Hackers are a strange aspect of both the underworld and the professional world. For one thing, they seem to be somewhat immaterial and conceptual in the cyberworld and are often seen in fiction as stereotyped and simplified heroes or as virtual folk heroes, perhaps pirates. But reality is alien. In this report, we hack into the database of the world's worst hackers and download a list of the issues that actually occurred.
10th Jonathan James
The story of Jonathan Joseph James is shocking and tragic. James had the dishonorable award of being the first juvenile offender in US history to be convicted of cybercrime. Nothing good came from his shameful career when he was found dead in his home in Florida at the age of 24 as a result of suicide. James began using computers at the age of 6 and was obsessed with his early teenage years when his parents confiscated his electronics. He did not return the computers until he left the house and refused to return, unless they returned them. As an adolescent, James got into BellSouth's computer systems and a school system before descending into deeper waters that got the Federation agents on their trail.
James had a backdoor entry into a Defense Threat Reduction Agency server or DTRA – a department of the US Department of Defense – hacked into the system, sending in more than 3,000 messages to (or from) military personnel and account information for Employees accessed. It became scary when it turned out that this young man owned software that was nothing less than the source code of the International Space Station, which was responsible for managing the life support system. NASA describes the software as being responsible for "the physical environment of the International Space Station including the control of indoor temperature and humidity". The cost of solving this problem was $ 41,000 . In 2000, at the age of 16, James was arrested for these epic hacks. James's sentences included probation until his 18th birthday. In 2007, James feared he would be held responsible for a huge hack of the TJX department store, and this led to his suicide in 2008.
9. Loyd Blankenship
Loyd Blankenship, author of the "Hacker Manifesto" (originally titled "The Conscience of a Hacker"), was rather eerily known as "The Mentor" before his identification. Blankenship played a disturbing role in the history of hacking, defining and justifying the hacker in popular imagination and defiantly taking an unfounded invasion stance on the battlefield of computer innovation against cybercrime. His words speak for themselves as follows: "This is our world now. The world of the electron and the switch, the beauty of the Baud. We investigate and you call us criminals. We are looking for knowledge, and you call us criminals. We exist without skin color, without nationality, without religious prejudices, and you call us criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is to judge people by what they say and think, not by what they look like. My crime is tricking you, something you'll never forgive me for. "
Actually difficult words that I have to swallow, but an incentive for those who innovate against cybercrime. And what about Blankenship? He was hired by Steve Jackson Games, who was raided by the US Secret Service, which led to a lawsuit. Regardless of all these events, he remains an author on the subject of computers.
. 8 Hamza Bendeladj
Hamza Bendeladj is an extraordinary hacker, a big donor and the worst nightmare of a banker. The Algerian hacker with his skills and ideology co-founded the Trojan horse SpyEye and stole a staggering $ 400 million from 17 different US banks. After Bendeladj stole the extraordinary amount of money, he went on a mission and reportedly donated all the money to Africa and Palestine . Of course, the story does not end there.
The SpyEye software was offered for sale, purchased by other hackers, and incorporated into a "botnet," extending the damage radius. On April 23, 2016, Hamza Bendeladj was sentenced to 15 years in prison for stunts. The cybercriminal, also known as the "smiling hacker," was considered by some to be a hero, but classified as a troublemaker by those who judged his actions more accurately. His work was "a merit" that he has helped cause worldwide financial losses of around $ 1 billion.
. 7 Owen Walker
Owen "AKILL" Walker, a notorious New Zealand youth hacker, began writing computer code at the age of 13, just for fun. Without formal education, everything he did was learned through trial and error. Walker started cyber attacks from his home base in Hamilton on New Zealand's North Island, where he lived with his family. Walker earned $ 32,000 with hacking and more for the group he worked with. Following the admission of Walker to the hacking stunts and subsequent litigation, no charges were filed, but a $ 11,000 bill was paid for damages and costs. The botnet technology was used by Walker who rented servers in Malaysia for the dirty work.
After settling the legal issues, Walker took advantage of his fame, though not without much controversy. The former "AKILL", who had participated in six major cyberattacks in the world, including shutting down the University of Pennsylvania's IT system in 2007, was eventually hired by TelstraClear, a communications company in New Zealand, for whom he gave presentations and appeared as a security adviser in ads. And the bill for the damage caused by Walker? The hacker group, whose leader he was, cost the hackers a cool $ 26 million. Was justice served? You decide.
. 6 Jeanson James Ancheta
In January 2006, a hacker from Downey, California, who attacked personal targets and even US military facilities, was convicted after federal investigations that led to his doorstop. The then only 20-year-old Jeanson James Ancheta used botnets to gain control of a shocking number of computers – actually hundreds of thousands of computers. The man also infected machines at US military sites. The sinister form of hacking that Ancheta unleashed was to make profits by using the computers of everyday people on a massive scale to carry out spam attacks and publicize pop-up mass advertising.
