Top 10 Most Dangerous Hackers of world

author wpshopmart 24 May 2016

Top 10 Most Dangerous Hackers Groups of world

In today’s advanced digital age, nobody is aware of however to store knowledge on a chunk of paper. Every side of our lives, vital or not thus important, is saved on a computer. This computer, in turn, is connected with every alternative pc on the planet through a fancy

In today’s advanced digital age, nobody is aware of however to store knowledge on a chunk of paper. Every side of our lives, vital or not thus important, is saved on a computer. This computer, in turn, is connected with every alternative pc on the planet through a fancy internet of networks. Security of our knowledge on the pc is often been a raging dialogue with many individuals making an attempt to steal data by hacking into systems.

Hackers have existed for as long as computers themselves, whose core fundamental is to realize a loophole within the ADPS and exploit it to their profit. The ultimate loser is United States of America, the user, where our hard-earned cash, passwords or personal data is very vulnerable. Not all hackers are dangerous although, thusme are smart and attempt to guard United States of America wherever as some don’t seem to be so kind.

This list, lists down the top ten hackers of all time WHO have caused the utmost quantity of injury to our personal knowledge and have raised huge question marks with regards to net and pc security.

1. Jonathan James


Jonathan James has been attributable with being the 1st juvenile to be incarcerated for cybercime within the us. He was aged 16, when charged with hacking into the pc systems of the Defense Threat Reduction Agency, a division of the Department of Defense. He installed a backdoor into the DTRA server that allowed him access to all sorts of communication in and out of the pc system and various usernames and passwords. He also hacked in the National Aeronautics and Space Administration systems and scarf softwares that controlled essential life sustaining instrumentation on-board area ships.
James was later traced and inactive however since he was a minor, faced six months of house arrest, probation till he turned eighteen, made to apologise to all the departments that he hacked into and was prohibited from employing a pc for recreational use.
In 2007, when the division store, TJX reported a hack into their pc system and a compromise of sensitive client data, the Secret Service include Jonthan’s name within the list of these believed to be a neighborhood of the act. Although no proof was found against dessert apple, he was still not dropped from the list of suspects that crystal rectifier him to ultimately kill himself in 2008. His suicide is believed to be caused due to tall the mental pressure he was being made to undertake for against the law he believed he was ne’er concerned in.

2. Kevin ‘Dark Dante’ Poulsen

Kevin Poulsen has two attributes that create him stand out from the rest of the hackers. He was the first yank WHO was created to serve a web and pc ban once being free from jail and was had gained a specialty in hacking solely through phonephone lines. He first gained attention once he hacked into Associate in Nursing L.A. radio network so that he can be the 102nd caller and would win a brand new Porsche. He had also reactivated all recent Yellow Page escort service phone numbers thus that his friend might operate a virtual escort service. When his name once came up in a TV program referred to as unsolved Mysteries, the 1-800 numbers of the TV station mysteriously crashed.
After being free from jail, Kevin decided to place away his past and instead became a journalist. He is currently the senior editor for Wired News and his most notable article is wherever he managed to get a listing of sex offenders from MySpace. His article led to one arrest.

3. Nashon Even-Chaim

Also legendary as Phoenix, Nashon Even-Chaim is known to be one in all the foremost adept and self-important hackers at intervals a bunch of hackers referred to as ‘The Realm’ that was primarily based out of Melbourne, Australia. Nashon’s investigation was centered around hush-hush police investigation Associate in Nursingd informants attributable to an undeveloped crime wing at intervals Australia within the 1980’s. His arrest was the first within the world wherever remote knowledge intercept was employed in order to realize proof for a pc crime prosecution.
Nashon’s prime targets during his active years was the Commonwealth Scientific and Industrial analysis Organisation, University of California, Berkley, NASA, Execucom, Lawrence Livermore National Laboratory, University of Wisconsin-Madison and Purdue University. After unleash, Nashon is now chasing a career of music and declines to move with the press and media.

