Russian hackers against all. Find home hacker organizations Hacker companies

Golovna / Contacts

If I start talking about "almighty" and "uncatchable" hackers, I'll guess the famous phrase from "Operation "I"" by Gaidai: "There will be no stealing! Everything has already been stolen before us! treba zlamati castle, deprive the slіdi of the fault of the goods, і spokіyno pіti, not taking anything!".

Prote, all the same, one is convinced that everything is possible. Well chi mayzhe everything. Today, hacker attacks have become quite popular, that news about devilish evil is no more than a day, and fahivtsy are staggering, that the number of hacker attacks will only increase in the coming fate. The protégés of the actions of computer geniuses call for a strong sustained resonance and are forever forgotten in history. Read about the most hacker attacks.

Evil to the Pentagon

Kevin Mitnik is one of the first and most famous hackers. At 12 years of age, I learned how to recycle bus tickets and rolled around the city without any cost, after I got into the MakAvto voice alarm system and contacted purchases.

At 16 Rocks Kevin Zlamam in the company of Digital Equipment Corporation and the stars are right software security. In his misfortune, the programmer was caught by the police and sentenced to one fate, and three more fates, under the supervision of the police.

At student's rocky Mitnick, for the help of a TRS-80 computer with a processor of less than two megahertz zooms, penetrate into the front of the Internet, the ARPANet network, and reach the computers of the US Department of Defense. Well, fahіvtsі z security shvidko fixed with evil, nevdovzі Mitnik vilified and ruled to the right center for young people.

After that, the FBI agents called Kevin to provide documents, cloning mobile numbers that series of evil. Then the young hacker was again sentenced to jail. After leaving the country, Kevin Mitnik wrote a few books about hackers, and in 2000, he played the film "Evil" on the screen, based on the motives of his biography. Narazі Mitnik vodіє vodіє kompanієy, yak zayavlyaetsya kompyuternoyu zpekoy.


Volodymyr Levin and Citibank

In 1994, the Russian hacker Volodymyr Levin managed to hack the Citibank payment system and transfer it to accounts to the USA, Finland, Israel, Germany and the Netherlands for over 10 million dollars. Most of the operations were blocked, a part of the pennies - close to 400 thousand dollars - I didn’t know that.

In the past, the St. Petersburg hacker was attacked and extradited to the USA, de yogo was sentenced to three years of freedom. After a certain hour, information appeared that the access to the internal system of the bank had been taken away as a group Russian hackers, yaka sold the evil algorithm to Levin for 100 dollars

Attack on NASA servers

Jonathan James became another young computer genius, who, in his 15 years, managed to break up the system of his school, use the Bell South telecommunications company and navit servers of the US Department of Defense. On a simple "penetration" on a classified server, the hacker did not succumb - having sifted through close to three thousand sheets of spivrobnitniks and found NASA software for managing the International Space Station.

James was quickly slandered and slandered, and through his incomplete age of punishment, he fared away. It's true, the hackers called the evil chain of TJX stores for a little while: the investigators carried out a search of James' booth, but they didn't know anything. The hacker himself is suicidal, that he was sued for virushiti for grati and the only way out of the situation and suicid. I wrote in my suicide note not to believe the system of justice.

Chelyabinsk hackers PayPal

Russian hackers from Chelyabinsk, Vasil Gorshkov and Oleksiy Ivanov, went into 2,000 hacks to break the payment systems PayPal, Western Union and a lot of others - less than 40 companies in 10 US states. Hackers stole $25 million out of 16,000 credit cards.

In order to apprehend the evildoers, the FBI organized a front company in the United States, where Gorshkov and Ivanov arrived. As a result, they were sentenced to three and a few fates of free will apparently. The activity of the FBI called out an international scandal, through which the agents of the Chelyabinsk FSB slandered their American colleagues.


Testimonies about UFOs and the release of critical files

The British hacker Gary McKinnon is reminiscent of the fact that in 2001, a number of hackers hacked close to a hundred computers of the US Department of Defense and NASA and removed critically important files from the system, due to which the ministry's activity was actually pinned to the target. It seems that the hacker also erased information about the American attack after the terrorist attacks on 11 September 2001.

McKinnon himself said that he had scoured secret computers for information about the acquisition of a wide circle of information about UFOs and alien civilizations. Also, I made sure that I removed access to non-protected machines and left comments about її strife in the order.

Under British laws, however, the hacker was threatened with only six months of imprisonment, while in the United States they wanted to “vistify” even a three-term term. Nezabar McKinnon was frightened and revealed in him a form of autism and clinical depression, which could lead to self-destruction. Let's do it to the public outcry of the cієї, pіdtrimtsі mіnіchі famous osіb ta rizika for life, at the same time in 2012 the information about the extradition of the hacker in the USA was taken out, and the criminal reinvestigation was charged - at once Gerry McKinnon, as before, in the wild.

