Black hat (computer security): Difference between revisions
Included further detail on examples |
min ex |
||
(38 intermediate revisions by 30 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Computer hacker with malicious intent}} |
{{Short description|Computer hacker with malicious intent}} |
||
{{Redirect|Blackhat||Black hat (disambiguation){{!}}Black hat}} |
{{Redirect|Blackhat||Black hat (disambiguation){{!}}Black hat}} |
||
{{Copy edit|date=December 2023}} |
|||
A '''black hat''' ('''black hat hacker''' or '''blackhat''') is a computer [[security hacker|hacker]] who violates laws or |
A '''black hat''' ('''black hat hacker''' or '''blackhat''') is a computer [[security hacker|hacker]] who violates laws or ethical standards for nefarious purposes, such as [[cybercrime]], [[cyberwarfare]], or malice. These acts can range from [[Online piracy|piracy]] to [[identity theft]]. A Black hat is often referred to as a "cracker".<ref>{{Citation |last=Sheikh |first=Ahmed |title=Introduction to Ethical Hacking |date=2021 |work=Certified Ethical Hacker (CEH) Preparation Guide |pages=1–9 |url=http://dx.doi.org/10.1007/978-1-4842-7258-9_1 |access-date=2024-03-08 |place=Berkeley, CA |publisher=Apress |doi=10.1007/978-1-4842-7258-9_1 |isbn=978-1-4842-7257-2|s2cid=239755067 }}</ref> |
||
The term originates from 1950s [[Western (genre)|westerns]], with "bad guys" (criminals) |
The term originates from 1950s [[Western (genre)|westerns]], with "bad guys" (criminals) typically depicted as having worn black hats and "good guys" (heroes) wearing white ones. In the same way, black hat hacking is contrasted with the more ethical [[White hat (computer security)|white hat]] approach to hacking. Additionally, there exists a third category, called [[Grey hat|grey hat hacking]], characterized by individuals who hack, usually with good intentions but by illegal means.<ref name="What is a Black-Hat hacker">{{Cite web |date=2022-02-09 |title=What is a Black-Hat hacker? |url=https://www.kaspersky.com/resource-center/threats/black-hat-hacker |access-date=2022-11-27 |website=www.kaspersky.com |language=en}}</ref><ref name=":0">{{Cite web |last=testovaniebezpecnosti |date=2017-11-10 |title=Hackers are not just the bad guys – brief history and classification |url=https://hacktrophy.com/en/hackers-history-and-classification/ |access-date=2022-11-27 |website=HackTrophy |language=sk}}</ref><ref name=":1" /> |
||
== Description == |
== Description == |
||
Criminals who intentionally enter computer networks with malicious intent are known as "black hat hackers".<ref name=":2">{{Cite web |date=2022-05-11 |title=Black hat, White hat, and Gray hat hackers – Definition and Explanation |url=https://www.kaspersky.com/resource-center/definitions/hacker-hat-types |access-date=2022-11-27 |website=www.kaspersky.com |language=en}}</ref> They may distribute [[malware]] that steals data (particularly login credentials), financial information, or [[Personal data|personal information]] (such as passwords or credit card numbers). This information is often |
Criminals who intentionally enter computer networks with malicious intent are known as "black hat hackers".<ref name=":2">{{Cite web |date=2022-05-11 |title=Black hat, White hat, and Gray hat hackers – Definition and Explanation |url=https://www.kaspersky.com/resource-center/definitions/hacker-hat-types |access-date=2022-11-27 |website=www.kaspersky.com |language=en}}</ref> They may distribute [[malware]] that steals data (particularly login credentials), financial information, or [[Personal data|personal information]] (such as passwords or credit card numbers). This information is often sold on the [[dark web]]. Malware can also be used to hold computers hostage or destroy files. Some hackers may also modify or destroy data in addition to stealing it. While hacking has become an important tool for governments to gather intelligence, black hats tend to work alone or with organized crime groups for financial gain.<ref name="What is a Black-Hat hacker"/><ref>{{Cite web |date=2020-09-14 |title=Kevin Mitnick - Once the world's most wanted hacker, now he's getting paid to hack companies legally {{!}} Black Hat Ethical Hacking {{!}} Black Hat Ethical Hacking |url=https://www.blackhatethicalhacking.com/articles/hacking-stories/kevin-mitnick-once-the-worlds-most-wanted-hacker-now-hes-getting-paid-to-hack-companies-legally/ |access-date=2024-01-09 |language=en-US}}</ref> |
||