4. Adrian Lamo

Many hackers do what they do to earn cash and fame and square measure thence called ‘Black Hat’ hackers wherever as people who eff to boost net security and to stop the Black Hats from getting into square measure referred to as ‘White Hat’ hackers. Adrian Lamo, on the other hand, has been known as a ‘Grey Hat’ hacker since he has done work for either aspect.
He first gained attention once he managed to hack into the systems of several high-profile firms like Yahoo, Microsoft, The New York Times and lots of others. When Lamo was inactive for breaking into their systems unauthorized, he claimed that he has done these companies a favor by light the loopholes in their system and has truly saved them a heap of cash. Lamo serving a 6-month detention term and was made to paid $65,000 in fine for his acts.
In 2009, Lamo once again came within the news for his alleged role in Wikileaks and his role in serving to give sensitive material to the web site. Lamo later uncovered the role of a U.S. Soldier PFC Bradley Manning WHO has been misusing his role to collect classified knowledge and marketing it to Wikileaks. Adrian has claimed he has done so as a result of several lives were in danger since Manning was active on-duty once he did this. Lamo has ever since been keeping a low profile and fears for his life after the Manning episode.

5. Kevin Mitnick

We typically watch movies showing hackers doing insane things on their computers, law enforcement agencies chasing them down and also the journalism covering as of it. Kevin Mitnick’s story is quite almost like any Hollywood Hacking Movie. At the time of his arrest, he was the most wanted person in relevancy pc crimes.

His first brush with hacking came regarding once he learnt the idea of social engineering and learnt of a system to bypass the Hollerith card system on the L.A. bus. At the age of 16, he hacked into various pc systems and repetition softwars, an allegation for that he was charged nine years later in 1988. Having made to serve twelve months in jail and 3 years of supervised unleash, Mitnick continued to hack into numerous systems for that recent charges were framed against him. Mitnick fled and was on the run for quite two and a [*fr1] years victimisation cloned cell phones to cover his location. Mitnick was finally arrested in 1995 and sent to jail for four years in 1999.

Mitnick’s conviction gained a lot of media coverage and controversies. His prison term was in confinement once the decide was convinced that Mitnick will begin a nuclear war just by whistling into a communication system to activate NORAD’s codes. His conviction has also been infernal by over-exaggeration by the media on his capabilities and information of what computers square measure capable of doing.

After unleash, Mitnick now runs Associate in Nursing IT security company referred to as Mitnick Security Consulting LLC that helps firms forestall hackers from infiltrating their system. He is also Associate in Nursing informatory member and on the board for several IT and security firms.

6. Albert Gonzales

The only motive for Prince Albert Gonzales was to create cash, a lot of it and extremely quick. Gonzales started a cluster of hackers referred to as because the Shadowcrew group. There were quite 4,000 members on the website WHO assisted in trafficking one.5 million credit, debit and ATM card numbers. The website educated it’s users on the way to sell these cards, create faux documents and a host of alternative things they required to grasp. Gonzales avoided a jail term by spilling the beans on the Shadowcrew group and providing data of all this associates.
From mid-2005 to the ending of 2007 Gonzales managed to hack into the computer systems of the TJX cluster of outlets servers and steal over forty five million card details. He and his crew were able to pull it off by victimisation unsecured wi-fi connections on U.S. Route 1. Gonzales was finally arrested in 2008 and is presently serving a jail term, which is due to finish in 2025.
Albert Gonzales was legendary for having a lavish way, staying for days in fancy hotel rooms and throwing a $75,000 birthday party.

