By now it should be clear how taking a realistic and truthful snapshot of the hacker underground isn’t simple. Th ere are many factors that need to be taken into account, and diff erent points of view and approaches to follow in order to examine diff erent situations and motives. Meanwhile, though, the world of hacking is changing, evolving, and growing in a complex way, and hierarchically too, every day, marking the rhythm for the world of information security, which is evolving in turn.