Black hat hackers may be novices or experienced criminals. They are usually competent infiltrators of computer networks and can circumvent [[security protocol]]s. They may create malware, a form of software that enables illegitimate access to computer networks, enables the monitoring of victims' online activities, and may lock infected devices. Black hat hackers can be involved in [[cyber espionage]] or protests in addition to pursuing personal or financial gain.<ref>{{Cite web |title=What is a black hat hacker? |url=https://www.techtarget.com/searchsecurity/definition/black-hat |access-date=2022-11-27 |website=SearchSecurity |language=en}}</ref> For some hackers, cybercrime may be an addictive experience.<ref>{{Cite news |date=2016-10-24 |title=Teen hackers study considers link to addiction |url=https://www.bbc.com/news/technology-37752800 |access-date=2024-08-12 |work=BBC News |language=en-GB}}</ref><ref>{{Cite web |date=2023-06-12 |title=How European authorities want to tackle child hacking |url=https://www.euronews.com/next/2023/06/12/are-the-kids-alright-how-european-authorities-want-to-tackle-child-hacking |access-date=2024-08-12 |website=euronews |language=en}}</ref> |
|||
== History == |
== History == |
||
[[File:Countries initially affected in WannaCry ransomware attack.png|thumb|Countries initially affected |
[[File:Countries initially affected in WannaCry ransomware attack.png|thumb|Countries initially affected by the WannaCry ransomware attack]] |
||
One of the earliest |
One of the earliest and most notorious black hat hacks was the 1979 hacking of The Ark by [[Kevin Mitnick]]. The Ark computer system was used by [[Digital Equipment Corporation]] (DEC) to develop the [[RSTS/E]] operating system software. |
||
The notable [[data breach]]es typically |
The [[WannaCry ransomware attack|WannaCry ransomware]] attack in May 2017 is another example of black hat hacking. Around 400,000 computers in 150 countries were infected within two weeks. The creation of decryption tools by security experts within days limited the extortion payments to approximately $120,000, or slightly more than 1% of the potential payout.<ref>{{Cite web |date=2022-02-09 |title=What is WannaCry ransomware? |url=https://www.kaspersky.com/resource-center/threats/ransomware-wannacry |access-date=2022-11-27 |website=www.kaspersky.com |language=en}}</ref> |
||
The notable [[data breach]]es typically published by major news services are the work of black hat hackers. In a data breach, hackers can steal the financial, personal, or digital information of customers, patients, and constituents. The hackers can then use this information to smear a business or government agency, sell it on the dark web, or extort money from businesses, government agencies, or individuals.<ref>{{Cite web |last=Espinosa |first=Christian |date=2018-03-09 |title=Black Hat vs White Hat Hackers |url=https://www.alpinesecurity.com/blog/black-hat-vs-white-hat-hackers/ |access-date=2022-11-27 |website=Alpine Security |language=en-US}}</ref> The [[United States]] experienced a record number of 1,862 data breaches in 2021, according to the Identity Theft Resource Center's 2021 Data Breach Report. Data breaches have been on the rise for some time{{Clarify timeframe|date=December 2022}}. From 2013 to 2014, black hat hackers broke into [[Yahoo!|Yahoo]] and stole 3 billion customer records, making it possibly the largest data breach ever.<ref name=":3" /> In addition, the adult website [[Adult FriendFinder]] was hacked in October 2016, and over 412 million customer records were taken.<ref name=":3" /> A data breach that occurred between May and July 2017 exposed more than 145 million customer records, making the national credit bureau [[Equifax]] another victim of black hat hacking.<ref name=":3">{{Cite web |title=Biggest Data Breaches in US History [Updated 2022] {{!}} UpGuard |url=https://www.upguard.com/blog/biggest-data-breaches-us |access-date=2022-11-27 |website=www.upguard.com |language=en}}</ref> |
|||
== Strategies == |
== Strategies == |
||
=== Concealing === |
=== Concealing === |
||
One of the most famous black hat methods is to utilize nasty " |
One of the most famous black hat methods is to utilize nasty "[[doorway pages]]", which are intended to rank highly for specific search queries. Accordingly, the substance of these doorway pages is stowed away from both the clients and the web indexes. Doorway pages are designed to deceive search engines so that they cannot index or rank a website for synonymous keywords or phrases. |
||
=== Keyword stuffing === |
=== Keyword stuffing === |
||
Line 30: | Line 31: | ||
=== Shrouding === |
=== Shrouding === |
||
Shrouding involves showing different content to clients and web search tools. A website may present search |
Shrouding involves showing different content to clients and web search tools. A website may present [[search engine]]s with information irrelevant to the website's real content. This is done to boost the website's visibility in search results. |
||
=== Spamdexing === |
=== Spamdexing === |
||
Line 36: | Line 37: | ||
=== Unethical redirects === |
=== Unethical redirects === |
||
A [[URL redirection|redirect link]] is considered unethical if it takes the user to a webpage different from the one indicated in the link. For instance, it is unethical to have a link that should take the user to the website "ABC" |