Windows Exit Code Catch


2004 Microsoft said about those who had stolen 600 million bytes, 31 thousand files and 13.5 million rows of code operating system Windows 2000. All data appeared in for critical access in measure. At some point in the corporation, they were convinced that it was being made through the partner company Mainsoft, but suddenly it became clear that the data had been stolen directly from Microsoft.

Until that moment, the corporation had already been working in the direction of a further development of its operating system, the hacker attack did not bring great financial losses, but Microsoft specialists, and the FBI did not know how to blame the culprit, and the company gained a reputation for it.


Attack on Estonia

In April 2007, a cyberattack was carried out across the whole country: hackers hacked the websites of almost all state authorities, as well as news portals, after which the robot was downed for two days. In addition, the bankers were attacked, and the people of Estonia were blamed for problems with transferring penny koshtіv.

In order to establish the practicality of their systems, Estonia had a chance to connect to the internet for a certain hour. This cyberattack is called one of the largest in history.

Cicavo, scho evil was seen on the aphids zagostrennya between Estonia and Russia through the transfer of the military burial hours of the Other Holy War and the monument to the Radyansky warriors from the center of Tallinn.

Estonian fahіvtsі stverdzhuvali, scho attack lead to Russia, and deyakі IP-address vzagalі point to the Kremlin. In Russia, one hour they said that, better for everything, htos podminiv IP, schob to discredit Moscow.


Burial million

American Cuban hacker Alberto Gonzalez in 2009 carried out a series of attacks on the Heartland Payment System and robbed dozens of millions of credit cards. In addition, after that, law enforcement agencies, a hacker, who also hacked the TJX Cos, Bj'S Wholesale Club and Barnes & Noble, got into it. Dani z cards Gonzalez reblowing through the group created by him ShadowCrew.

Having earned close to 10 million dollars with the help of wine, the prote sledchi knew only one million, which was buried in the garden of the father of a computer genius. Alberto Gonzalez was sentenced to 20 years of pardon.

Computer chrobak for nuclear reactors

In 2010, the Stuxnet computer chroback penetrated into the nuclear system management of Iran and often played out of tune - the program downloaded five parts of the centrifuges and copied the recordings from the video warning cameras so that the security guards did not delay the negativity.

After a successful attack, it appeared that the virus was being split up by the intelligence services of Israel and the United States for the counter Iranian nuclear program. Experts from the Kaspersky Lab have turned into a worm a prototype of a new kind of cyberspace, which could cause a new race of destruction.


Anonymous and a series of attacks

One of the most popular groups of hackers is Anonymous. A group of impersonal great attacks were attacked by a group of impersonal great attacks, as if they sent a serious shkodi to their victims.

In 2010, Anonymous organized the “Vidplata” campaign, as part of which it attacked the Visa, PayPal and MasterCard systems through those that you were instructed to make payments to the WikiLeaks website. Through the crack, the hackers ratcheted up the social turmoil under the code name “Zhope Wall Street” and brought down the New York Stock Exchange website.


In September 2012, as a sign of protest against the closing of the MegaUpload site, hackers from this group carried out the largest DDoS attack, violating the sites of rich US institutions and record companies for a while.

In 2013 Anonymous groups attacked the sites of Israel, and during the Ukrainian crisis, they launched attacks on the sites of Russian ZMI and Russian government structures.

The first hacker in the SRSR

In 1983, in the USSR, the first in the history of evil in the sphere of high technologies was hacked into the software at AVTOVAZ, after which the assembly line stopped for three days. Vinik's precedent: swindled malice, for which no punishment was given.

Shkolyar, who was a badass for the CIA director, then a badass for the FBI director

The hacker, under the pseudonym Cracka, recently took on himself the responsibility for the evil of CIA Director John Brennan's AOL account and angered the data, which was found in the mail of the head of the research department of Wikileaks. Now Cracka has declared that Brennan is not the last victim of yoga. The hacker stverzhuє, scho zlamav intercessor FBI Director Mark Giuliano (Mark Giuliano) that yoga squad.

Cracka posted on his twitter post on Pastebin and Cryptobin (password: cwa), grafting readers from 5 leaf fall. Reported information (PIB, addresses, email, plant) about 3,500 civil servants: military, police and officials is sent for messages. The hacker insists that not all of the information is, as far as I can tell. The Pastebin resource has already removed the publication.

So the burglar is stupefying, that he zoomed in on the special intercessor of the director of the FBI, Mark Giuliano (pictured above), who earlier robbed himself very aggressively and declared to the evil postal screen of the director of the CIA. Zokrema, Giuliano announced that there were hackers and thieves from the CWA (Crackas With Attitude) group, before Cracka, an ostentatious butt, entered. Calling on everything, the hackers were angry.

