EFY Times  
Friday, October 24, 2014

 
GO
 
 

11 Most Notorious And Infamous Black Hat Hackers Ever!
 
Home >> Infotech >> Features
 
11 Most Notorious And Infamous Black Hat Hackers Ever!  
 
Did you know that Steve Jobs and Mark Zuckerberg were black hat hackers? Here we bring to you 11 most notorious black hat hackers ever!   
Rate this news:  (12 Votes)
Monday, October 07, 2013 Hacking is undoubtedly one of the most adventurous, enticing and mysterious parts of the tech world and we thought it could be even more fun to know and learn about the top tier notorious black hat hackers and the legendary hacks that earned them such a title. So we bring to you the top 11 black hat hackers ever!

If you are wondering what black hat is, then a black hat hacker is a computing slang for a person who is engaged in illegal or malicious hacking. And similarly a white hat hacker is someone who intends to improve internet security.

Hacking, black hat hackers, non ethical hacking, hacking experts, best hackers ever, top hackers,




11. Kevin Mitnick

Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.

10. Kevin Poulsen a.k.a. Dark Dante

The notorious 80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured.

He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.

9. Albert Gonzalez

Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison.

8. Vladimir Levin

It’s almost like the opening of a James Bond movie: in 1994, while working from his laptop from his Russian apartment in St. Petersburg, Vladimir Levin transferred $10 million from the accounts of Citibank clients to his own accounts around the world.

However, Levin’s career as a hacker was only short lived, with a capture, imprisonment and recovery of all but $400,000 of the original $10 million. During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid. The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.

7. Robert Tappan Morris

On November 2, 1988, Robert Morris released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down. Morris made the fault of chatting about his worm for months before its release on the Internet. Morris claimed it was just a stunt, and added that he truly regretted causing $15 million worth of damage: the estimated amount of carnage his worm left behind.

Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act but only had community service and a fine as his penalty. The defense for such a light sentence was that Morris’ worm didn’t destroy the actual contents of affected computers. Morris now works in the department of Electrical Engineering and Computer Science at Massachusetts Institute of Technology (MIT).

6. Michael Calce a.k.a. MafiaBoy

In February of 2000, Michael Calce launched a series of widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup, TNT. In 2001, the Montreal Youth Court sentenced Calce to eight months of open custody, one year of probation, restricted use of the Internet, and a minimal fine.

5. David Smith

Smith’s fame can be credited to the infamous e-mail virus, Melissa that he gave birth to. Smith claims that the Melissa virus was never intended to cause harm, but its simple means of propagation (each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world. Smith’s virus takes an unusual turn in that it was originally hidden in a file that contained passwords to 80 well-known pornography websites. The name Melissa was derived from a lap dancer Smith met while on a trip in Florida. Even though over 60,000 email viruses have been discovered, Smith is the only person to go to federal prison in the United States for sending one.

4. Adrian Lamo

Nicknamed “the homeless hacker,” Adrian Lamo used coffee shops, libraries and internet cafés as his locations for hacking. Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo’s arrest was issued, followed by a 15-month investigation by federal prosecutors in New York.

After several days in hiding, he finally surrendered to the US Marshals, and then to the FBI. Lamo was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.

3. George Hotz

The name of the acclaimed jailbreak artist, George Hotz, will forever be associated with the April 2011 PlayStation breach. Being one of the first hackers ever to jailbreak the Sony PlayStation 3, Hotz found himself in the midst of a very relentless, public and messy court battle with Sony – perhaps worsened by Hotz’s public release of his jail breaking methods. In a stated retaliation to Sony’s gap of the unstated rules of jail breaking – never prosecute – the hacker group Anonymous attacked Sony in what would be the dubbed as the most costly security break of all time to date.

Hackers broke into the PlayStation Network and stole personal information of some 77 million users. However, Hotz denied any responsibility for the attack, and added “Running homebrew and exploring security on your devices is cool; hacking into someone else’s server and stealing databases of user info. is not cool.”