A [[URL redirection|redirect link]] is considered unethical if it takes the user to a webpage different from the one indicated in the link. For instance, it is unethical to have a link that should take the user to the website "ABC" but instead takes them to "XYZ". Users are tricked into following an unintended path, even though they might not be interested in the website they land on. |
||
== Examples of famous black hats == |
== Examples of famous black hats == |
||
[[File:Kevin Mitnick ex hacker y ahora famoso consultor en redes en Campus Party México 2010.jpg|thumb|Kevin Mitnick]] |
[[File:Kevin Mitnick ex hacker y ahora famoso consultor en redes en Campus Party México 2010.jpg|thumb|Kevin Mitnick]] |
||
* [[Kevin Mitnick]] is one of the most well-known black hat hackers. At one point, he was the most wanted cybercriminal in the world. He hacked into over forty major corporations, including [[Motorola]] and [[IBM]], and even the US National Defense warning system. He was taken into custody and incarcerated in 1995. He became a cybersecurity consultant after his release in 2001, utilizing his hacking expertise for white hat hacking.<ref>{{Cite magazine |last=Greenberg |first=Andy |title=Kevin Mitnick, Once the World's Most Wanted Hacker, Is Now Selling Zero-Day Exploits |language=en-US |magazine=Wired |url=https://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/ |access-date=2022-11-27 |issn=1059-1028}}</ref> |
* [[Kevin Mitnick]] is one of the most well-known black hat hackers. At one point, he was the most wanted cybercriminal in the world. He hacked into over forty major corporations, including [[Motorola]] and [[IBM]], and even the US National Defense warning system. He was taken into custody and incarcerated in 1995. He became a cybersecurity consultant after his release in 2001, utilizing his hacking expertise for white hat hacking.<ref>{{Cite magazine |last=Greenberg |first=Andy |title=Kevin Mitnick, Once the World's Most Wanted Hacker, Is Now Selling Zero-Day Exploits |language=en-US |magazine=Wired |url=https://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/ |access-date=2022-11-27 |issn=1059-1028}}</ref> |
||
* [[Vladimir Levin|Vladimir |
* [[Vladimir Levin (hacker)|Vladimir Levin]] is a Russian hacker who, while working with a dial-up connection and a laptop from his [[Saint Petersburg]] apartment in 1994, accessed the accounts of several large corporate customers of [[Citibank]], stealing USD$10.7 million. He ended up spending three years in jail. However, in 2005, an anonymous hacker group claimed responsibility for the theft, stating that they only sold Vladimir the data needed to steal the money.{{Citation needed|date=November 2022}} |
||
== Other hat types == |
== Other hat types == |
||
=== White hat === |
=== White hat === |
||
An ethical security hacker is referred to as a [[White hat (computer security)|white hat]] or white hat hacker. The term "[[ethical hacking]]" is meant to mean more than just penetration testing. White hat hackers aim to discover any flaws in the current system with the owner's permission. Many organizations engage white hat hackers to enhance their network security through activities such as [[vulnerability assessment]]s. Their primary objective is to assist the organization.<ref>{{Cite journal | |
An ethical security hacker is referred to as a [[White hat (computer security)|white hat]] or white hat hacker. The term "[[ethical hacking]]" is meant to mean more than just penetration testing. White hat hackers aim to discover any flaws in the current system with the owner's permission. Many organizations engage white hat hackers to enhance their network security through activities such as [[vulnerability assessment]]s. Their primary objective is to assist the organization.<ref>{{Cite journal |last1=Banda |first1=Raphael |last2=Phiri |first2=Jackson |last3=Nyirenda |first3=Mayumbo |last4=Kabemba |first4=Monica M. |date=2019-03-07 |title=Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools |journal=Zambia ICT Journal |volume=3 |issue=1 |pages=40–51 |doi=10.33260/zictjournal.v3i1.74 |issn=2616-2156|doi-access=free }}</ref> While a black hat will illegally exploit a vulnerability or instruct others on how to do so, a white hat hacker will only exploit it with permission and will not reveal its existence until it has been fixed. Teams known as "sneakers and/or hacker clubs," "red teams," or "tiger teams" are also common among white-hat hackers.{{Citation needed|date=November 2022}} |
||
=== Grey hat === |
=== Grey hat === |
||