Podlitok also stated that youma was able to know the number of Giuliano's mobile phone and repeat those that were previously broken with the director of the CIA: call you.

“I phoned and asked Mark, and he was like this: “I don’t know who you are, but now you better be careful.” I lifted the cradle. After continuing to call, I freaked out and stopped talking, - I told Cracka journalists about Motherboard, after talking to them in the chat. “We chose yoga as our method, not for the sake of someone else, we chose yoga as our method, for the FBI (sic) we are vigilant.”

Representatives of the Federal Bureau of Investigation of the situation commented on the situation, so the very same as і confirm or ask the fact to the evil Giuliano.

Anonymous is an international group of hackers who have been working on malicious sites in government organizations for a long time.

People of legend

Hackers from the Anonymous group at once in the world. Not the hackers themselves, obviously, but rather their shares. Ale, how did everything start and how did the stench set the goals?

At their first stage of development, Anonymous used their method to free the Internet and develop. The stench easily gave DDoS attacks to the servers of the right-holders, carried out various hot events and not called actions, and all of a sudden the purchase of amateurs grew to a decent level and turned into Anonymous, an international organization of hackers, which aimed to strike a fuss on the order of the rich countries. Cyber ​​attackers easily attack the most secure sites, such as the resource of the CIA, or the Pentagon.

In fact, the Anonymous group of hackers is so successful and doesn’t spy on anyone who lives among the members of the group without any profit, and all the chatting is done virtually. These guises are forever attached to the masks of Guy Fawkes in the film "V for Vendetta". In addition, Anonymous-hackers spread all over the world from Great Britain to China, which has no chance of it. The police can arrest 2-3 cases, but the organization does not know the particular case.

Groups of anonymous hackers have managed to get away from all the different corners of the world. I Russia is not a fault. The Russian Federation has a separate group Anonymous Russia. Like in the skin organization, what do you think, Anonymous has its own Twitter account, de stink to tell people about the rest of the promotions on that plan.

Anonymous and ISIS

Recently, Anonymous hackers denounced war (IDIL), a terrorist organization of Muslims. Umіltsy hacked close to 5000 oblіkovih records of fighters. Tse allowed them to find out, de militants plan to carry out terrorist attacks. They anonymously published the results of their activities, and the world trembled. France, Italy, USA, Lebanon, Indonesia were among the fortune-telling targets. Narazi deyakі hackers closely spіvpratsyuyut іz special services vyshchezdanannyh kraїn, schob not to allow the tragedy.

Under the hour of the war of hackers from IDIL distal and Turkey. President Turechchini Erdogan, Anonymous-hackers found out how loyally to be put and denounced Turechchini's order come in at the police station. Bulo carried out a series of attacks on the servers in a row, after which the stench turned out to be blocked. In addition, Anonymous accused the servers of Turkish airports and banks and completely paralyzed their work.

Deyakі experts in IT-security vvazhayut "war" Anonymous against ІДІL non-serious occupations. As one of the fakhivtsiv said, “especially shoddi stench alone didn’t hurt one and it’s unlikely to hurt, shards on the offending sides are incompetent in the plan of defending the evil people.” True, these words rarely go apart, as it is easy for hackers to attack sites differently.

Anonymous and China

Okrim IDIL, a group of hackers Anonymous has attacked China. Hackers did not dominate the order of China until the freedom of the Internet and freedom in flames. As a result, the stench broke close to 500 sites that belonged to the Chinese order. The sites were blocked for a long time, and the replacement of information by the Communist Party of China on them was a way to bypass the blocking of non-essential information, which was carried out by the "repressive order".

Official China itself does not confirm attacks on its servers. Prote fact is obvious. Anonymous urged the people of the Middle Kingdom to fight against censorship and the exchange of freedom. On the official Anonymous channel on Twitter, hackers call out to the people of the country to stand up and, together, continue to attack the Communist Party's servers, until the "regime is not in the way."

A blow to Russia

Not missing the interest of hackers and Russia. The Russian organization Anonymous hacked the Kremlin's websites. The truth is, the hackers didn’t give a damn, but it was more of a show of force. Taking away access to special data officials, hackers could piss everyone off. And then singsongly slammed a bi-chergovy scandal.

Prote deshcho penetrated. Crimea official Kremlin site, Anonymous-hackers hacked into the site of the Nashi organization, as if in their time, Volodymyr Putin was actively poking through. And here there are more cited data about financial support for agitation of the population Russian Federation. The hackers denounced the viklasty in the measure that the history of the dark rights of the party "United Russia", as if "Nashi" did not accept their propaganda.