7. Gary McKinnon

Gary McKinnon has been tagged by the media for carrying out the most important pc hack of all time and being one in all the foremost dangerous pc hackers within the world. He has been credited with carrying out the most important and most dangerous attack on the U.S. military computer servers and deleting important data, softwares, data and files over a amount of one year while sitting in London. His actions have costed the U.S. government more $70,000 for undoing whatever McKinnon had done. His act had left thousands of computers inoperable for a period of twenty four hours. McKinnon argues that he carried out this activity to uncover information that the U.S. government may be concealment from the final public like technology and also the chance of extra-terrestrial life.
Investigation against McKinnon started in the year of 2002 with the U.S. government demanding Associate in Nursing surrender. McKinnon and his lawyers have long countered the extradition to the U.S citing the possibility of beastly conditions in America, health grounds and stating the lack essentially to face trial within the U.S. The debate of whether or not or not McKinnon ought to be extradited to the U.S. is still raging within the parliament with the likelihood of his trial happening at intervals the united kingdom.
Recently he turns into a search expert (Source: BBC News)

8. Michael Demon Calce

Today net security is very tight and websites square measure very explicit regarding the safety of their knowledge and their client data. Much of today’s tight net security is all due to Associate in Nursing act that Michael Demon Calce incontestible back within the year 2000. At the time, Yahoo! was the foremost popular web site on the net and was the most used computer programme. Calce targeted the Yahoo! systems and shut down the service for quite an hour. He also went ahead and shut down ebay, Amazon, Dell, CNN and a host of other leading websites.
Calce was later arrested once he was found bragging regarding his achievements on Associate in Nursing net chat forum and disclosed bound details that wasn’t created public and no-one else would remember of. Since he was a minor, the Canadian courts let him off lightly with eight months of open custody, one year of probation, a small fine and a restricted access to the net. Since the American economy took a huge hit with Calce’s action, IT giants took note of the fact that Associate in Nursing underage adolescent will hack into their systems that eventually sealed the method for contemporary security measures.
Later, Calce admitted that only the Yahoo! Infiltration was a planned one and the rest we have a tendency tore distributed on ‘auto-pilot’ mode by the software package that we was victimisation once he left his portable computer on once he left for college. Calce is today a journalist, author, consultant and speaker on the topics of net security.

9. Jeanson James Ancheta

Jeanson James Ancheta became the first person to be charged with dominant massive numbers of hijacked computers or botnets. Botnets were often used by hackers for malicious activity however Ancheta upped the sport once he promulgated his accomplishment and publicised his assortment of bots on numerous net chat rooms. He put up costs that he would charge individuals for rental out the machines and however several bots would one need to require down a definite quite web site. He supposedly hijacked additional than [*fr1] 1,000,000 computers victimisation botnets.
Ancheta was arrested in 2005 once a sting operation and was sentenced to a five year time, made to forfeit his automotive, all his profit and made to pay a fine for all the damages he caused.

10. Chad Davis

Chad Davis has been a part of 1 of the foremost high-profile prosecution of ‘cyber criminals’ within the late twentieth century. Chad Davis was a part of team of hackers WHO started globalHell, a syndicate of hackers. Their biggest achievement was for vandalising the White House web site homepage. Since Chad Davis was a minor at that time, he was not charged aside from a can of brewage found in his white goods. In retaliation to the arrest of fellow globalHell members, Davis took down the U.S. Military’s website with a message ‘globalHell can not die’ and closing it down for four hours. Subsequently Davis was taken in custody and was sentenced to six months in jail, three years of probation a fine and forbade him from victimisation a pc.
Upon release, Davis has been a speaker and often talks regarding the importance of net security. He is now a advisor and sometimes advises firms on the way to improvise their security against hackers.

A computer is still a machine, after all, made by humans and humans create mistakes. We may suppose that our emails and mastercard details square measure safe behind multiple security layers and passwords, but no one is excellent. We all create mistakes and it is these hackers that exploit human and error to their profit and steal our valuable knowledge. Humans are evolving and in today’s electronic world, we cannot presumably revert to the paper and pen methodology of knowledge storage. There is nothing much that we are able to do regarding it except being cautious and guaranteeing that where our knowledge is keep, it is within the hands of somebody who is a smaller amount possible to snap to a bunch of cash and power hungry hackers. I hope you enjoyed the post. If you know the other such hackers. Do let me grasp via comments.

One thought on

Leave a Reply

Your email address will not be published. Required fields are marked *

Join Our Newsletter

Email *

If you have any query or problem then feel free to ask us here. Guaranteed customer satisfaction with prompt support