Black Hat: A Black Hat hacker violates computer security for their own personal profit or out of malice. Black hat hackers break into secure networks and systems with the motive of destroying, modifying, or stealing some sensitive data, or to make the networks unusable for authorized network users. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are “the epitome of all that the public fears in a computer criminal”.
White Hat: A White Hat is an ethical security hacker. An ethical hacker is always on the lookout for flaws in a company’s network and works to strengthen it. They break security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assessments for a client, or while working for a security company which makes security software. They help companies fight against black hat hackers.
Grey Hat: A Grey Hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.
Blue Hat: A Blue Hat hacker is someone outside a computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. In particular, Microsoft uses the term to refer to the computer security professionals they invited to find the vulnerability of their products such as Windows.
Red Hat: Red Hat hackers or “Robin Hood” hackers will ruthlessly go after black hat hackers. Their intentions are good but they don’t always use legal or ethical practices to stop them.
Green Hat: A Green Hat hacker is new to the hacking, scripting, and coding world. Their intentions aren’t to attack but to learn what they can from other, more skilled, hackers. Green hat hackers go to school and earn certificates and programming degree.
Script Kiddie: A Script Kiddie is a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and defaces websites according to the programming and hacking cultures. It is generally assumed that most script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.
Cyber Terrorist: The goal of a Cyber Terrorist is to create political disruption and they are considered very dangerous hackers. They can incite violence and chaos and spread false information.
Elite Hackers: Elite hackers are considered the most skilled or the masters of hacking. They bring noteworthy technological innovations to the field of hacking.
Sponsored Hackers: Sponsored Hackers are appointed by a country’s government to spy and obtain confidential information from another country. Any sensitive information they gain can be used as an attack or to give them a heads up about potential threats to their own country.
Whistle-Blower Hacker: Whistle-Blower Hackers, also known as malicious insider, are hackers who exist within an organization and leak confidential information to outsiders. Their intentions may be a personal grudge, or they want to expose illegal activities within their organization.
Hactivists: A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious, or political message. Hacktivist activities span many political ideals and issues. Freenet, a peer-to-peer platform for censorship-resistant communication, is a prime example of translating political thought and freedom of speech into code. Hacking as a form of activism can be carried out through a network of activists, such as Anonymous and WikiLeaks or through a singular activist, working in collaboration toward common goals without an overarching authority figure.
Social Engineering Hackers: A social engineering hacker uses psychological manipulation on people making them perform actions or divulge confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.
Cryptojackers: Cryptojackers use a malware called Cryptojacking malware, which infects computers to use them to mine cryptocurrencies usually without a user’s knowledge. Cryptojacking (also called malicious cryptocurrency mining) is an emerging Internet threat that hides itself on a computer or mobile device and uses the machine’s resources to “mine” various forms of digital currencies known as cryptocurrencies. It is a burgeoning threat that can take over web browsers, as well as compromise all types of devices, from desktops and laptops to smartphones and even network servers.
Gaming Hackers: A gaming hacker’s goal is to compromise their competitors/other gamers. They will target high profile gamers in an attempt to steal credit caches or cause distributed denial-of-service. Gaming hackers also edit a game’s source code in order to gain an advantage.
Botnets: Botnet hackers aim to compromise a high volume of network systems by creating bots to perform attacks. A botnet is a number of Internet- connected devices, each of which runs one or more bots. These hackers/malware coders use botnets to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allows them to access the device and its connection.
Sources:
https://www.techfunnel.com/information-technology/different-types-of-hackers/
https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/amp/
https://en.m.wikipedia.org/wiki/Security_hacker