Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 098

Black Hat Hacker

What is Black Hat Hacker?

Black Hat HackerA malicious threat actor who breaks into systems without authorization for personal gain, ideology, or harm, in violation of computer-crime laws.


A black hat hacker is a person who uses offensive computing skills illegally, accessing or damaging systems and data without permission from the owner. Their motives include financial gain (ransomware affiliates, banking-trojan operators, fraud rings), espionage (nation-state contractors), notoriety, revenge, or ideology. Black hats typically operate outside any contractual scope, ignore disclosure ethics, and weaponize stolen data through extortion, resale on dark-web markets, or destructive operations. Their actions are prosecutable under laws such as the U.S. CFAA, the U.K. Computer Misuse Act, the EU NIS2 framework, and equivalent legislation. Defenders track their TTPs through cyber threat intelligence, MITRE ATT&CK, and incident response.

Examples

  1. 01

    A black hat hacker selling stolen corporate VPN credentials on a dark-web initial-access market.

  2. 02

    A black hat group deploying ransomware on a hospital network and demanding payment.

Frequently asked questions

What is Black Hat Hacker?

A malicious threat actor who breaks into systems without authorization for personal gain, ideology, or harm, in violation of computer-crime laws. It belongs to the Defense & Operations category of cybersecurity.

What does Black Hat Hacker mean?

A malicious threat actor who breaks into systems without authorization for personal gain, ideology, or harm, in violation of computer-crime laws.

How does Black Hat Hacker work?

A black hat hacker is a person who uses offensive computing skills illegally, accessing or damaging systems and data without permission from the owner. Their motives include financial gain (ransomware affiliates, banking-trojan operators, fraud rings), espionage (nation-state contractors), notoriety, revenge, or ideology. Black hats typically operate outside any contractual scope, ignore disclosure ethics, and weaponize stolen data through extortion, resale on dark-web markets, or destructive operations. Their actions are prosecutable under laws such as the U.S. CFAA, the U.K. Computer Misuse Act, the EU NIS2 framework, and equivalent legislation. Defenders track their TTPs through cyber threat intelligence, MITRE ATT&CK, and incident response.

How do you defend against Black Hat Hacker?

Defences for Black Hat Hacker typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Black Hat Hacker?

Common alternative names include: Black-hat, Malicious hacker, Cybercriminal.

Related terms

See also