The world of hacking looks quite mysterious and fascinating, as few have the skills to deal with it. There are three categories of hackers. White-hat, black-hat and gray-hat hackers. In first This includes hackers who work as security consultants for various companies. In second belongs to the hackers who commit cybercrime with the aim of profit or simply to cause chaos. In third category belong the hackers who use them computers for investigation, trying to punish the alleged cybercriminals. But let's look at them top 10 best / most famous hackers of all time.
Kevin Mitnick (The Condor, The Darkside Hacker)
Kevin Mitnick owns the title of the best hacker of all time. In fact, the US Department of Justice (DoJ) called him "the most wanted computer criminal in US history." Mitnick started hacking at a young age. However, referring to his action, he describes it as social engineering and not as hacking. He came to the forefront of the public eye in 1981 when he hacked the North American Defense Command (NORAD), an achievement that inspired the film. War Games of 1983. Two other cases of hacking made Mitnick number one hacker of all time. The first is in 1989, who invaded Digital Equipment Corporation (DEC) to make copies of the company's software. As DEC was a leading computer manufacturer at the time, this operation did not go unnoticed.
Mitnick was later arrested, convicted and sent to prison. During its conditional release, it hacked into its voicemail systems Pacific bell. Throughout his hacking career, Mitnick never took advantage of the access and data he received. It is widely believed that he once took full control of the Pacific Bell network simply to prove that it could be done. An arrest warrant was issued for his arrest in the Pacific Bell incident, but Mitnick escaped and lived in hiding for more than two years.
Mitnick found himself in the line between white-hat and black-hat hacker in recent years, founding the cyber security consulting firm in 2014 Mitnick's Absolute Zero Day Exploit Exchange. Kevin Mitnick's story is so "wild" that it was even the basis for a movie called Track Down. In 1995 Mitnick was arrested and sentenced to five years in prison. After his release, he became a consultant and public speaker on computer security. Today he heads the Mitnick Security Consulting, LLC.
Anonymous may be the most famous hackers of all time, but also the most "cloudy". The group is small in organization and focuses on the concept of social justice. Anyone can act on behalf of Anonymous. The group has inspired its style by a comic book character and consists of so-called "hacktivists" involved in political and international demonstrations. Their core seems to have been formed by members of the 4chan forum in 2003. The collective is said to have taken its name from the ability the internet allows users to post information or personal comments without having to reveal their identities.
The group connected with pranks until 2008, so he carried out a coordinated attack wearing the famous Guy Fawkes mask in the Church of Scientology and began disabling its sites, negatively affecting their Google rankings and flooding fax machines with all-black images. As the New Yorker noted, while the FBI and other law enforcement agencies have identified some of the most productive members of the group, the lack of real hierarchy makes it almost impossible to locate or eliminate Anonymous as a whole. Anonymous has been targeted by other notable targets such as Amazon, PayPal, Sony, the Westboro Baptist Church, parts of the dark web and the governments of Australia, India, Syria, USA, among dozens more. The group continues its activism to this day. Since 2011 , has created two related hacking groups, with the names LulzSec and AntiSec.
Adrian Lamo (The Homeless Hacker)
In 2001, then-20-year-old Adrian Lamo used an unprotected content management tool on Yahoo to edit a Reuters article and add a fake quote attributed to former Attorney General John Ashcroft. Lamo usually hacked systems and then alerted both the media and its victims. In some cases, it helped victims clear up the mess and improve their safety. In 2002 he hacked their network New York Times and began conducting research on high-profile public figures. This resulted in a sentence of two years probation and a fine of approximately $ 65.000. Lamo is also known as the "Homeless Hacker" because he preferred to roam the streets with just over a backpack and usually did not have a permanent home.
Albert Gonzalez (also known as CumbaJohnny, Segvec, SoupNazi, KingChilli)
Albert Gonzalez is one of the best hackers in the world. It started as leader of a hacking group called "ShadowCrew" in high school of Miami. In addition to stealing and selling credit card numbers, ShadowCrew also generated fake passports, health insurance cards and birth certificates for identity theft crimes. Gonzalez paved the way for his online fame when he amassed more than 170 million card numbers in two years. Then he hacked the companies' databases "TJX" and Heartland Payment Systems and stole all the credit card numbers stored on them. At the age of 22, Gonzalez was arrested in New York for fraudulent debit card fraud related to data theft from millions of card accounts. To avoid imprisonment, it was done US Secret Service informant.
However, during his time as an informant, Gonzalez continued his criminal activities. Together with a group of accomplices, he stole more than 180 million payment card accounts from companies, including OfficeMax, Dave & Buster's and Boston Market. Using SQL injection, the famous hacker and his team developed backdoors in many corporate networks and stole about $ 256 million from TJX alone. During his conviction in 2015, the federal prosecutor described Gonzalez's human victimization as "unparalleled."