A [[grey hat]] is a hacker who typically does not have malicious intent but often violates laws or common ethical standards. A vulnerability will not be illegally exploited by a grey hat, nor will it instruct others on how to do so; however, the grey hat may trade this information for personal gain.<ref>{{Cite web |title=What is an ethical hacker and what does the work entail? |url=https://www.techtarget.com/searchsecurity/definition/ethical-hacker |access-date=2022-11-27 |website=SearchSecurity |language=en}}</ref> A special group of gray hats are [[Hacktivism|hacktivists]], who hack to promote social change.<ref name=":0" /> |
A [[grey hat]] is a hacker who typically does not have malicious intent but often violates laws or common ethical standards. A vulnerability will not be illegally exploited by a grey hat, nor will it instruct others on how to do so; however, the grey hat may trade this information for personal gain.<ref>{{Cite web |title=What is an ethical hacker and what does the work entail? |url=https://www.techtarget.com/searchsecurity/definition/ethical-hacker |access-date=2022-11-27 |website=SearchSecurity |language=en}}</ref> A special group of gray hats are [[Hacktivism|hacktivists]], who hack to promote social change.<ref name=":0" /> |
||
The ideas of "white hat" and "black hat" hackers led to the use of the term " |
The ideas of "white hat" and "black hat" hackers led to the use of the term "grey hat" at the end of the 1990s. |
||
Another difference between these types of hackers is how they find vulnerabilities. The black hat will break into any system or network to uncover sensitive information for personal gain, whereas the white hat does so at the request of their employer or with explicit permission to determine how secure it is against hackers. The grey hat typically possesses the white hat's skills and intentions |
Another difference between these types of hackers is how they find vulnerabilities. The black hat will break into any system or network to uncover [[Information sensitivity|sensitive information]] for personal gain, whereas the white hat does so at the request of their employer or with explicit permission to determine how secure it is against hackers. The grey hat typically possesses the white hat's skills and intentions and the black hat's disregard for permission or laws.<ref name=":1">{{Cite web |last=Luciano |first=Michael |date=2018-09-05 |title=What Are the Three Types of Hackers? |url=https://www.designworldonline.com/what-are-the-three-types-of-hackers/ |access-date=2022-11-27 |website=Design World |language=en-US}}</ref> A grey hat hacker might request organizations for voluntary compensation for their activities.<ref>{{Cite journal |last=Hanusch |first=Yonnique Francesca |date=2021-04-03 |title=Financial institutions should decline hackers' requests for voluntary compensation |url=http://dx.doi.org/10.1080/02580136.2021.1933733 |journal=South African Journal of Philosophy |volume=40 |issue=2 |pages=162–170 |doi=10.1080/02580136.2021.1933733 |s2cid=235676146 |issn=0258-0136}}</ref> |
||
==See also== |
==See also== |
Revision as of 17:07, 12 August 2024
A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identity theft. A Black hat is often referred to as a "cracker".[1]
The term originates from 1950s westerns, with "bad guys" (criminals) typically depicted as having worn black hats and "good guys" (heroes) wearing white ones. In the same way, black hat hacking is contrasted with the more ethical white hat approach to hacking. Additionally, there exists a third category, called grey hat hacking, characterized by individuals who hack, usually with good intentions but by illegal means.[2][3][4]
Description
Criminals who intentionally enter computer networks with malicious intent are known as "black hat hackers".[5] They may distribute malware that steals data (particularly login credentials), financial information, or personal information (such as passwords or credit card numbers). This information is often sold on the dark web. Malware can also be used to hold computers hostage or destroy files. Some hackers may also modify or destroy data in addition to stealing it. While hacking has become an important tool for governments to gather intelligence, black hats tend to work alone or with organized crime groups for financial gain.[2][6]
Black hat hackers may be novices or experienced criminals. They are usually competent infiltrators of computer networks and can circumvent security protocols. They may create malware, a form of software that enables illegitimate access to computer networks, enables the monitoring of victims' online activities, and may lock infected devices. Black hat hackers can be involved in cyber espionage or protests in addition to pursuing personal or financial gain.[7] For some hackers, cybercrime may be an addictive experience.[8][9]
History
One of the earliest and most notorious black hat hacks was the 1979 hacking of The Ark by Kevin Mitnick. The Ark computer system was used by Digital Equipment Corporation (DEC) to develop the RSTS/E operating system software.