It's true, the children begin to get cold and preemptive political motive. Not long ago, hackers from the Anonymous group released information that did not show any serious criticism, it was Russia itself, not Ukraine, that blocked the water in Crimea. Behind these words, Russia specially turned on the pump and paralyzed the water supply, ringing in this Ukraine, so that they could raise their rivulet in the Crimea. The admission more lower is absurd.

Other countries

Anonymous-hackers did not miss their respect and other powers, which called out to them and others of their dissatisfaction. They carried out hundreds of attacks on websites. The website of the Prime Minister of Japan, for example, was inaccessible for more than three hours. The United States only recently revoked the CIA server after their attacks. And in London, hackers hacked the servers of all Visa and MasterCard companies. In Canada, sites were also attacked in a row. I know, after all, the United States has fallen under DDoS attacks on the website of the Church of Scientology. It seems that Anonymous voted for the war not only on IDIL, but on China, but on the other hand, in the usm kraina and the orders.

Deputy Uz'yaznennya

Anonymous oppose with their own preferences. Attack the good defenses of the servers of the various powers - to the right to finish the clap of that cotton. It’s only those who spread burglars around the world, and it’s not so easy to break them. Ale traplyayutsya and fail. For example, two people were arrested in London during the attack on MasterCard and Visa.

Hackers from the Cobalt group, like in 2016, were attacked by ATMs in Taiwan and in Thailand by the widows of pennies, in the first half of 2017, over 250 organizations around the world were attacked, spreading sheets in the name of Visa and MasterCard

Photo: Markku Ulander / Lehtikuva / TARS

'The Cobalt hacker group, in the presence of large-scale attacks on financial institutions, as a result of which ATMs began to see pennies, and in Russian origin, in 2017 significantly expanded the sphere of activity. It is clear to the world who specializes in the field information security Positive Technologies (RBC), in the first half of 2017, Cobalt sent out phishing lists to get rid of infected files, more than 3 thousand. employed from 250 companies in 12 countries of the world. The list of traditional destinations for Cobalt, which are located in the CIS, the lands of Northern Europe and Pivdenno-Skhidnoy Asia, was reached by companies, roztashovanny in Pivnichniy America, Western Europe and Pivdenniy America Argentina, Zokrema. In the sphere of interests, the grouping is not only banks, but also stock exchanges, insurance companies, investment funds and other organizations.

How do experts establish methods for hackers to evolve. Now the first attack is on banks, Cobalt is attacking the infrastructure of its partners in the future - a quarter of all attacks fall on government organizations, industrial companies, telecom operators and enterprises in the field of medicine. “Attacks on non-financial organizations are being launched in order to prepare a springboard for offensive attacks on banks. For example, attackers can send phishing lists in the name of a regulator or a partner to a bank for which they provide services,” Oleksiy Novikov, intercessor of the director of the Positive Technologies Competence Center for Expert Services, explained. Vіn designates that credit and financial organizations are richer than protection against cyber threats, lower state organizations and business enterprises of the industrial sector. “They are constantly building up their defense mechanisms through parts of the attack on their infrastructure, it’s easier for the attackers to break the infrastructure of the counterparty to the bank or the state organization in order to launch a direct attack on the bank,” Novikov says.

Attacks on the credit and financial sphere, on which 75% of the successful efforts of hackers from their team, have become vile. The grouping of mass overpowered phishing lists from subdomains that mimic the alerts of Visa, MasterCard, the cyberattack response center in the financial sector of the Central Bank of Russia (FinCERT) and the National Bank of the Republic of Kazakhstan, was expanded by Positive Technologies. For these purposes, Cobalt has won at least 22 subdomains that imitate the websites of great financial organizations and their counterparties.

Who is who

The most unsafe for the bank's expertise pools of experts in the group are Lurk, Buhtrap, Carbanak, Lazarus.

The hackers from the Lurk team, who created a one-time banking trojan, could steal over 1.7 billion rubles from the accounts of Russian banks, the first time in 2016, the MVS and the FSB were captured by the MVS and the FSB. Law enforcement agencies have arrested nearly 50 cases related to this group, which have blocked fictitious payments for 2.3 billion rubles.

The Buhtrap group was flagged by experts in the field of information security in 2014. For the sake of cyber threats from Group-IB, which specializes in attacking, from April 2015 to the end of 2016, hackers stole 1.8 billion rubles from bank accounts of Russian banks, creating 13 successful attacks. Among the victims, Metallinvestbank and the Russian International Bank opined. Zlochintsy sent fake notifications to the victims that they avenged infected files in the name of the Central Bank. The most active group of experts from Group-IB and Positive Technologies will be joined by hackers from Cobalt. “Imovirno, part of the Buhtrap grouping or the main part of the skeleton moved to Cobalt. At the moment, Cobalt, insanely, is the leader behind the stage of unsafety for the business financial environment, as the most professional and technically advanced, ”Positive Technologies facsimiles say.

