TOPMOST HACKERS IN THE WORLD OF ALL TIME

HACKING IS AN ART


Kevin Mitnick

The Darkside Hacker Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author and hacker.
He was once the most wanted cybercriminal in the world. He had an obsession with computers that escalated into a two and half year hacking spree where he stole millions of dollars of corporate secrets from IBM, Motorola, telecom companies and even the National Defense warning system.
At age 15, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After a friendly bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering later became his primary method of obtaining information, including user names and passwords and modem phone numbers. Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He
broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.
According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended on February 15, 1995, in Raleigh, North Carolina. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification. In 1999, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Since 2000, Mitnick has been a paid security consultant, public speaker and author. He does security consulting for Fortune 500 companies, performs penetration testing services for the world’s largest companies and teaches Social Engineering classes to dozens of companies and government agencies.

Vladimir Levin

First internet bank robber. He is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently transfer USD 10.7 million via Citibank’s computers. He was delivered into U.S. custody in September 1997 and tried in the United States District Court for the Southern District of New York. In his plea agreement, he admitted to only one count of conspiracy to defraud and to stealing US$3.7 million. In February 1998 he was convicted and sentenced to three years in jail, and ordered to make restitution of US$240,015. Citibank claimed that all but US$400,000 of the stolen US$10.7 million had been recovered.
In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market. According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them. ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. Arkanoid's group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. One of them later handed over the crucial access data to Levin (reportedly for the
stated $100).
In 2005 an anonymous hacker group came claiming that they were the ones truly responsible for the theft and that they only sold Vladimir the data needed to steal the money.

Gary Mckinnon

 He was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13-month period from February 2001 to March 2002, illegally gained access to 97
computers belonging to the U.S. Armed Forces and NASA. He claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.
Being of Scottish descent and operating out of the United Kingdom, he was able to dodge the American government for a time. As of today, he continues to fight against extradition to the United States.

Mathew Bevan and Richard Pryce 

This British hacking duo took the U.S. government for a ride when they attacked the Pentagon’s network for several weeks in 1994. They copied battlefield simulations from Griffiss Air Force Base in New York, intercepted messages from U.S. agents in North Korea, and got access into a Korean nuclear facility. Pryce was a 16-year-old then, and Bevan was 21 (he’s thought to have been tutoring Pryce).
The hacking attacks were especially troublesome for the U.S. government because they couldn’t tell if the duo was using their system to hack into a South or North Korea - if it were North Korea, the attacks could’ve been seen as an act of war. Luckily, South Korea was the hackers’ target, and after an international investigation, they were arrested in the following year.

Michael Calce

He was a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN. He also launched a series of failed simultaneous attacks against 9 of the 13 root name servers.
On February 7, 2000, Calce targeted Yahoo! with a project he named Rivolta, meaning “riot” in Italian. Rivolta was a denial-of-service attack in which servers become overloaded with different types of communications to the point where they shut down completely. At the time, Yahoo! was a multibillion-dollar web company and the top search engine. Mafiaboy’s Rivolta managed to shut down Yahoo! for almost an hour. Calce’s goal was, according to him, to establish dominance for himself and TNT, his cybergroup, in the cyberworld. Buy.com was shut down in response. Calce responded to this in turn by
bringing down Ebay, CNN, Amazon and Dell.com via DDoS over the next week.
In a 2011 interview, Calce tried to redeem his image by saying that the attacks had been launched unwittingly, after inputting known addresses in a security tool he had downloaded from a repository on the now-defunct file-sharing platform Hotline, developed by Hotline Communications. Calce would then have left for school, forgetting the application which continued the attacks during most of the day. Upon coming home Calce found his computer crashed, and restarted it unaware of what had gone on during the day. Calce claimed when he overheard the news and recognized the companies mentioned being those he had inputted earlier in the day that he “started to understand what might have happened”.

Adrian Lamo

He was a mobile hacker who launched his work from the confines of Internet cafes, libraries or coffee shops. He actually did it just as a challenge and for fun, as he would regularly break into computer systems and then immediately tell the owner of the network about its vulnerability. He even made himself an expert by adding his name to the database of the New York Times.
Lamo first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo!, and Microsoft, culminating in his 2003 arrest. In 2010, Lamo reported U.S. soldier PFC Bradley Manning (now known as Chelsea Manning) to federal authorities, claiming that Manning had leaked hundreds of thousands of sensitive U.S. government documents to WikiLeaks. Manning was arrested and incarcerated in the U.S. military justice system and later sentenced to 35 years in confinement.

Jeanson James Ancheta

He became the first person to be charged for controlling large numbers of hijacked computers or botnets on May 9, 2006.
In 2004 he started to work with botnets rxbot, a computer worm that can spread his net of infected computers which gave him control to 500,000 computers including US military computers.
In November 2005 he was captured in an elaborate sting operation when FBI agents lured him to their local office on the pretext of collecting computer equipment. The arrest was part of the Operation Bot Roast.
On May 9, 2006 Ancheta pleaded guilty to four felony charges of violating United States Code Section 1030, Fraud and Related Activity in Connection with Computers. Ancheta must serve 60 months in prison, forfeit a 1993 BMW and more than $58,000 in profit. He must also pay restitution of $15,000 US to the U.S. federal government for infecting the military computers.

Jonathan James

He (December 12, 1983 – May 18, 2008) was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing.What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S.
Department of Defense, and NASA.
Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000.
The story of James has a tragic ending, however. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit.

Albert Gonzalez

He paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.
He started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen.
The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).

Kevin Poulsen

He gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.”
He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution.
Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.

Anonymous

The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets.
Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.
Anonymous originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.
Beginning with 2008’s Project Chanology—a series of protests, pranks, and hacks targeting the Church of Scientology—the Anonymous collective became increasingly associated with collaborative hacktivism on a number of issues internationally. Individuals claiming to align themselves with Anonymous undertook protests and other actions (including direct action) in retaliation against anti-digital piracy campaigns by motion picture and recording industry trade associations.
In 2012, Time called Anonymous one of the “100 most influential people” in the world.Anons have publicly supported WikiLeaks and the Occupy movement. Related groups LulzSec and Operation AntiSec carried out cyberattacks on US government agencies, media, video game companies, military contractors, military personnel, and police officers, resulting in the attention of law enforcement to the groups’ activities. It has been described as being anti-Zionist, and has threatened to erase Israel from the Internet and engaged in the “#OpIsrael” cyber-attacks of Israeli websites on Yom HaShoah (HolocaustRemembrance Day) in 2013.

LulzSec

LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news.Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.
One of the founders of LulzSec was a computer security specialist who used the online moniker Sabu. The man accused of being Sabu has helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. British authorities had previously announced the arrests of two teenagers they allege are LulzSec members Tflow and Topiary.

Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.
Previous Post Next Post