The WannaCry ransomware attack in May 2017 is another example of black hat hacking. Around 400,000 computers in 150 countries were infected within two weeks. The creation of decryption tools by security experts within days limited the extortion payments to approximately $120,000, or slightly more than 1% of the potential payout.[10]
The notable data breaches typically published by major news services are the work of black hat hackers. In a data breach, hackers can steal the financial, personal, or digital information of customers, patients, and constituents. The hackers can then use this information to smear a business or government agency, sell it on the dark web, or extort money from businesses, government agencies, or individuals.[11] The United States experienced a record number of 1,862 data breaches in 2021, according to the Identity Theft Resource Center's 2021 Data Breach Report. Data breaches have been on the rise for some time[timeframe?]. From 2013 to 2014, black hat hackers broke into Yahoo and stole 3 billion customer records, making it possibly the largest data breach ever.[12] In addition, the adult website Adult FriendFinder was hacked in October 2016, and over 412 million customer records were taken.[12] A data breach that occurred between May and July 2017 exposed more than 145 million customer records, making the national credit bureau Equifax another victim of black hat hacking.[12]
Strategies
Concealing
One of the most famous black hat methods is to utilize nasty "doorway pages", which are intended to rank highly for specific search queries. Accordingly, the substance of these doorway pages is stowed away from both the clients and the web indexes. Doorway pages are designed to deceive search engines so that they cannot index or rank a website for synonymous keywords or phrases.
Keyword stuffing
Another form of black hat search engine optimization (SEO) is known as keyword stuffing, which involves repeatedly using the same keywords to try to trick search engines. This tactic involves using irrelevant keywords on a webpage (such as on the homepage or in metadata tags) to make it appear more relevant for particular keywords, deceiving people who visit the site.[13]
Link farming
Link farming occurs when multiple websites or pages link to a particular website. This is done to profit from the pay-per-click (PPC) advertisements on these websites or pages. The issue is that the links only point to the specific website because it promises something in return, when in fact they are only there to increase traffic to the desired website and its popularity. These websites are unethical and will damage the credibility of the website's other pages, possibly reducing its income potential.
Shrouding
Shrouding involves showing different content to clients and web search tools. A website may present search engines with information irrelevant to the website's real content. This is done to boost the website's visibility in search results.
Spamdexing
Spamdexing is a form of black hat SEO that involves using software to inject backlinks to a website into search engine results. This is done solely to raise the website's ranking in search engines.
Unethical redirects
A redirect link is considered unethical if it takes the user to a webpage different from the one indicated in the link. For instance, it is unethical to have a link that should take the user to the website "ABC" but instead takes them to "XYZ". Users are tricked into following an unintended path, even though they might not be interested in the website they land on.
