Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Fortinet 970x120px
Hackers: Who They Are, What They Do, and Their Role in Today’s World

Hackers: Who They Are, What They Do, and Their Role in Today’s World

Massimiliano Brolli : 11 November 2025 12:42

The meaning of ” hacker ” has deep roots. It derives from the English “to hack,” meaning to chip away, cut, strike, or cut. It’s a powerful image, that of a farmer breaking up clods of earth with his rough hoe, revealing what lies beneath the surface. Likewise, a hacker can explore the darkest recesses, challenging their limits and bringing to light powerful innovations unlike anything anyone has ever seen before.

But who are hackers really?

In this article, we’ll explore the hacker from every angle. We’ll look at who they are, their motivations, and their role in today’s digital world. We’ll uncover their impact on cybersecurity, distinguishing between those working to build a more secure digital environment and those who threaten it.

The Meaning of Hacker

The term “hacker” conjures up images of enigmatic figures. Sometimes they’re idolized as brilliant innovators, other times demonized as digital threats. This duality reflects the complexity of those who possess deep knowledge in a field and an extraordinary capacity for lateral thinking . This ability allows them to solve problems with new and unconventional perspectives.

The crucial difference lies in intent . Some hackers use their skills to protect, improve, and innovate. Others exploit them to destroy, steal, or sabotage . Like physics, which can illuminate with nuclear energy or devastate with an atomic bomb, hacking is a powerful and neutral tool. Its impact depends solely on how it is used.

Hacking isn’t limited to the digital world . It’s an art that spans every human discipline. When a person pushes the boundaries of what’s known and breaks convention with ingenuity and creativity, they embody the true spirit of hacking . They become innovators in their field.

Being a hacker means challenging the status quo. It means looking for solutions where others see problems . It’s a skill that pushes you to overcome barriers, creating new possibilities . And it’s precisely this vision that, for better or worse, has the power to change the world.

And it has always changed the world.

A multidisciplinary ability to “break the mold”

Hacking is therefore a form of thinking that transcends traditional boundaries . It is the art of reinvention, of discovering new ways where others see insurmountable barriers. In mathematics, it can mean finding an elegant proof for a complex problem. In physics, it can mean discovering unexpected applications of known laws. In politics, it can mean redefining the concept of participation or governance. Even in music, hacking manifests itself in experimenting with new sounds and compositional techniques .

This ability to break the mold makes hacking a transversal force , capable of applying itself wherever there are rules, structures, or systems. It is a driver of progress, but also a critical lens that allows us to question what is taken for granted. When conventions become constraints, hacking challenges them, paving the way for innovation.

Beethoven: The Music Hacker

An extraordinary example of hacking in the world of music is Ludwig van Beethoven , who broke every rule and created compositions the world had never heard before. His Ninth Symphony , written when he was completely deaf , represents one of the greatest musical works in history. Beethoven “hacked” the language of music, overcoming the limitations imposed by his physical condition and reinventing the very structure of the symphony. His ability to create something absolutely new, starting from an extremely difficult context, consecrates him as a true art hacker.

A portrait of Ludwig van Beethoven in 1820

Gorbachev: The Hacker of Politics

In the world of politics, a great example of hacking for good is Mikhail Sergeyevich Gorbachev , the last leader of the Soviet Union. Gorbachev “hacked” the rigid Soviet political system through his radical reforms, such as glasnost (transparency) and perestroika (restructuring). These changes destabilized communism from within, bringing greater openness and modernization to a system known for its closed-mindedness and rigidity. His revolutionary vision contributed to the end of the Cold War, demonstrating how political hacking can radically transform the course of history.

Hitler: The Evil Hacker of Propaganda

Hacking, however, isn’t always for good. Adolf Hitler is an example of how this ability can be used destructively . Hitler skillfully exploited the weaknesses of the Weimar Republic’s democratic system, manipulating propaganda, information control, and fear to consolidate his power. Like a hacker finding a flaw in a system, Hitler identified and exploited the social and institutional vulnerabilities of his time, transforming democracy into a totalitarian dictatorship with devastating consequences.

