State—backed states illegally use hackers to interfere in the internal affairs of other states.

State—backed states illegally use hackers to interfere in the internal affairs of other states.

Brutforsers — organize botnets (a network of computers controlled by hackers) to select passwords by brute force, brute force (from the English brute force — brute force). The owners of infected computers do not even suspect that their devices have been hacked by a virus and are being used by someone for their own purposes.
Game crackers — steal valuable game items and resources from online game players in order to resell them for real money.
Cryptocurrency hunters are a relatively new species, specializing in hacking crypto wallets and smart contracts. Also, this category includes hackers of PCs and phones for the purpose of installing and executing software for background mining of crypts.
There are several other types of hackers that I have not included in the classification, but which need to be mentioned.

Script kiddie are those who use ready-made scripts or other third—party tools to carry out hacker attacks, while often not understanding the principles of the algorithms used. Simply put, this is an unqualified hacker who does not want to study and does not accept hacker ethics.

In connection with such precedents, the term “cyberwar” appeared.

Cyberwar is one of the types of information warfare, when military actions are carried out not physically, but electronically, computers and the Internet are the weapons in this war. This is the most secretive part of the underground, which often disguises itself as other criminal groups to disguise its true motives, for example, portraying itself as hacktivists or harmless geeks.