executive in 2024 after working closely with the Marketing Team to develop her skills in digital marketing. Kelsey’s passion lies in content creation, which is reflected in her contributions across all areas of the business, from external and internal campaigns to our social media accounts.

Kelsey is not only keen to learn about marketing, but also the challenges organisations face and how Phoenix helps them overcome these.