By law, Ancheta could have faced 50 years in prison. however, was forced to spend 60 months in jail, seizing his BMW and paying over $ 58,000 in hacking profits, while repaying $ 15,000 to the US federal government as compensation for the infection of military computer equipment. The fines resulted from his guilty plea of 9 May in 2006 against four offenders for violating the US Code, Section 1030, fraud and related activities related to computers.
. 5 Dennis M. Moran
American hacker Dennis M. Moran has specialized in denial-of-service attacks, proving that a determined and informed person, armed with a laptop and bad intentions, is a shockingly disproportionate wave of global action can cause virtual destruction. Moran was born in Massachusetts in 1982 and brought to safety under the pseudonym Coolio in the United States of America.
In 2000 Moran was charged with refusing to commit a service attack prior to his arrest for damage to security websites and illegal access by US Army and US Air Force computers spread across four military bases were. Moran's confession included damaging DARE and RSA security sites and the computer hacks of the illegal armed forces.
. 4 Kristina Vladimirovna Svechinskaya
While an extraordinarily nerdy type with sociopathic charisma, a strange manifesto, or the revenge of an activist is a widespread stereotype of a hacker, a mysterious young Russian woman is fighting for a top spot in the ranks of Worldwide highly destructive hackers. Kristina Vladimirovna Svechinskaya was just 21 years old when she hacked into thousands of bank accounts with an attack on Zeus Trojans and opened several fake bank accounts as part of a hacking gang collaboration.
As a result, she and her accomplices stole $ 3 million from bank accounts in the United States. Svechinskaya, often referred to as an attractive and charismatic face in the dark world of hacking, could have been sentenced to 40 years for fraud and misappropriation.
. 3 Karl Koch
His activities and his death in secret The German hacker from the time of the Cold War Karl Werner Lothar Koch was born in Hannover in 1965 and lived a short life. He died at the age of 23 in 1989 under the pseudonym "Hagbard," a name inspired by Hagbard Celine, who later hacked the US military computers and then passed the information on to the Russian KGB – at a price. The somewhat strange-minded Mr. Koch called his computer an unpleasant acronym, which he called the "First Universal Cybernetic-Kinetic Ultra-Micro Programmer." trilogy.
Koch and co-hacker Pengo (Hans Heinrich Hübner) confessed to the act of espionage and hacking under amnesty laws that prevented their arrest and persecution. Oddly enough, all this ended badly when Koch was found burned in the woods near Celle. Although it is officially a suicide, it is believed by many that Koch was murdered to prevent further confessions. Koch's shoes were not found while the fire around his body burned very neatly and formed a small circle. This is often regarded as an indication of a bad game.
. 2 James Kosta
James Kosta, a beginner in the world of hacking, has made an extraordinary number of charges in connection with his hacks of highly sensitive corporate and government computers, including IBM and General Electric as a 14-year-old. During his school years, he had earned a steady income through his IT business, which led to the founding of a school computer club. When his parents told him he needed to close his shop and focus on school grades, he took legal action and applied for emancipation. Kosta then took a bad turn and joined a group of hackers who set the bar for initiations and rites of passage.
A total of 45 cases of technical collapse made the young Kosta sentenced to a prison sentence of 45 years, was released under conditions of a judge who saw rehabilitation potential. One condition was that he served in the armed forces as soon as he was of legal age. At 18, he joined the Navy. At 20 Kosta was hired by the CIA as intelligence analysts who fought against warlords and terrorists. The young entrepreneur, juvenile offender and super-hacker who became a government agent, took the next big step at 24 when he sold a multi-million dollar business. You may know him as the founder of 3G Studios, Inc.
1. Impact Team
The Impact Team is not a single hacker, but a group of like-minded individuals who perform a peculiar action in the style of the "virtual vigilante". It was responsible for revealing personal secrets that could destroy marriages. Well, it's fair to say that the marriages were already pretty broken. In 2015, hacked the Impact Team into the infamous adultery dating site Ashley Madison. The hackers claimed to have stolen over 10 gigabytes of user information, including Ashley Madison users' names, addresses and credit card details, as well as details of their outrageous fantasies.
The Impact Team stated in a manifesto that his opposition to the services of Ashley Madison and Established Men, both owned by Avid Life Media, was the motivation for the hack and subsequent blackmail. The basis for the release of private data was the closure of a company. Neither website was closed nor Ashley Madison's hackers published customer personal information so spouses, employers, and more could learn about their attempts to have an affair.
More articles you might like