Examples of famous black hats
- Kevin Mitnick is one of the most well-known black hat hackers. At one point, he was the most wanted cybercriminal in the world. He hacked into over forty major corporations, including Motorola and IBM, and even the US National Defense warning system. He was taken into custody and incarcerated in 1995. He became a cybersecurity consultant after his release in 2001, utilizing his hacking expertise for white hat hacking.[14]
- Vladimir Levin is a Russian hacker who, while working with a dial-up connection and a laptop from his Saint Petersburg apartment in 1994, accessed the accounts of several large corporate customers of Citibank, stealing USD$10.7 million. He ended up spending three years in jail. However, in 2005, an anonymous hacker group claimed responsibility for the theft, stating that they only sold Vladimir the data needed to steal the money.[citation needed]
Other hat types
White hat
An ethical security hacker is referred to as a white hat or white hat hacker. The term "ethical hacking" is meant to mean more than just penetration testing. White hat hackers aim to discover any flaws in the current system with the owner's permission. Many organizations engage white hat hackers to enhance their network security through activities such as vulnerability assessments. Their primary objective is to assist the organization.[15] While a black hat will illegally exploit a vulnerability or instruct others on how to do so, a white hat hacker will only exploit it with permission and will not reveal its existence until it has been fixed. Teams known as "sneakers and/or hacker clubs," "red teams," or "tiger teams" are also common among white-hat hackers.[citation needed]
Grey hat
A grey hat is a hacker who typically does not have malicious intent but often violates laws or common ethical standards. A vulnerability will not be illegally exploited by a grey hat, nor will it instruct others on how to do so; however, the grey hat may trade this information for personal gain.[16] A special group of gray hats are hacktivists, who hack to promote social change.[3]
The ideas of "white hat" and "black hat" hackers led to the use of the term "grey hat" at the end of the 1990s.
Another difference between these types of hackers is how they find vulnerabilities. The black hat will break into any system or network to uncover sensitive information for personal gain, whereas the white hat does so at the request of their employer or with explicit permission to determine how secure it is against hackers. The grey hat typically possesses the white hat's skills and intentions and the black hat's disregard for permission or laws.[4] A grey hat hacker might request organizations for voluntary compensation for their activities.[17]
See also
References
- ^ Sheikh, Ahmed (2021), "Introduction to Ethical Hacking", Certified Ethical Hacker (CEH) Preparation Guide, Berkeley, CA: Apress, pp. 1–9, doi:10.1007/978-1-4842-7258-9_1, ISBN 978-1-4842-7257-2, S2CID 239755067, retrieved 2024-03-08
- ^ a b "What is a Black-Hat hacker?". www.kaspersky.com. 2022-02-09. Retrieved 2022-11-27.
- ^ a b testovaniebezpecnosti (2017-11-10). "Hackers are not just the bad guys – brief history and classification". HackTrophy (in Slovak). Retrieved 2022-11-27.
- ^ a b Luciano, Michael (2018-09-05). "What Are the Three Types of Hackers?". Design World. Retrieved 2022-11-27.
- ^ "Black hat, White hat, and Gray hat hackers – Definition and Explanation". www.kaspersky.com. 2022-05-11. Retrieved 2022-11-27.
- ^ "Kevin Mitnick - Once the world's most wanted hacker, now he's getting paid to hack companies legally | Black Hat Ethical Hacking | Black Hat Ethical Hacking". 2020-09-14. Retrieved 2024-01-09.
- ^ "What is a black hat hacker?". SearchSecurity. Retrieved 2022-11-27.
- ^ "Teen hackers study considers link to addiction". BBC News. 2016-10-24. Retrieved 2024-08-12.
- ^ "How European authorities want to tackle child hacking". euronews. 2023-06-12. Retrieved 2024-08-12.
- ^ "What is WannaCry ransomware?". www.kaspersky.com. 2022-02-09. Retrieved 2022-11-27.
- ^ Espinosa, Christian (2018-03-09). "Black Hat vs White Hat Hackers". Alpine Security. Retrieved 2022-11-27.
- ^ a b c "Biggest Data Breaches in US History [Updated 2022] | UpGuard". www.upguard.com. Retrieved 2022-11-27.
- ^ "Black hat SEO". Twaino. 2022-06-06. Retrieved 2022-11-27.
- ^ Greenberg, Andy. "Kevin Mitnick, Once the World's Most Wanted Hacker, Is Now Selling Zero-Day Exploits". Wired. ISSN 1059-1028. Retrieved 2022-11-27.
- ^ Banda, Raphael; Phiri, Jackson; Nyirenda, Mayumbo; Kabemba, Monica M. (2019-03-07). "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools". Zambia ICT Journal. 3 (1): 40–51. doi:10.33260/zictjournal.v3i1.74. ISSN 2616-2156.
- ^ "What is an ethical hacker and what does the work entail?". SearchSecurity. Retrieved 2022-11-27.
- ^ Hanusch, Yonnique Francesca (2021-04-03). "Financial institutions should decline hackers' requests for voluntary compensation". South African Journal of Philosophy. 40 (2): 162–170. doi:10.1080/02580136.2021.1933733. ISSN 0258-0136. S2CID 235676146.