The ability to “hack” goes beyond technology: it manifests itself wherever there is a system, a rule, or a convention to be overcome. Mathematicians who revolutionize theorems, physicists who redefine the laws of the universe, artists who create new expressive languages: all these individuals are, in their own way, hackers.

A rally in Nuremberg , where Adolf Hitler had massive propaganda demonstrations organised using imposing stage sets designed by architect Albert Speer in a designated area of the city.

But like any great skill, hacking carries inherent risk. It’s a neutral tool, one that can be used to build or destroy, to innovate or manipulate. Understanding this duality is crucial to recognizing the value of hacking in all its forms and addressing the challenges it poses.

The motivations behind hacking

At the root of hacking is often a pure, intrinsic motivation: curiosity .

Hackers are driven by the desire to explore complex systems, discover how they work, and identify ways to overcome or improve them. As we saw at the beginning, a farmer armed with his “mighty hoe” tries to turn the soil, so hackers seek to understand things from the inside out in order to then improve and overcome them . For many, it’s a form of intellectual challenge that stimulates ingenuity and allows them to acquire advanced technical skills.

Curiosity is the basis of everything

This curiosity is closely related, though not exclusively, to a love of technology. Passionate hackers see code as a universal language and computer systems as puzzles to be solved. For them, the line between play and work is blurred: hacking becomes an art and a way to express one’s creativity. A great hacker, Richard Stallman, said , “Playfully doing something difficult, whether it’s useful or not, that’s hacking.”

Richard Stallman is an American programmer and activist, known as the founder of the free software movement. In 1983, he launched the GNU Project, which aimed to create a completely free operating system. In 1985, he published the famous GNU General Public License (GPL), which promoted the freedom to use, modify, and distribute software.

Lateral thinking enriches curiosity

A common trait among many hackers is lateral thinking , a way of reasoning that leads them to solve problems in unconventional ways. This approach helps them generate innovation, often finding unique and unexpected solutions . Overcoming technological obstacles, exploring new frontiers, and breaking the rules is what drives many hackers to excel in their field.

Another relevant aspect concerns the similarity between hacking and Asperger’s syndrome , an autism spectrum disorder that leads to intense concentration on specific tasks. Hackers, often afflicted by this syndrome, tend to focus exclusively on computers and information systems, dedicating hours, days, and sometimes weeks to solving complex problems. This behavior makes them particularly skilled at solving technical puzzles and deeply understanding how systems work, driving them to create innovative solutions.

Hacker and the History of Computer Science

The word “hacker” is often misunderstood, associated exclusively with illicit or malicious activities. In reality, the concept of hacking originated as a skill , a demonstration of ingenuity and intelligence to overcome obstacles or innovate creatively. This ability can be used for both constructive and destructive purposes, but at its core is always the art of exploring, understanding, and improving systems, maximizing their potential.

The MIT Tech Model Railroad Club

Hacker culture originated within the Tech Model Railroad Club (TMRC) at MIT , a student workshop for model railroad enthusiasts. Here, in the 1950s, figures like Peter Samson, Jack Dennis, and Alan Kotok (TMRC members) enjoyed modifying and improving the complex systems of electric trains, experimenting with new methods to control their movements. In club parlance, the term “hack” referred to an ingenious solution to overcome a technical problem or improve a system.

With the arrival of computers on campus, these same members shifted their curiosity and skills to calculators. Hacking pioneers began exploring computers not to destroy them, but to better understand them, pushing their limits to explore new possibilities. Among these, Richard Greenblatt stands out , considered one of the first hackers in history, who contributed to the creation of complex and innovative programs.

The hacker movement didn’t stop at toy trains or calculators. With the work of figures like Professor John McCarthy at MIT, a new frontier opened up: artificial intelligence. McCarthy, one of the fathers of AI, demonstrated how hackers’ innovative thinking could be applied to develop systems capable of simulating human reasoning.