2. Jonathan James a.k.a. c0mrade

Jonathan James, 16-year-old black hat hacker, became the first juvenile imprisoned for cybercrime in the United States. James gained his notoriety by implementing a series of successful intrusions into various systems. At an amazingly young age of 15, James specialized in hacking high-profile government systems such as NASA and the Department of Defense. He was reported to have stolen software worth over $1.7 million. He also hacked into the Defense Threat Reduction Agency and intercepted over 3,000 highly secretive messages passing to and from the DTRA employees, while collecting many usernames and passwords.

On May 18, 2008, at the age of 25, James committed suicide using a gun. The words in his suicide note provide some insight into this obviously brilliant but troubled youth who thought he would be a scapegoat and blamed for cyber crimes he did not commit: “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

1. Gary McKinnon

In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon.

McKinnon suffers from Asperger’s syndrome, which is the least severe form of autism. The symptoms of Asperger’s syndrome certainly match Gary’s actions: that is, highly intelligent with an exceptional understanding of complex systems. Though sufferers often have difficulty reading social cues and acknowledging the impact of their often-obsessive behavior, they tend to be geniuses in one particular subject. For Gary, it was computers.

Gary has been accused of executing the largest ever hack of United States government computer networks — including Army, Air Force, Navy and NASA systems. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.

Courtesy: listverse



Print Email Post Comment  (1)
(Total Views: 63307)
 
Share

 
 

1 Comments

reijo niemi   379 days ago

Thats not how Asperger syndrome works or other autism spectrum disorders for that matter.
Reply  
 
Infotech News
   
​Continental Tires Selects JDA Manufacturing Planning Solutions To Transform Its Global Supply Chain Operations
Arbor Networks Peakflow 7.0 Dramatically Reduces Time To Detect And Mitigate DDoS Attacks
NVIDIA Bolsters Executive Ranks With Two New Vice Presidents For European Market
Arrow To Add Hitachi Data Systems Cloud Storage To The ArrowSphere Cloud Services Marketplace
MongoDB Recognized As The Only “Challenger” In The Gartner 2014 Magic Quadrant For Operational Database Management Systems
 
 
 
     
     
     
     
     
     
Most popular
 

Daily

MongoDB Recognized As The Only “Challenger” In The Gartner 2014 Magic Quadrant For Operational Database Management Systems
Axiros Emerges As An IoT Powerhouse With Product Line Extensions, Global Expansion At Broadband World Forum 2014
Zycus Launches ‘Customer Connect Series’, A Platform To Discuss & Share Procurement Practices
Most Businesses Use Third-Party Hosting And Maintenance To Manage Virtualization, According To Kaspersky Lab Survey
CRMIT Solutions Announces Mobile ADF Development Services For A More Engaging Customer Experience
Axiomtek Introduced Hardened Fanless Embedded Box System With Intel AtomTM Processor And Full Feature I/O – eBOX639-830-FL
Data Security Is A Prerequisite For Succesful “Industrie 4.0” Implementation: Infineon & Deutsche Telekom Demonstrate Security Technology
Oxagile Named To CIO Review’s 20 Most Promising Education Tech Service Providers For 2014
vCentric Successfully Completes Participation At The SAP’s - Multi City Roadshow ‘Innovation Express’
Enhanced OTT Video Monitoring: Witbe Moves Another Step Forward
 
   

Weekly

Android 5.0 Lollipop: 10 Most Exciting Features
Drupal Fixes SQL Injection Flaw In Version 7.32
20 Open Source Alternatives To Video And Audio Apps
Cloudera And Red Hat Forge Big Data Alliance
5 Ways In Which NFC Can Transform Your World!
10 Exciting New Open Source Projects!
Top 10 Flaws Of Hadoop That Are Seriously Annoying!
GPS Technology: Know The Basic Facts
Top 8 Books On Hadoop Technology
AIC SB122-TO Offers 8Bay NVMe PCIe SSD Server Solution In 1U
Intex Aqua Style X And WIIO Wi5 Exclusively Available On ebay.in
Top 10 Big Data Technologies Of Present Times
Here Are The Devices Poised To Get Google Android 5.0 Lollipop
HTC Launches Desire 516C In India @ Rs 12,990
Get Notified Instantly Of Important Changes Happening On Your WordPress
OFS CEO Rich Napoli Wins NJTC CEO Of The Year Award
 