Kaspersky Lab has some thoughts that the Cobalt members are from the other unsafe grouping, Carbanak, the first attacks of which were fixed in 2013. “In 2014-2015, while stealing money from banks, the Carbanak program was victorious, for the operation of which a single infrastructure was needed - merezhev addresses. Then those addresses were zastosovulysya for managing the scrambled program, as it went to the warehouse of the scrambled software," said Sergiy Golovanov, a leading anti-virus expert at Kaspersky Lab. For this reason, the Carbanak group has about a hundred people exchanged, and the hits in її dіy have already exceeded $ 1 billion. For the average, one attack costs Russian banks tens of millions of rubles, even Golovanov.

Another group that purposefully attacked banks is Lazarus, which stole $81 million from the Bank of Bangladesh in 2016. Zgіdno zvіtom Group-IB, tsі hackers can be close to the power structures of the DPRK, shards robbed part of the attacks from the Pyongyang region of Potongan, the headquarters of the national defense committee of the DPRK was destroyed.

They called out a little uneasy and the hackers called Metel, as if at once, perhaps, they pinned their activity. The stench was active in 2011, and for a few years they could compromise accounts worth over $250 million.

How stink attack

A typical Cobalt attack consists of a number of stages, a representative of Positive Technologies reveals. Updated domains are registered on the back, yakі nibito lie great companies For example, Visa. We will then carry out phishing attempts at the addresses of the banks of those counterparties in order to avenge the file, call Microsoft document word. After receiving this deposit, the program is launched, so that the anti-virus systems will react to the virus. If something is taken care of by a Trojan, which allows you to organize remote access to the working computer of the practitioner of the victim company. Then the attackers can either develop an attack in the middle of an organization, or from a malicious work table of a sheet with a similar shkidlivim software to another organization.

“Our statistics show that in the average 20-30% of spivrobitniks open potentially unsafe investments, which threaten the entire security of the company. ale in to this particular type the number of letters was quiet, it turned out, it was 2-2.5 times higher, the fragments of the leaves were corrected in the name of the counterparty, and in the row of prompts they were written in the name of specific spokesmen, ”says Positive Technologies.

Ker_vnik for dynamic analysis code Group-IB Rustam Mirkasimov It seems that the main method of Cobalt, like before, is to steal pennies from financial organizations, but not only banks have effectively become prote hacker attacks. “Our Threat Intelligence system detected attacks on legal companies, insurance companies, information and novelty agencies, and leasing companies. It is worth fighting in order to protest the attack on the effectiveness of distant attacks on the banking infrastructure. Already, we’ve lost our way, since the infrastructure of the great integrator was defeated by the whole group for attacks on banks in Romania, Kazakhstan, Azerbaijan, Moldova, Russia, etc.,” says Mirkasimov. For yoga words, the average amount of stealing in one incident is close to 100 million rubles.

In 2016, the sums of Russian banks in the form of hackers deposited more than 2 billion rubles, having previously mentioned Artem Sichov, the intercessor of the head of the head department of security and protection of information from the Central Bank. The average cost of a cyberattack during this period in the world was $926,000 on average. for one financial organization, go to the head of Kaspersky Lab. At the same time, a medium-sized deal was paid to one bank for cyber security, for the company’s money, at the same time, it takes $ 58 million from the world, which is three times more, lower from non-financial organizations.

Spring 19 marks International Pirate Day. the site has circulated this year to its readers about current colleagues flibusteriv - about hackers.

On the back of the head, learn the meaning of this term. " Hack "- the English word meant the mass to understand from the wild meanings" shaving sharply. There were more nuances. The year of "hacking" has become a simple computer hooliganism.

"Hacker" is a hacker of sites and servers. Lyudina, who wins his mastery for different, sometimes obscene purposes. At the same time, for some it is an industry, and for others it is a lifestyle. Others are encouraged to call themselves not “hackers”, but “hackers”, for the sake of international spivism. The stench breaks the barriers of sports interest and, walking, often “patches the holes”. "Clean" hackers not only do not lead shkodi, but also bring mischief, pointing at the weak point of the system. I often shy away tse bezkorislivo. Sometimes and on the prohannya of the sergeant-major himself, who knows about the weaknesses of the month.

Most famous hacker attacks in the history of the Internet

Kevin Mitnick and the Pentagon. Whose American is a sing-song, most familiar hacker in the world, richly in what zavdyaks schiness to eccentric behavior, apparently the public was empty. Under the hour of his arrest at the 1995 roci Mitnik, categorically stating that it is enough for you to whistle at the earphone of a public pay phone to start a nuclear war.

