-->

10 Interesting Stories From The World's Most Famous Hackers

10 Interesting Stories From The World's Most Famous Hackers

10 Interesting Stories From The World's Most Famous Hackers


 Not all hackers are bad. The good ones are often called "White Hat Hackers" and use hacking to increase computer security. Meanwhile, people who are just having fun are called “Gray Hat Hackers”. But there are also bad hackers, they are often called “Black Hat Hackers.” Despite being the best at what they do, they can cause a lot of harm, as history has shown. Here are 10 Interesting Stories From the World's Most Famous Hackers.



1.Kevin Mitnick


The US Department of Justice called him "the most wanted computer criminal in US history." The story of Kevin Mitnick, who is the most famous hacker in the world, was so wild that it even became the basis for a feature film called Track Down.


What is she doing?

After serving a year in prison for hacking into Digital Equipment Corporation's network, he was released for three years of supervised release. But towards the end of that period, he went on the run and carried out 2.5 years of hacking that involved breaching the national defense alert system and stealing company secrets.


Where is he now?

Mitnick was eventually caught and sentenced to five years in prison. After fully serving those years, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.


2. Jonathan James


The story of Jonathan James, known as “comrade,” is a tragic one. He started hacking at a young age, managed to hack into several commercial and government networks and was sent to prison for it all while he was still a minor.


What is she doing?

James eventually hacked into NASA's network and downloaded enough source code (the equivalent of $1.7 million in assets at the time) to learn how the International Space Station worked. NASA had to shut down its network for a full three weeks while they investigated the breach, costing them an additional $41,000.


Where is he now?

In 2007, several well-known companies fell victim to various malicious network attacks. Although James denied involvement, he was suspected and investigated. In 2008, James committed suicide, believing that he would be punished for a crime he did not commit.


3. Albert Gonzalez


Albert Gonzalez started as the leader of a hacker group called ShadowCrew. As well as stealing and selling credit card numbers, ShadowCrew fabricated fake passports, health insurance cards and birth certificates for identity theft crimes.


What is she doing?

Albert Gonzalez paved the way to internet fame when he accumulated more than 170 million credit card and ATM card numbers over two years. He then hacked into the databases of TJX Companies and Heartland Payment Systems to steal all the stored credit card numbers as well.


Where is he now?

Gonzalez was sentenced to 20 years in prison (two 20-year sentences to be served concurrently) and is scheduled for release in 2025.


4.Kevin Poulsen


Kevin Poulsen, also known as “Dark Dante,” earned his 15 minutes of fame by leveraging his intricate knowledge of the telephone system. At one point, he hacks into the radio station's phone line and establishes himself as the winning caller, giving him a new Porsche. According to the media, he is the "Hannibal Lecter of computer crime."


What is she doing?

Poulsen was put on the FBI's wanted list when he hacked into federal systems and stole wiretapping information. He was then arrested in a supermarket and sentenced to 51 months in prison and a bill of $56,000 in damages.


Where is he now?

Poulsen changed his ways after being released from prison in 1995. He started working as a journalist and is now a contributing editor for Wired. In 2006, he even helped law enforcement to identify 744 sex offenders on MySpace.


5. Nasa hacker Gary McKinnon


Gary McKinnon, known as "Solo" on the internet, allegedly coordinated what would become the largest military computer hack of all time.


What is she doing?

During a 13 month period from February 2001 to March 2002, McKinnon illegally accessed 97 computers belonging to the US Armed Forces and NASA.


He claimed he was simply seeking information on free energy suppression and UFO cover-ups, but according to US authorities he deleted a number of critical files and rendered more than 300 computers inoperable, resulting in over $700,000 in damages.


Where is he now?

Being of Scottish descent and operating in England, McKinnon was able to evade the American government until 2005, when he faced extradition. After a series of appeals, Theresa May blocked her extradition on the grounds that she was "seriously ill" and that extradition would be "incompatible with her human rights."


