In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.
Not all hackers are bad. The good ones are called “white-hat hackers” and use hacking to improve computer security. The ones who are just having fun are called “gray-hat hackers.” But the malicious kind you’re thinking of? They’re called “black-hat hackers.”
And they can cause a lot of harm, as history has shown. Here are some of the most infamous and nefarious “black hatters,” what they did to earn their reputations, and where they are today.
1. Kevin Mitnick
The U.S. Department of Justice called him the “most wanted computer criminal in U.S. history” — that’s how notorious he was. Kevin Mitnick’s story is so wild that it was even the basis for a featured film: Track Down.
What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for three years of supervised release. But near the end of that period, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.
Where is he now? Mitnick was eventually caught and convicted with a five-year prison sentence. After fully serving those years, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.
2. Jonathan James
The story of Jonathan James, known as “c0mrade,” is a tragic one. He began hacking at a young age, managing to hack into several commercial and government networks and being sent to prison for it — all while he was still a minor.
What did he do? James eventually hacked into NASA’s network and downloaded enough source code — assets equaling $1.7 million — to learn how the International Space Station worked. NASA had to shut down its network for three entire weeks while they investigated the breach, costing an additional $41,000.
Where is he now? In 2007, several high-profile companies fell victim to numerous malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes he didn’t commit.
3. Albert Gonzalez
Gonzalez started off as the leader of a hacker group called ShadowCrew. In addition to stealing and selling credit card numbers, ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes
What did he do? Albert Gonzalez paved his way to internet fame when he collected over 170 million credit card and ATM card numbers over a period of two years. He then hacked into the databases of TJX Companies and Heartland Payment Systems to steal all of their stored credit card numbers as well.
Where is he now? Gonzalez was sentenced to prison for 20 years (two sentences of 20 years to be served simultaneously) and is scheduled for release in 2025.
4. Kevin Poulsen
Kevin Poulsen, also known as “Dark Dante,” earned his 15 minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was the “Hannibal Lecter of computer crime.”
What did he do? Poulsen got himself onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. He was later captured in a supermarket (of all places) and sentenced to 51 months in prison and a bill for $56,000 in restitution.
Where is he now? Poulsen changed his ways after being released from prison in 1995. He began working as a journalist and is now a senior editor for Wired. In 2006, he even helped law enforcement to identify 744 sex offenders on MySpace.
5. Gary McKinnon
Gary McKinnon, known as “Solo” on the internet, allegedly coordinated what would become the largest military computer hack of all time.
What did he do? Over a 13-month period from February 2001 to March 2002, McKinnon illegally accessed 97 computers belonging to the U.S. Armed Forces and NASA. He claimed he was only searching for information on free energy suppression and UFO cover-ups, but according to U.S. authorities he deleted a number of critical files and rendered over 300 computers inoperable, resulting in over $700,000 in damages.
Where is he now? Being of Scottish descent and operating out of the United Kingdom, McKinnon was able to dodge the American government until 2005, when he faced extradition. After a series of appeals, Theresa May blocked his extradition on the grounds that he was “seriously ill” and that extradition would be “incompatible with [his] human rights.”
6. Robert Tappan Morris
Robert Tappan Morris picked up his knowledge of computers from his father Robert Morris, who was a computer scientist at Bell Labs and later the NSA. Morris is credited as the creator of the world’s first known computer worm.
What did he do? In 1988, he created the Morris Worm while a student at Cornell University. The program was intended to gauge the size of the internet, but it had a flaw: computers could be infected multiple times and each infection caused the computer to slow down even more. It rendered over 6,000 computers unusable.
Where is he now? In 1989, Robert Tappan Morris was found to have violated the Computer Fraud and Abuse Act. He was sentenced to three years of probation, 400 hours of community service, and a $10,050 fine. He eventually founded Y Combinator and is now a tenured professor at the Massachusetts Institute of Technology.
7. Loyd Blankenship
Loyd Blankenship, known as “The Mentor” in hacking circles, has been an active hacker since the 1970s. He was a member of several hacking groups in the past, most notably Legion of Doom (LOD).
What did he do? Blankenship authored an essay called Mentor’s Last Words (also called Conscience of a Hacker and Hacker Manifesto), which he wrote after being arrested in 1986. The essay has come to be seen as a kind of cornerstone for hacking culture.
Where is he now? Blankenship was hired by Steve Jackson Games in 1989 to work on GURPS Cyberpunk. The U.S. Secret Service raided his home in 1990 and confiscated the game’s rulebook, calling it a “handbook for computer crime.” He has since given up on hacking, now living as a musician and freelance game developer.
8. Julian Assange
Julian Assange began hacking at the age of 16 under the name “Mendax.” Over four years, he hacked into various government, corporate, and educational networks — including the Pentagon, NASA, Lockheed Martin, Citibank, and Stanford University.
What did he do? Assange went on to create WikiLeaks in 2006 as a platform for publishing news leaks and classified documents from anonymous sources. The United States launched an investigation against Assange in 2010 to charge him under the Espionage Act of 1917.
Where is he now? Assange is currently holed up in the Ecuadorian embassy in London, fearing extradition to the United States.
9. Guccifer 2.0
Who is Guccifer 2.0? Nobody knows for sure — it could be a person or a group masquerading as a person. The name pays homage to a Romanian hacker (known as “Guccifer”) who often targeted U.S. government officials and others of political prominence.
What did they do? During the 2016 U.S. Presidential Election, the Democratic National Convention’s network was hacked Thousands of documents were leaked on WikiLeaks and elsewhere. Many believe that Guccifer 2.0 is a cover for Russian intelligence, but in an interview with Vice, Guccifer 2.0 claims he is Romanian and not Russian.
Where are they now? Guccifer 2.0 disappeared just before the U.S. Presidential Election, then reappeared once in January 2017 to assert that he had no ties to Russian intelligence.
Anonymous may be the most well-known “hacker” of all time, yet also the most nebulous. Anonymous is not a single person but rather a decentralized group of hackers with no true membership or hierarchy. Anybody can act in the name of Anonymous.
What did they do? Since its debut in 2003, Anonymous has been credited for attacking several notable targets, including Amazon, PayPal, Sony, the Westboro Baptist Church, the Church of Scientology, parts of the dark web and the governments of Australia, India, Syria, the United States, among dozens of others.
Where are they now? Anonymous continues its hacktivism to this day. Since 2011, two related hacking groups have spawned from Anonymous: LulzSec and AntiSec.
Staying Safe Against Modern-Day Hackers
If you’re afraid that a hacker like one of the above will ruin your life, don’t worry. They prefer to go after big organizations and entities. But you should be wary of another kind of hacker: one who wants to steal your data for personal gain. To stay protected, be sure to heed these expert security tips and avoid these common password mistakes .
Which of these hacker stories do you find most interesting? Are there any other world famous hackers that we overlooked? Let us know in the comments below