Really, obviously, nothing of the kind was born in a moment, shards, let’s go and rightly break the impersonal defenses, but for the sake of this, I’m not like a brilliant program and supernatural code, but banal methods of social engineering, simply: human factor. Mitnik zastosovuvav not so much as a technical know-how, a little knowledge of psychology and manipulative people, frightening them to see their passwords.

Mitnik zlamav Pentagon on a computer with a processor less than 2 megahertz


Practice with Evil different systems Mitnick has risen from childhood. It seems that the 12-row city of wines knows a way to send bus tickets, which allows you to transfer around the city without any cost. Potіm vіn "recopying" keruvannya system voice call at the local snack bar "MakAvto", you should speak to the guides.

At sixteen fates, Mitnik broke the network of Digital Equipment Corporation and stole the software security there: it was for this fate that three fates were under the supervision of the police. At the same time, I got into the Pacific Bell voice mail system and after that, as soon as I signed a warrant for my arrest, vtik.

As a student, Mitnick used a TRS-80 computer to infiltrate the ARPANet global network, the frontier of the Internet, and through the Los Angeles University computer to reach US Department of Defense servers. The evil of fixing the young cybercriminal was shvidko revealed, the results of the investigation were carried out at the correctional center for young people.Tsіkavy fact: vіn zrobivtse on a computer with a processor less than 2 megahertz.

In 1999, the FBI agents, who stole Mitnik's name, insisted that there were fake documents and mobile phones with "cloned" numbers. At the result of yoga, the evil kilkoh computers rang telephone line she was sentenced to 46 months of imprisonment plus 22 months for brain damage; with all the heat about nuclear war, it was all the same for all the other months.

Kevin Mitnik wiyshov from 2003 roci and since that time, having written a few books about his hacker's reach. 2000 film "Evil" (Track Down) based on yoga biography, written by Tsutomu Shimomura and John Markoff, moreover, Shimomura was an expert in computer systems, whose computer was attacked by Mitnick. Today is Mitnik's 49th anniversary of the year and the year of his victory in the company of computer security.


Jonathan James and NASA. American Jonathan James is the first non-permanent hacker to be sued by the US for cybercrime. How the ringing sounded, at the 15th anniversary of 1999 the fate of the wines computer system Vlasnoi school, a network of telecommunications company Bell South, and then penetrated the server of the US Department of Defense. Here, having hopped over three thousand electronic sheets of spivrobitniks of state establishments, hacked the NASA server and hacked software security, recognized for managing life security systems at the International Space Station.

In 2000, James's brothers were arrested, however, for the sake of a young age, the guilt of guilty for two episodes in court for minors and the wounds of whom, without actually being convicted. Natomist vіn spent six months under house arrest and sent letters to the Pentagon and NASA. Yakby James is two years older, I threaten you with at least ten years of age.

Jonathan James at NASA at 15 Rocks


Tim, an hour later, through the years of Jonathan James, they became suspected in one computer scam: in 2007, credit card information was stolen from millions of customers in the TJX merchant, what evil.

Irrespective of those who did not show the call, James had no reprimands to spend until the pit, and (according to the official version) committing self-destruction. Having left his records of guilt, he declared that not to believe in the system of justice and to succumb to self-destruction is the only way to maintain control over the situation and to be punished for evil, which guilt is not repaired. In an interview, like James, having stolen data from TJX clients, he announced that we are a trusted computer security company. Natomist at vіtsi 24 roki vіn put his hands on himself.

Kevin Poulsen and KIIS-FM radio station. Another big hacker, who changed his mind to take, like Mitnik, more safe. In the 80s, Poulsen specialized in the evils of telephone lines and easily manipulated numbers and channels of various operators. In 1993, Poulsen became known under the pseudonym Dark Dante in 1993 after hacking the telephone line control system of the Los Angeles radio station KIIS-FM. As a result of the master blocking of the line vin, the Porsche 944 S2 became the winner of a number of competitions, and as the 102nd, having called, the car Porsche 944 S2.

At once, Poulsen slammed the senior editor's seat for Wired magazine.


In the field of the FBI, Poulsen, having used up secret databases of data for evil, yak retrieval of information about wiretapping of telephone conversations. In one of the documentary television programs Unsolved Mysteries, dedicated to unrevealed malice, it missed the guise, and yet again, in an unreasonable manner, all the telephone lines of the NBC television channel went out of tune, that no one could call Pole and all.

Prote polyuvannya, stunned by the FBI, has borne fruit: one of the employees of the supermarket recognized Poulsen and blocked yoga in the aisle of the store. Kevin was called from the evil telephone line and convicted of pennies and sentenced to five years of imprisonment, after which the computer was blocked for three years.

Following the exit from the 1998 roci Poulsen took up journalism and this year, he became the senior editor of the online version of the famous magazine about computer technology Wired.

Sven Olaf Kamphius and Spamhaus Project. Виходця з Голландії, власника провайдера CyberBunker, який надавав хостинг Pirate Bay, і видного діяча німецької Піратської партії, заарештували іспанська поліція в квітні 2013 року після серії потужних кібератак, які, за твердженням деяких фахівців, загрожували працездатністю всього Інтернету. On the right, the company CyberBunker and the company CB3ROB, which also belongs to Camphius, hosted not only torrent trackers, but also botnets, spammers and other suspect enterprises.

Kamphius launched an attack, threatening the robots of the entire Internet.


A massive DDoS attack on the Spamhaus Project servers came about after a company that specializes in computer security blacklisted CyberBunker and CB3ROB. At the same time, Kamphius, having voiced about the creation of the STOPhaus grouping, to what, for this reason, hackers have gone not only to the United States, Canada and Western Europe, but also to Russia, Ukraine and China. As a reminder, for the help of multiple requests through the DNS-resolvers of various providers in the STOPhaus group, the Spamhaus Project servers began to fizzle with requests over 300 Gb/s, which helped the robot of the entire Internet.

After the arrest of Kamphius, he declared that he couldn’t wait until the attack and that he no longer publicly represented the STOPhaus group, but did not take part in his activities. For some reason, the attacks on the Spamhaus Project caused a lot of damage. Vin himself calls himself an Internet activist and a fighter against censorship and all those who try to control the Internet.

Geri McKinnon and the US Department of Defense. This Scot is the most famous British hacker, whose extraditions are almost two thousand years in reach of the United States, dey threatening over 70 years of exposure. In the past, the British police were swayed by McKinnon in 2002, but then the big supporters and some other people were caught in the wild.

In the United States, MacKinnon sounds like the fact that in 2001 the roci vin hacked maybe a hundred computers, which belongs to the Ministry of Defense that NASA. As a result, the authorities, having denied access to the system, removed critically important files and actually paralyzed the work of the US military department for production. Moreover, McKinnon never erased data about American attacks from malicious computers after the terrorist attacks on 11 September 2001, and it was critical. important information. Behind the laws that are in Great Britain, for similar lawful violations of you, there was less than six months of punishment.

McKinnon himself stverdzhuvav, shukav shukav from the computers of the American military testimonies prihovuvannya in the vast amount of information about UFOs and other potentially brown technologies. In addition, he declared that he had removed access to absolutely unprotected machines and deleted anonymous records about all manifestations of inconsistency on the same computers.

The federal court in the US state of Virginia near the fall of the leaves in 2002 officially called McKinnon in seven facts of computer malice, and the UK saw the USA, then the hacker could spend all his life at the hacker. After the onset of chivalry, the Extradition Act of 2003 decreed that the share of the hacker was over, but it wasn’t there. It changed only those who had goiter today, they were appointed at the police station and did not come out of the house at night.

Sting, Boris Johnson, Stephen Fry hung on McKinnon's support


Zahist attacked McKinnon's medical condition, and the new one was diagnosed with Asperger's syndrome (a form of autism) and clinical depression, which provoked self-destruction. On this basis, McKinnon turned to the European Court for the rights of a person, having backed up extradition, and then moved to block it. In 2009, having seen the fate of the Supreme Court, it allowed for extradition, but a huge resonance was called to the point where it didn’t get out. A lot of special features hung on the hacker's footnote - from musicians Sting and Peter Gabriel to the mayor of London Boris Johnson and actor Stephen Fry.

At the same time in 2012, Minister of Internal Affairs Theresa May voiced about the blocking of McKinnon's witness on the basis of the fact that in times of extradition there is a great risk for the life of the accused person (you can lay your hands on yourself), that such a decision would superb the rights of people. Nadalі was vypіsheny vіdmoviti іd criminal reinvestigation of the hacker and in the Great Britain: formally through collapsing with evidence, scho znayvatsya on the territory of the United States. At the same time McKinnon is absolutely free.


Volodymyr Leivn and Citibank. A Russian hacker, who in 1994 received $12 million from the Citúbank system. so i was not found. Tsіkavim є the fact that at the time of the scourge of evil, in our country there were no articles in the criminal code, scho transfer punishment for cybercrime, to that Levin was extradated to the USA and after 3 years.

Levin y 1994 roci viviv from the Citubank system $12 million


Vasil Gorshkov, Oleksiy Ivanov and Paypal. Russian hackers, like they were active correspondents of the Internet in the zero. These Russian lads could have hacked the PayPal, Western Union and other payment systems. The boys hacked 40 American companies in 10 states. In 2003, Gorshkov was prosecuted until the release of his will for a line of 3 years and a penny fine for $ 700 thousand. And Ivanov buv spymany and convicts in 2004 roci, convicts up to 4 years of conviction. The court is also based on the territory of the United States.