   

Overall

Agility Systems Deals in:

Document Management System for law firms
Features
Top 8 Books On Hadoop Technology
Let's discuss 8 best books to learn Hadoop and how to get started with it....
20 Tools And Resources For Building And Testing Regular Expressions
Here we'll provide a list of 20 best tools and resources which will help you in writing regular expressions in a more streamlined way....
10 Scariest Hacking Incidents In The World!
A detailed report about the scariest side of hacking was recently released by WebHostingBuzz which gives us a list 10 scariest hacks and also possibi...
8 Best SVG Tools For Web Developers
There are some useful SVG tools which will of great help for any aspiring SVG developer. Take a look at the 8 best ones....
Top 8 Resources To Get Started With Go Programming Language
Go is a very well-structured language which has a syntax like the C language and it's very easy to learn....
Top 10 Big Data Technologies Of Present Times
Over last few years Big Data technologies are getting due attention and there are several trends and innovations in this space in recent times....
Top 10 Unexplored Areas In Java Programming Language
Here we will give you a list of 10 most unexplored areas of Java....
10 Best Practices An Independent Developer Should Follow!
Being an independent developer means you have to think beyond coding, about all partnerships and business prospective too....
10 Necessities For Modern Cloud Storage System
Here we will present a list of 10 requirements in the new generation cloud storage system of the 21st century....
10 Technologies Transforming Developers' World!
Here we'll discuss top ten technologies which are changing the nature of programming....
Ubuntu Turns 10! Here's All You Should Know!
On the occasion of 10th anniversary of Ubuntu, let's take a look at brief history of this renowned desktop distribution....
Android 5.0 Lollipop: 10 Most Exciting Features
Since the preview, Google has added lots of new features to the final release of the latest Android version. Here we will discuss top 10 features of m...
GPS Technology: Know The Basic Facts
Let's take a look how this GPS technology is operated in our daily uses....
10 Best Open Source Web Application Security Scanning Tools
Here we'll provide you with a list of 10 open source tools which are used to detect security vulnerabilities in web applications....
5 Ways In Which NFC Can Transform Your World!
Let’s have a look at 10 ways how NFC can actually rock your world in the near future....
 
  View All
Dialogue
 
10 Questions That Google Never Asks While Hiring!
Here is a list of 10 questions that Google just banned from their interviews....
For Enjay, Open Source Technology Is A Way Of Life
An entirely open source-based company, Enjay IT Solutions, has built itself a reputation in the OSS domain....
Switching To Tizen Doesn’t Mean We Are Abandoning Android: Samsung
The company has worked to build Tizen up from scratch and has now introduced it to developers and the general public with its latest range of wearable...
Venturing Into The Cloud? Develop A Customised Cloud Strategy First!
Diksha P Gupta speaks to Rushikesh Jadhav, cloud evangelist, ESDS Software Solution Pvt Ltd, on how the cloud has changed the way compan...
HTC Is Strong And There Are No Plans Of Sale Now Or In Future, Says HTC's Senior Director-Marketing
Atithya Amaresh from EFYTimes had an exclusive chat with Sirpa H. Ikola, senior director, Marketing, South Asia, HTC about its devices and its plans w...
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
IFA 2014
 
IFA 2014: LG Launches 34-Inches Curved Monitor
The company is yet to confirm price and availability of the device....
IFA 2014: Intel Launches First Core M Range Of Processors
This range of processors is tailor-made for 2-in-1 devices which include a tablet and a laptop....
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
electronicsforu.com
efytimes.com
opensourceforu.com
electronicsb2b.com
Electronics Annual Guide
EFY EXPO INDIA
EFY EXPO WEST
ELECTRONICS ROCKS
EFY Awards
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter

Educational Kits
Kitsnspares.com  
 
 
© Copyright 2014 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions