1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Top 5 Criminal Hackers All Time

Discussion in 'BlackHat Lounge' started by Free_Ebook, May 5, 2008.

  1. Free_Ebook

    Free_Ebook Registered Member

    Joined:
    Jan 26, 2008
    Messages:
    55
    Likes Received:
    56
    Occupation:
    Webmaster
    1. Kevin Mitnick

    http://www.pcworld.hu/apix/0708/mitnick.jpg

    Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
    Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.
    Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.
    Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.


    2. Adrian Lamo

    http://www.pcworld.hu/apix/0708/adrian-lamo.jpg

    Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
    Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
    Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.


    3. Jonathan James

    http://www.pcworld.hu/apix/0708/jonathanjames.jpg

    At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
    James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
    High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.


    4. Robert Tappan Morris

    http://www.pcworld.hu/apix/0708/roberttappanmorris.jpg

    Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
    Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.
    Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.


    5. Kevin Poulsen

    http://www.pcworld.hu/apix/0708/kevin_poulsen.jpg

    Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.
    The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
    Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles.
     
  2. themagician

    themagician Regular Member

    Joined:
    Mar 25, 2008
    Messages:
    221
    Likes Received:
    1,084
    Location:
    Brit in Thailand
    Well researched and most interesting post!

    Now how do I get them all to join my team?

    Can you imagine what could be achieved with all these guys working together...and for you/me?

    Might even be able to take down the Las Vegas Casinos...AND, with that idea, I reserve the movie rights.

    themagician
     
  3. moneykz

    moneykz Junior Member

    Joined:
    Mar 8, 2008
    Messages:
    197
    Likes Received:
    31
    These companies and the government have no clue.

    Why lock these guys up. The companies should have a contest. Give the right hacker $10k to break into the system and then pay them to fix the hole.

    I can never understand the logic.
    Companies need to worry about fixing there security and no about locking up great minds.
     
  4. knungchucks

    knungchucks Registered Member

    Joined:
    Jan 4, 2008
    Messages:
    62
    Likes Received:
    45
    Location:
    Yizzo Blizzo
    Great post, this kinda stuff fascinates the shit outta me, how do they do this kinda stuff ..
     
  5. oldenstylehats

    oldenstylehats Elite Member Premium Member

    Joined:
    Apr 10, 2008
    Messages:
    1,893
    Likes Received:
    1,196
    This post was essentially stolen from a year old blog with no credit given to the original author. It even made front page of Digg last year.

    Code:
    hxxp://digg.com/security/Top_5_Black_Hat_Hackers_of_All_Time
     
  6. MiLiTARYiV

    MiLiTARYiV Senior Member

    Joined:
    Jan 9, 2008
    Messages:
    959
    Likes Received:
    595
    Occupation:
    Webmaster
    Location:
    The Office
    Well thats easy.. If they were following the Law they wouldnt need to worry about hiring somebody to plug the exploit.

    So what they do is lock them up which will save money because they dont have to pay hackers and also it will discourage other hackers from hacking
     
  7. The Scarlet Pimp

    The Scarlet Pimp Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 2, 2008
    Messages:
    788
    Likes Received:
    3,123
    Occupation:
    Chair moistener.
    Location:
    Cyberspace
    They left out John "Captain Crunch" Draper. Remember him? He's the phreaker who tapped the phones of the law enforcement offices, and they only caught him when they noticed they could hear their own voices on his phone lines!

    TSP
     
  8. yuemyutu

    yuemyutu Registered Member

    Joined:
    Apr 5, 2008
    Messages:
    67
    Likes Received:
    728
    Location:
    CA
    The best hachers ever are Turkish hackers and then Russian hackers.
     
  9. The Scarlet Pimp

    The Scarlet Pimp Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 2, 2008
    Messages:
    788
    Likes Received:
    3,123
    Occupation:
    Chair moistener.
    Location:
    Cyberspace

    The russkies keep trying to break into my domain...

    TSP
     
  10. TheStickiest

    TheStickiest Newbie

    Joined:
    Mar 14, 2008
    Messages:
    24
    Likes Received:
    33
    original blackhat techniques are hard to create without complete inside out knowledge of the white hat infrastructure
     
  11. TheStickiest

    TheStickiest Newbie

    Joined:
    Mar 14, 2008
    Messages:
    24
    Likes Received:
    33
    i believe that most people will never hear about the very best hackers... because they will remain invisible...

    but even the best lose sometimes
     
  12. The Scarlet Pimp

    The Scarlet Pimp Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 2, 2008
    Messages:
    788
    Likes Received:
    3,123
    Occupation:
    Chair moistener.
    Location:
    Cyberspace