An image of the Tech Model Railroad Club (TMRC) at the Massachusetts Institute of Technology (MIT) in Boston where early hackers, using a PDP-1 computer donated by DEC, began experimenting with software applied to the large model train layout.

The Perpetual Intertwining of Good and Evil

Today, the myth of the hacker is rooted in this culture of exploration and experimentation. The term doesn’t define a criminal, but a brilliant mind, capable of tackling complex problems with intelligent solutions. However, like any skill, hacking can be used for different purposes: some use these skills to protect systems and build technological innovations, while others employ them to violate, steal, or destroy.

This duplicity is what makes the world of hackers so fascinating and, at the same time, controversial.

Symbolism and hacker culture. Yin and yang and the state of equality, the concept of “ouroboros” : evil and good intertwine in an eternal cycle where one cannot exist in the essence of the other.

Hackers in IT

The history of hackers is closely tied to this duality, recalling the ancient philosophy of yin and yang . Good and evil intertwine and form an ouroboros, the serpent biting its own tail, symbolizing the eternal cycle of creation and destruction. Good cannot exist without evil, and vice versa: every advance in cybersecurity often arises in response to a threat, just as every sophisticated attack stimulates the development of new defensive technologies.

Since the dawn of the digital age, the figure of the hacker has embodied this ambivalence. In the early 1960s and 1970s, hackers were often students or university researchers who experimented with computers to improve their functionality (as seen in the Tech Model Railroad Club in the previous chapter). Their actions were driven by curiosity, innovation, and a desire to share knowledge. However, as technology evolved, some began to exploit their skills for personal gain, giving rise to the dark side of hacking.

Difference between Black, Gray, and White Hat Hacker

Hackers are divided into several categories, each with a distinct bias towards the legality and ethics of their actions. On one side, there are ethical hackers, who work to protect companies and governments from cyberattacks, and on the other, criminal hackers who exploit the same skills to gain illicit gains.

Breakdown by propensity of computer hackers.

Among these, there is an intermediate figure: gray hat hackers , who walk a tightrope, using their ingenuity to find flaws in systems, but sometimes breaking laws or violating ethical boundaries.

  • White Hat : Ethical hackers who use their skills to improve system security. They work with the permission of companies and governments, conducting activities such as penetration testing and security audits to identify and fix vulnerabilities before they are exploited by malicious attackers.
  • Black Hat : Criminal hackers who use the same hacking techniques, but for malicious purposes. They engage in cyber attacks, theft of sensitive data, extortion, and fraud. Black Hats operate without the consent of those who own the systems and seek personal or financial gain.
  • Gray Hat : These hackers fall somewhere in between White Hats and Black Hats . While they possess strong ethics and motivations similar to those of ethical hackers, they sometimes take actions that break laws or ethical norms . For example, they may discover vulnerabilities in a system without the owner’s permission, but not for profit, but rather to highlight security flaws and contribute to the overall improvement of systems.

Profit Hackers, State Hackers, and Cyber Hacktivism

Hackers are one of the most fascinating and controversial figures of the digital age. Their actions can be driven by a variety of motivations, ranging from pure curiosity and passion for technology to economic, political, or ideological ends. Understanding what drives hackers is crucial to understanding the many facets of this universe.

Cyber hackers who use their skills to break into systems and wreak havoc can be divided into three main groups: “profit criminals,” “state hackers,” and finally, cyber “hacktivists.”

Cybercriminals for Profit

Not all hackers are driven by curiosity or experimentation: some are motivated by financial reasons , and this is where “cybercrime” comes from. This subgroup is divided into individuals or highly organized groups, often structured like black market companies.

Profit-driven cybercriminals aim to exploit system vulnerabilities to extort money or steal data. Among the most notorious groups are LockBit, Qilin , and Stormous. These groups are known for targeted attacks against companies, institutions, and critical infrastructure. They operate with a clear business model, often using Ransomware-as-a-Service (RaaS). This allows even less experienced criminals to engage in cybercrime and extort money.

Their motivations are financial. The promise of quick profits, supported by the anonymity of the dark web and cryptocurrencies, makes them a growing threat. Their motto is: less effort, maximum returns.