6.Robert Tappan Morris


Robert Tappan Morris took his knowledge of computers from his father Robert Morris, who was a computer scientist at Bell Labs and later the NSA. Morris is credited with creating the world's first known computer worm.


What is she doing?

In 1988, he created the Morris Worm while he was a student at Cornell University. The program was meant to measure the size of the internet, but it had a flaw: a computer could be infected multiple times, and each infection caused the computer to slow down even more. It rendered more than 6,000 computers unusable.


Where is he now?

In 1989, Robert Tappan Morris was found to have violated the Computer Fraud and Abuse Act. He was sentenced to three years of probation, 400 hours of community service, and a $10,050 fine. He eventually founded Y Combinator and is now a tenured professor at the Massachusetts Institute of Technology.


7. Blankenship Loyd


Loyd Blankenship, known as “The Mentor” in hacking circles, has been an active hacker since the 1970s. He was a member of several hacking groups in the past, most notably the Legion of Doom (LOD).


What is she doing?

Blankenship wrote an essay called “Mentor's Last Words” (also called “The Conscience of a Hacker and a Hacker”), which he wrote after his arrest in 1986. This essay was later seen as a kind of cornerstone for hack culture.


Where is he now?

Blankenship was hired by Steve Jackson Games in 1989 to work on GURPS Cyberpunk. The US Secret Service raided his home in 1990 and confiscated the game's rule book, calling it a "handbook for computer crime." He has since given up on hacking and is now head of product research and design at McAfee.


8. Julian Assange


Julian Assange started hacking at the age of 16 under the name "Mendax." Over four years, he hacked into various government, corporate, and educational networks, including the Pentagon, NASA, Lockheed Martin, Citibank, and Stanford University.


What is she doing?

Assange then created WikiLeaks in 2006 as a platform for publishing news leaks and classified documents from anonymous sources. The United States launched an investigation into Assange in 2010 to charge him under the Espionage Act 1917.


Where is he now?

Assange is currently an Ecuadorian citizen and is hiding in the Ecuadorian embassy in London, fearing extradition to the United States.


9. Guccifer 2.0


Who is Guccifer 2.0? No one knows for sure. It could be a person, or a group posing as a person. The name pays homage to a Romanian hacker (known as “Guccifer”) who frequently targeted US government officials and other people of political prominence.


What are they doing?

During the 2016 US Presidential Election, the Democratic National Convention network was hacked. Thousands of documents leaked on WikiLeaks and elsewhere. Many believe that Guccifer 2.0 is a front for Russian intelligence, but in an interview with Vice, Guccifer 2.0 claims he is Romanian and not Russian.


Where are they now?

Guccifer 2.0 disappeared just before the 2016 US Presidential Election, then reappeared in January 2017 to assert that he had no ties to Russian intelligence.


10.Anonymous


Anonymous may be the world's most famous and known hacker of all time, but it's also the most obscure. Anonymous is not a single person but rather a decentralized group of hackers with no membership. Anyone can act on behalf of Anonymous.


What are they doing?

Since their debut in 2003, Anonymous has been credited with attacking several high-profile targets, including Amazon, PayPal, Sony, Westboro Baptist Church, Church of Scientology, part of the dark web, and the governments of Australia, India, Syria, the United States, among dozens of others. .


Where are they now?

Anonymous continues its hacktivism to this day. Since 2011, two related hacking groups have emerged from Anonymous: LulzSec and AntiSec.

________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ________


That's all the information this time. Look forward to other interesting information and don't forget to share this information with your friends. Thank you…


Resa Risyan


Just an ordinary person who wants to share a little knowledge, hopefully the knowledge I provide can be useful for all of us. Keep in mind! Useful knowledge is an investment in the afterlife.


Also, read the article about 10 Backend Developer Job Roles and Skills Required. And see you in another article. Bye
Read Also :
DotyCat - Teaching is Our Passion