Top
Black Hat Hackers of the World
In our Previous Lessons we are familiar with Basic concepts of Ethical hacking, and Top white hat hackers of world. Now, in this lesson let's have a look to Top black hat hackers of the world.
The purpose of this lesson is to tell you what is the punishment of hacking done for wrong motives?
#1. Jonathan James
16-year-vintage black hat hacker Jonathan James, became the
primary juvenile imprisoned for cybercrime. James received his notoriety
through imposing a sequence of a success intrusions into numerous systems. In a
nameless PBS interview, he professes, “i was simply searching around, playing
around. What was amusing for me turned into a project to look what I ought to
pull off.”
James’ most important intrusions focused excessive-profile businesses including
NASA and the department of defense. He cracked into NASA computer systems,
stealing software well worth about $1.7 million. He additionally hacked into
the defense hazard reduction organization and intercepted over 3,000 pretty
secretive messages passing to and from the DTRA personnel, whilst accumulating
many usernames and passwords additionally called “c0mrade,” James devoted
suicide using a gun, On may 18, 2008, at the age of 25. His suicide became
reputedly prompted by way of the perception that he might be prosecuted for
crimes he had no longer devoted. “I really, truly had nothing to do with TJX,”
James wrote in his suicide notice, “I haven't any faith in the ‘justice’
system. possibly my actions these days, and this letter, will send a stronger
message to the public. both manner, I've lost my control over this condition,
and that is my simplest manner to regain control.”
#2. Gary McKinnon
In 2002,
a very strange message seemed on a US military computer screen: “Your safety
machine is crap,” it read. “I'm Solo. i can preserve to disrupt at the very best
ranges.” It were later diagnosed as the work of Scottish systems administrator,
Gary McKinnon, who was accused of perpetrating the “largest army computer hack
of all time”. he's accused of hacking into ninety seven U.S. army and NASA
computer systems over a 13-month duration between, the usage of the name
‘Solo’.
The United
States government declares that he deleted crucial documents from operating
systems, which shut down the us military’s army District of Washington network
of 2,000 computer systems for 24 hours. After the Sep 11 assaults in 2001, he
deleted weapons logs at the Earle Naval weapons Station, rendering its network
of 300 computers inoperable and paralyzing munitions supply deliveries for the
united states navy’s Atlantic Fleet. He is likewise accused of copying
information, account documents and passwords onto his personal systems.
#3. Adrian Lamo
Adrian Lamo is a Colombian-American hazard analyst and
hacker. He used espresso stores, libraries and net cafés as his places for
hacking. Aside from being the homeless hacker, Lamo is extensively-known for
breaking into a chain of highly-profile device networks, which consist of the
new york times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he brought his
name to the The new york times’ internal database of professional resources and
utilized LexisNexis account to conduct studies on excessive-profile skills.
For his intrusion of the new york times, Lamo was ordered to pay about$65,000
in damages and was sentenced to 6 months home arrest at his parents’ house,
with a further 2 years of probation. In June 2010, Lamo disclosed the name of
Bradley Manning to U.S. navy government because the source of the July 12, 2007
Baghdad airstrike video leak to Wikileaks. Lamo is currently working as a hazard
analyst and donates his time and abilities to a Sacramento-based totally
nonprofit enterprise.
#4. George
Hotz
George Francis Hotz, alias geohot, or virtually mil, is an
American hacker recognized for unlocking the iPhone, permitting the smartphone
for use with different wi-fi providers, opposite to AT&T and Apple’s
rationale. Moreover, he evolved the limera1n jailbreak device, which used his
limera1n bootrom exploit.
In June, 2007, Hotz become the primary person to do a successful unlock in an
iPhone. Consistent with Hotz’s weblog, he traded his second unlocked eight GB
iPhone to Terry Daidone, the founding father of Certicell, for a Nissan 350Z
and three 8 GB iPhones. Hotz stated that he wants to offer the iPhones to the
alternative individuals of the crew who created the hack with him. His name
will always be related to the April 2011 playstation breach. Being very first
hackers ever to jailbreak the Sony playstation 3, Hotz determined himself in
the midst of a completely relentless, public and messy court docket war with
Sony – perhaps worsened through Hotz’s public release of his jail breaking
techniques. In a stated retaliation to Sony’s gap of the unspoken regulations
of jail breaking – never prosecute – the hacker institution anonymous attacked Sony
in what would be the dubbed as the most expensive safety spoil of all time to
date.