Matthew Bevan (Kuji) and Richard Pryce (Datastream Cowboy)
Matthew Bevan and Richard Pryce are a duo of British hackers who broke into military networks in 1996. including the Griffiss Air Force Base, the U.S. Defense Information Systems Service, and the Korean Atomic Energy Research Institute (KARI). Bevan (Kuji) and Pryce (Datastream Cowboy) were accused of starting almost a World War III following the rejection of the KARI investigation into US military systems. Bevan claims he wanted to prove a conspiracy theory about UFOs, and according to the BBC, his case is similar to that of Gary McKinnon. Whether malicious or not, Bevan and Pryce have shown that even military networks are vulnerable.
Jeanson James Ancheta (Resilient)
Jeanson James Ancheta (also known as Resilient) did not seek to hack into systems to steal credit card data or crash social justice networks. Instead, he was particularly curious about them Botnets. These botnets consisted of software-based attacks that violated the control of a computer system. Escalating this type of attack, by connecting hundreds of different computer systems to a network, can have a devastating impact.
By 2005, Jeanson had successfully tampered with about half a million computers. As described by Ars Technica, Ancheta used this network to its advantage, selling access to advertising companies and other hackers. His sentence was 57 months in prison and a $ 75.000 fine, marking the first time a hacker has been jailed for using a botnet.
Michael Calce (Mafiaboy)
In February 2000, 15-year-old Michael Calce, also known as "Mafiaboy", discovered how to break into university computer networks. He used their combined resources to disrupt the number one search engine at the time, Yahoo. Within a week, he had "hit" as well Dell, eBay, CNN and Amazon with DDoS attack which flooded corporate servers and caused their sites to crash. Cybercrime legislation suddenly became a top government priority thanks to Calce attacks.
Kevin Poulsen (Dark Dante)
Poulsen gained his first 15 minutes of fame using his sophisticated knowledge of telephone systems. He hacked the telephone lines of a radio station and emerged as the winner of a brand new Porsche, holiday and $ 20.000. The media named him "Hannibal Lecter on computer crime". In 1983, 17-year-old Kevin Poulsen, using the nickname "Dark Dante", hacked the ARPANET, the computer network of the US Pentagon. Although quickly caught, the government decided not to prosecute Poulsen, who was a minor at the time. Instead, he was released with a warning.
Poulsen did not heed this warning and continued his hacking action. In 1988, he hacked into a federal computer and stole files belonging to the caretaker President of the Philippines. Ferdinando Marco. Poulsen entered the FBI wanted list when he broke into federal systems and stole information about the network. He was later arrested at a supermarket and sentenced to 51 months in prison, banned from using a computer for three years and also fined $ 56.000.
He has since become a journalist and white-hat hacker, writing about cybersecurity and socio-political issues for Wired, the Daily Beast and his own blog. Threat Level. Poulson also collaborated with other leading hackers on various projects dedicated to social justice and freedom of information.
Jonathan James (cOmrade)
Using the nickname "cOmrade", Jonathan James violated various companies. According to the New York Times, what really caught his attention was his intrusion into the computers of the US Department of Defense. Even more impressive was the fact that James he was only 15 years old at the time. In an interview with PC Mag, James admitted that he was partly inspired by the book The Cuckoo's Egg, which describes in detail the hunt for a computer hacker in the 1980s. His hacking allowed him to access more than 3.000 messages from government officials, usernames, passwords and other sensitive data.
James was arrested in 2000 and sentenced to six months in house arrest, while being banned from using computers for entertainment. James became the youngest person to be convicted of violating cybercrime laws. In 2007, TJX was breached, along with much of its private customer information. Despite the lack of evidence, authorities suspect that James was behind it.
In 2008, James committed suicide with shot. According to the Daily Mail, his suicide note stated the following: "I do not believe in the 'justice' system." Perhaps my actions today, and this letter, will send a stronger message to the public. In any case, I have lost control of this situation and that is the only way to regain it. "
The Greek ASTRA
The hacker known as "ASTRA" differs from the others on this list as well has never been publicly recognized. However, he is said to have been a 58-year-old mathematician arrested in 2008. Greek authorities said he was violating the airline's systems Dassault Group for about half a decade. At the time, he stole weapons technology information about the company's fighter jets and other military aircraft, and sold them to various countries. It is said that he sold this data to almost 250 people in the Middle East, Brazil, France, Germany, Italy and South Africa, all for $ 1.000. Damage to Dassault totaled more than $ 360 million. No one knows why his full identity was never revealed, but the word "ASTRA" is a Sanskrit word for "weapon".