Omega Computer Services

View Original

Top 5 Infamous Hackers


See this content in the original post

Data breaches and cyberattacks are unfortunate facts of life for the government, businesses, and individuals because of today’s advances in technology and networks.

The odds of a cyberattack happening are increasing more each year.

In fact, every 39 seconds an attack happens.

This equals to 1 in 3 Americans every year.

The reason for the increase in attacks is due to the overall accessibility of the Internet and the affordable cost of resources.

Today’s hackers have taken notes.

Their influence comes from some of the past’s most infamous hackers to date to create even more elaborate plans.

See this content in the original post

 

1. Kevin Mitnick (“The Condor”)

One of the true original hackers, Mitnick started at a very young age.

In 1981, he was convicted with stealing computer manuals from Pacific Bell.

Just a year later, he hacked the North American Defense Command.

In 1989, he was able to obtain access to the Digital Equipment Corporation’s (DEC) network and make copies of software.

The DEC was the leading computer manufacturer at this time.

Even though Mitnick is one of the best hackers of all time, he didn’t exploit any data that he obtained.

It was rumored that he had full control of Pacific Bell’s network.

However, he wasn’t in the game to make money or exploit any one business.

He just wanted to prove it could be done.

Mitnick did serve a year in prison for hacking the DEC and was then let out for three years of supervised release.

He must not have been a fan of the supervision as he fled and went on a hacking spree for the next 2.5 years.

After serving five years, Mitnick became a consultant and public speaker for cybersecuity.

 Now, he runs Mitnick Security Consulting, LLC.

Check it out: Infographic: What Is Attacking My Computer?

See this content in the original post

 

2. Vladimir Levin (“Arkanoid”)

Vladimir Levin was a Russian hacker who in 1995, broke into Citibank’s computers and allegedly stole nearly $10 million by re-wiring it to various global accounts.

The most famous part of Levin’s hack was that he did not use the internet to commit his crime.

Instead, he tapped into the telecommunications systems to listen to customers rattle off their private account information.

All but $400,000 of his winnings were able to be recovered by the authorities.

Ultimately, he pleaded guilty to just one charge of making $3.7 million in unauthorized transfers.

He was sentenced to three years in prison and ordered to pay back $240,000 to Citibank.

See this content in the original post

 

3. Albert Gonzalez (“Segvec” and “J4guar”)

It’s safe to say that Gonzalez was in it for the money.

He was charged with stealing more than 180 million payment card accounts from companies including OfficeMax, Dave and Buster’s and Boston Market.

The New York Times magazine notes that Gonzales’s 2005 attack on US retailer TJ Maxx was the first serial data breach of credit information.

Using SQL injection, this famous hacker and his team created back doors in several corporate networks and stole an estimated $256 million from TJ Maxx alone.

 Five years from now (2025), Gonzalez will be released from his double 20 year sentences.

Will he be a changed man or continue hacking?

Check it out: Hacking Collectives Infographic

See this content in the original post

 

4. Kevin Poulsen (“Dark Dante”)

Poulsen is amazing simply because of the age he started hacking.

In 1983, a 17-year-old Poulsen, using alias Dark Dante, hacked into ARPANET, the Pentagon’s computer network, but was soon caught.

The government decided not to prosecute Poulsen, who was a minor at the time, and he was let off with a warning.

However, this didn’t stop Poulsen.

He continued to hack federal computers and leak confidential government information.

In 1990, he made sure he was the 102nd caller on a radio station to win a new Porsche, a vacation, and $20,000.

Poulsen was later arrested and banned from using a computer for 3 years.

He is now a lead writer at Wired on computer security issues.

In addition to being a contributing editor and journalist, Poulsen even helped the law enforcement in 2006.

He helped by identifying 744 sex offenders on MySpace.

 

You might also like: IoT Privacy Concerns: Are They Spying On Me?

See this content in the original post

 

5. Ryan Collins (“Ryan Collins”)

Collins’s claim to fame was the notorious iCloud hacks, where he obtained revealing photos of famous celebrities by accessing the Apple database.

He would phish celebrities with emails that looked like official password reset notifications from companies like Apple or Google.

Then, armed with their passwords, he would use them to download full iPhone backups from iCloud, which came with contacts, text messages, calendars, and photos.

Ryan Collins was sentenced to 18 months in prison for hacking in to the accounts of more than 600 people.

Most famously, photos of Jennifer Lawrence.

Interestingly enough, even though he plead guilty there has been no direct evidence found of him leaking the photos.

 

Bonus: Anonymous

Odds are by now, you have heard of these guys.

Anonymous got its start in 2003 on 4chan message boards in an unnamed forum.

The group exhibits little organization and is loosely focused on the concept of social justice.

For example, in 2008, the group took issue with the Church of Scientology and began disabling their website, thus negatively impacting their search rankings in Google and overwhelming its fax machines with all-black images.

In 2012, the group even earned a spot in Time’s “100 Most Influential People” list.

The FBI and other law enforcement agencies have tracked down some of the group’s more prolific members.

The lack of any real hierarchy makes it almost impossible to eliminate Anonymous as a whole.

Since 2011, two other hacking-related groups have emerged from Anonymous.

LulzSec and AntiSec.

See this search field in the original post
See this form in the original post
See this form in the original post
See this content in the original post

SHARE BLOG POST