At the end of April 2011, Hackers broke into the playstation community
and stole private data of a few seventy seven million customers. but, Hotz
denied any obligation for the assault, and said “running homebrew and exploring
safety on your devices is cool; hacking into someone else’s server and stealing
databases of consumer data isn't always cool.”
#5. Kevin Mitnick
A
self-proclaimed “hacker poster boy,” Mitnick went via a highly publicized
pursuit by government. His mischief turned into hyped through the media however
his real offenses may be much less terrific than his notoriety shows. The
branch of Justice describes him as “the most desired computer crook in united
states history.” His exploits were unique in 2 movies: Freedom Downtime and
Takedown.
Mitnick
won unauthorized access to his first computer network in 1979, at sixteen,
while a friend gave him the telephone number for the Ark, the computer system
digital equipment corporation (DEC) used for making their RSTS/E operating
system software program. He broke into DEC’s computer network and copied their
software program, a criminal offense he was charged with and convicted of in
1988. According to the U.S. department of Justice, Mitnick gained unauthorized
access to dozens of computer networks while he was a fugitive. He used cloned
cell telephones to hide his area location and, among different things, copied
precious proprietary software program from wide range of the country’s largest
cellular cellphone and computer agencies. Mitnick additionally intercepted and
stole computer passwords, altered computer networks.
#6. Michael Calce
A high school pupil from West Island, Michael Demon Calce
excellent called “MafiaBoy”. He launched a sequence of widely known
denial-of-service assaults towards huge industrial web sites, such as Yahoo!,
Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! while it was nevertheless the
net’s leading search engine and brought on it to shutdown for approximately an
hour. Like many hackers, Calce exploited web sites basically for delight and
setting up dominance for himself and his cybergroup, TNT. In 2001, the Montreal
youngsters court sentenced Calce to 8 months of open custody, 12 months of
probation, constrained use of the net, and a minimum pleasant.
#7. Robert Tappan Morris
Robert
Tappan Morris is an American computer system scientist, well known for
developing the Morris bug in 1988. That was considered the first system bug at
the internet. Additionally he was the primary individual convicted beneath the
computer Fraud and Abuse Act.
Morris
created the computer virus whilst he was a graduate pupil at Cornell College.
He launched the malicious program from MIT to hide the reality that it simply
originated from Cornell. The trojan horse took down one-10th of the internet,
crippling 6,000 plus computer systems. It didn’t take long for the police to
track him down. Due in part to the want for social popularity that appears to
be commonplace amongst many young hackers, Morris made the fault of chatting
about his bug for months earlier than its release at the internet. Morris
claimed it was only a stunt, and added that he genuinely regretted inflicting
$15 million worth of harm: the expected quantity of carnage his worm left
behind.
Morris
was one of the first to be tried and convicted under the computer Fraud and
Abuse Act . In December, 1990, was sentenced to 3 years of probation, four
hundred hours of network service, a fine of $10,050, and the costs of his
supervision.
#8. Kevin Poulsen
The infamous' 80s black hat hacker, Kevin Poulson
(additionally known as dark Dante) is known for his hack of LA Radio KIIS-FM
telephone lines.
Law enforcement referred to as them "Honeyball Lecture of computer
Crime". After hacking into the Federal research database, officers began
pursuing Poulson. At some point of this endeavor, he carried ahead the issues of
FBI through hacking into federal computer systems for wiretap records. But,
their hacking revolves across the cellphone, especially. Poulson's maximum
well-known hack, KIIS-FM, was to hack the telephone lines of all stations. In a
related success, Poulson "additionally activated the old yellow pages
escort phone numbers for a known person, who then used to run a virtual escort
company." Later, while his image shows came on "Unsolved
Mysteries", then this system had crashed 1-800 phone lines. Ultimately,
Poulson was caught within the grocery store and sentenced to 5 years, which was
the longest sentence given for hacking at the time. But, he has labored as
a journalist and is now a senior editor for wired news. His maximum
outstanding article gives info of his work on figuring out 744 intercourse
offenders with MySpace profiles.