State Hacker

Another significant category is that of state-sponsored hackers (often also referred to as APT groups, or Advanced Persistent Threat groups) . These are individuals or groups that operate on behalf of governments to pursue strategic objectives. These hackers are instruments of geopolitical power, used to steal intellectual property, sabotage critical infrastructure, or influence public opinion through disinformation.

National State Actors

These include hackers recruited directly by governments or intelligence agencies , as well as groups affiliated with state entities. These affiliations are particularly advantageous when it comes to attributing responsibility for an attack, as they allow for a degree of ambiguity. In many cases, it can be argued that the accusations are unfounded or part of a disinformation or media warfare strategy. Examples of these groups include:

  • Equation Group , APT-C-39 , Umbrage (associated with the United States of America)
  • Lazarus , Thallium (associated with North Korea)
  • Sandworm , Fancy Bear , Cozy Bear (associated with the Russian Federation)
  • APT13 , APT18 , APT24 (associated with the People’s Republic of China)

Just to name a few.

Edward Snowden, a former US hacker (now residing in Russia), revealed NSA practices related to the FISA law and Section 702. This section, often contested and extended, allows US intelligence agencies to collect foreign communications, except those protected by legal or constitutional privilege.

Edwared Snowden and Datagate

A prime example is Edward Snowden , the former US National Security Agency (NSA) hacker who exposed the global surveillance program known as Datagate . His revelations exposed the extent of US espionage operations, demonstrating how every nation has legions of hackers ready to engage in what is now defined as espionage and cyberwarfare .

From Russia to China, from the United States to Iran, cyberspace has become a new theater of global conflict, where hackers can conduct digital attacks to destabilize economies and influence political decisions.

The Guy Fawkes mask has become the iconic symbol of the hackers Anonymous and the film V for Vendetta due to its powerful symbolic meaning of rebellion and the fight against oppression. Guy Fawkes was a member of a group of conspirators who attempted to blow up the British Parliament in 1605, intending to overthrow the government and restore a Catholic regime.

Cyber Hacktivism

Finally, there is a category of hackers driven by political or ideological motivations : hacktivists . Hacktivism (a portmanteau of the words “hacking” and “activism”) is a form of protest used by individuals or groups who use their computer skills to support specific causes, often against governments, corporations, or organizations they consider oppressive or unjust.

A prime example is Anonymous , the decentralized hacker collective known for its Guy Fawkes mask. Inspired by the film ” V for Vendetta ,” these hackers have ranged from denouncing human rights violations to fighting censorship, with operations such as protesting the Church of Scientology or attacking government websites in response to controversial policies.

Cyber hacktivism demonstrates that hacking can be a powerful tool for social struggle, giving voice to those who oppose systems they perceive as oppressive. However, as with any form of hacking, the intent is not always clear, and the consequences can be controversial.

An Evolving Universe

Curiosity, profit, and activism are the primary motivations that drive hackers to act. While these categories help us understand the different dynamics of hacking, the lines between them are often blurry. Hackers, like the systems they explore, are complex and constantly evolving. Interpreting their motivations requires a deep and multifaceted perspective, capable of grasping both the opportunities and risks of this modern “skill.”

The importance of cybersecurity education

Between Ethical Hackers and Criminals: The Most Famous Hackers in Computer Science

As we’ve seen, ethical and criminal hackers share the same skills, but differ in motivations, intentions, and consequences. Both manipulate and exploit vulnerabilities in systems, but their intent distinguishes cybersecurity “heroes” from “cybercriminals.”

Ethical hackers are professionals who use their skills to improve security and protect data. Driven by technological curiosity, they work legally for government agencies, companies, and non-profit organizations. Their goal is to solve problems and identify vulnerabilities, helping to make systems more secure. Ethical hackers operate with the permission of the system owner, often through penetration testing.

The most famous ethical hackers

Criminal (or “black hat”) hackers use their skills illegally, for profit, revenge, or protest. They violate privacy, steal information, and cause enormous economic damage. Some operate alone, others as part of groups, such as ransomware gangs. Their goal is to exploit vulnerabilities for their own benefit, with no regard for security. Here are some of the most well-known ethical hackers:

  • Richard Greenblatt : An early member of the Tech Model Railroad Club (TMRC) at MIT and a pioneer in computer science and artificial intelligence, Greenblatt played a significant role in creating interactive systems and games that were precursors to AI.
  • Marcus Hutchins : Known for stopping the WannaCry ransomware attack in 2017, Hutchins initially became involved in hacking during his youth, but later changed direction, becoming a respected security researcher and consultant.
  • Mudge (Peiter Zatko) : A member of L0pht, a hacker group that raises awareness about cybersecurity. Mudge worked for DARPA (Defense Advanced Research Projects Agency) as a cybersecurity expert.
  • George Hotz (aka “GeoHot”) : He became famous for being the first to jailbreak an iPhone. This allowed users to unlock the device and install applications unauthorized by Apple. Initially known for his controversial activities, Hotz later worked as a security researcher for several companies. He contributed to research into computer vulnerabilities. Despite his background as a black hat hacker, Hotz has directed his skills toward more ethical pursuits, becoming an expert in the field of security.

The Most Famous Criminal Hackers and Their Transformation

Many criminal hackers, after being arrested, have managed to redeem themselves and become security experts. Here are some of the most notorious criminal hackers who have managed to transform themselves:

  • Kevin Mitnick : One of the world’s most famous hackers, Mitnick was arrested in 1995. He hacked into the systems of major corporations and government agencies. After serving his sentence, he became an internationally renowned security consultant, helping companies secure their computer systems.
  • Gary McKinnon : In 2002, McKinnon hacked into NASA and the Pentagon computers, seeking information on UFOs. His activities led to the discovery of vulnerabilities in government systems. Despite the charges, his extradition to the United States was blocked, and his story highlighted the need to improve the security of sensitive systems.
  • Jonathan James : The first minor arrested for cybercrime in the United States. Famous for hacking NASA systems in 1999, stealing sensitive data related to space missions. James’s story is followed by an incredible tale of youth, but also a dramatic end, as he committed suicide in 2008, at just 25 years old.
  • Albert Gonzalez : Known for being one of the leaders of one of the largest credit card theft operations in history. With the help of a group of hackers, Gonzalez stole millions of data from companies such as TJX and Heartland Payment Systems, causing enormous economic damage. Arrested in 2008, he was sentenced to 20 years in prison.

These hackers, despite having a criminal past, have turned their experiences into a positive career, contributing to the protection of global digital infrastructure.

Conclusions

The world of hackers is complex and multifaceted. It’s a microcosm where motivations, ethics, and intent intertwine. This gives rise to a variety of players, from cybersecurity champions to cybercriminals. What emerges is how the same skills can be used for constructive or destructive purposes, depending on the circumstances and individual choices.

Ethical hackers, driven by curiosity and a desire to improve system security, position themselves as allies in the fight against cyber threats. Their work is essential to protecting sensitive information and ensuring the secure operation of digital infrastructures. This goal has taken on growing importance in an increasingly connected world.

On the other hand, criminal hacker groups, with their devastating actions, continue to pose a real threat to businesses, governments, and individuals. Despite the differences between ethical and criminal hackers, it’s interesting to observe how some of the latter, after having embarked on a criminal career, can redeem themselves and become respected cybersecurity experts, demonstrating that the line separating “good” from “bad” is not always clear.

In the future, the figure of the hacker will likely continue to evolve, remaining at the center of debates on security, ethics, and digital law.

Ultimately, it is ethics that defines the direction of our actions, transforming the power of technology into an instrument of progress or destruction.

Immagine del sitoMassimiliano Brolli
Responsible for the RED Team and Cyber Threat Intelligence of a large Telecommunications company and 4G/5G cyber security labs. He has held managerial positions ranging from ICT Risk Management to software engineering to teaching in university master's programs.

Lista degli articoli
Visita il sito web dell'autore