#9. Albert
Gonzalez
Albert Gonzalez is a pc hacker and computer crook on which
the mastermind of joint credit card robbery has been accused of re-saling more
than one hundred seventy million cards and ATM numbers from 2005 to 2007 - i.e.
the largest fraud in history. Gonzalez's crew used sq. Injection strategies to create
malware backdoors on many company systems to launch packet-snifting assaults
(specially, ARP spoofing), to assist them steal system records from inner
company networks . After they had been arrested, the government seized $ 1.6
million in money in a plastic bag stored in 3 million drums, which include $
1.1 million, which become buried inside the outdoor to their parents. On March
25, 2010, Gonzalez was sentenced to twenty years in federal jail.
#10. Vladimir
Levin
Vladimir Levin is a Russian-born Jewish person famed for his
involvement in the attempt to fraudulently switch US$10.7 million through
Citibank’s computer systems. But, his profession as a hacker was simplest brief
lived, with a capture, imprisonment and healing of all however $400,000 of the
authentic $10 million. For the duration of Levin’s 1997 trial in the united
states of America, he became said to have coordinated the primary ever net bank
raid. The fact is Levin’s capacity to switch Citibank customer finances to his
own debts was viable via stolen account numbers and PINs. Levin’s scam was an
easy interception of customers’ calls even as recording the punched in account
numbers.
#11. Jeanson
Ancheta
This hacker became the first individual to be
accused of controlling a military of hijacked computer systems – known as
“botnets” – to send huge quantities of junk mail on the internet. In 2004, he
used the virus “rxbot” to govern 500,000 computer systems and even sold their
services to anybody who might take down massive web sites. Ancheta was arrested
in 2005 whilst an FBI agent pretended to be inquisitive about their services.
The hacker returned approximately $60,000 earned in raids and served 60 months
in jail.
#12. ASTRA
The hacker called ASTRA has in no way been
recognized, at least publicly. He was a mathematician, arrested in 2008. Government
in Greece says that he hacked into the aviation company Dassault systems for
almost 5 years. During this era, he stole confidential data from army aircraft
and sold the data to 250 human beings in distinctive nations. ASTRA might have
prompted a loss of 360 million dollars to Dassault.
#13. Owen
Walker
In 2008, Owen Walker admitted to being
responsible of six cyber crime charges. He led a community of hackers who broke
into 1.3 million computer systems and stole 20 million contemporary accounts.
Robberies have commenced while Walker was 17 years old. In overall, he earned
$32,000, considering that best writing the code in order that other individuals
of team can thieve the cash. He presently specializes in safety era agencies.
#14. Matthew
Bevan and Richard Pryce
These British duo
broke into Pentagon systems in 1994, copying and military exercise confidential
messages and accessed nuclear power plant in South Korea. Price (pictured) was
16 and Bevan, 21. Both were arrested on the following year.
#15. Syrian
Electronic Army
The Syrian digital military came in 2011 to
help the regime of President Bashar al-Assad on web sites and social networks.
Although no longer sophisticated, the organization attacked some of massive
companies and masses of web sites in recent months, the usage of junk mail,
malware, phishing and denial of service assaults.
#16. Lizard
Squad
Famous among game
enthusiasts, the Lizard Squad down the nets playstation and Xbox in
Christmas 2014. The organization became also within the back of attacks on
networks of League of Legends and destiny. The DoS assault utilized in the ones
attacks is bought on the enterprise’s internet web page as a provider. The
Lizard Squad is also known to take responsibility for assaults on non-existent
Tinder, fb and Insta. People had been arrested for allegedly being a part
of the organization: Vinnie Omari, a British 22, and “Ryan”, 17.
#17. Anonymous
An obscure team were shown in 2003 in 4chan
(4chan is a basic picture based release board where anybody can post remarks
and offer pictures), And this group was sorted out by Web Trawler until the
point that 2008, Since this group assaulted the website of Chapel of
Scientology, he called this obscure gathering as a "hacktivist".
#18. Chad
Davis
Chad Davis was an American programmer from Green
Bay. He was engaged with the most needed rundown of "digital
hoodlums" in the second half of the twentieth century. He was likewise
part of the programmers club named GlobalHeil. The best accomplishment of the
programmer aggregate was to pulverize the landing page of the White House site.
Chad Davis once went to the U.S. A message sent to the military's landing page
"GlobalHail won't pass on." He was recognized and captured. He was
detained for a half year in jail, and his utilization of computer system was
restricted.