Find home hacker groups

Lizard Squad

ZMI's first riddle about Lizard Squad appeared after the stench was laid by the League of Legends and Call of Duty game servers. Let's keep serious attacks on Sony Playstation Network and Microsoft Xbox Live. There is hostility that representatives of this group may have personal hostility to Sony. In serpni 2014, the fate of the stench spread on Twitter the threat of pissing off the air, for some years the president of Sony Online Entertainment. Luckily, the ship managed to make an emergency landing, and everything went off without casualties.

In addition, Lizard Squad declares their connection with the Islamic power. For example, after the attack on Malaysia Airlines, the hacktivities were published on the company's website saying “Hacked by Lizard Squad – the official Cyber ​​Caliphate. ISIS will win." And for a few months earlier, the stench spread the ISIS banners on Sony servers. Vtіm, tsіlkom іmovіrno, scho diyalnіst group is not a political liar, and the riddle of ISIS is needed only for bringing respect to the mass media.

Following the attacks on PSN and Xbox Live, law enforcement agencies in Great Britain and the United States conducted a great investigation, resulting in the arrest of a 22-year-old man from Tukenem and a teenager from Southport - both members of the Lizard Squad.

Anonymous

Anonymous - probably the most popular hacker group of all times. This decentralized online community, which consists of dozens of thousands of hacktivists, for some computer attacks, is a way of protesting against social and political phenomena. The group became famous after numerous attacks on public, religious and corporate websites. Vaughn attacked the Pentagon, threatened to destroy Facebook, undermined the Mexican drug cartel Los Zetas and voiced the Scientology war.

In 2010, Anonymous organized a large-scale campaign "Vidplata" (Operation Payback), attacking Visa, MasterCard and PayPal systems. The reason is that they are making payments to the WikiLeaks website founded by Julian Assange. In 2011, hacktivist groups publicly promoted the anti-social and economic unrest of Occupy Wall Street by attacking the New York Stock Exchange website.

In 2010 Anonymous launched attacks on Visa, MasterCard and PayPal systems


In 2009, dozens of people were arrested from the USA, Great Britain, Australia, the Netherlands, Spain and Turkey for being responsible for Anonymous's duties. Representatives of the grouping sue similar retrials and call their dead souls martyrs. The motto of hacktivists: “Mi is Anonymous. My legion. We are unforgivable. Check us out."

LulzSec

LulzSec (abbreviation Lulz Security) - an organization, "for the sake of laughter", which launched attacks on the company's servers, which were the most attacked. The win was made up of seven participants, who practiced under the slogan “Laughing for your safety in 2011”. The date of the bula was taken inappropriately: in 2011 Anonymous, who were already famous at that time, carried out a great attack on the HBGary Federal company. After this incident, the rating of the best cybercriminals according to the version of Forbes magazine. The name of the hacker group - "Lulz" - is similar to LOL (Laughing Out Loud).

Among the first LulzSec attacks, the passwords of Fox.com, LinkedIn and 73 thousand participants in the X Factor contest were stolen. In 2011, the stench compromised the account of the correspondent to the Sony Pictures resource and brought the CIA official website out of order.

After the successful attacks, LulzSec traditionally flooded the resources with a bit of a message, after which the experts are able to respect them more than Internet-cookers, less serious cyberwarriors. The representatives of the group themselves declared that the buildings were bigger.

At the heart of 2011, LulzSec expanded the information about self-dissolution. About a month later, hackers launched a new attack - once again on the newspaper of the News Corporation company. The stinks hacked the website of The Sun and posted it on head side news about the death of її Vlasnik Rupert Murdoch.

The main participants in LulzSec were arrested in 2012. Hector Xav'e Monsegur, the 28th leader of the group, became an informant to the FBI, who was named after Sabu. At his promo, prosecutor Sandip Patel pointed out that the hackers weren't bad political ideas, like Anonymous, and called them the pirates of our days.

Syrian Electronic Army

The meta hacker group Syrian Electronic Army (SEA) is a slogan of Syrian President Bashar al-Assad. The targets of evil-doers are most often the resources of political opposition groups, law enforcement organizations and foreign websites of news.

The nature of the zv'yazku grouping with the order of Syria is overwhelmed with unreasonableness. On its website, the SEA describes itself as "a group of young Syrian enthusiasts who cannot be left alone until the facts about the rebellion in Syria are completely revealed." At times, the experts are low, that the organization conducts its activity under the control of the Syrian order.

Among the methods that SEA uses are traditional DDoS attacks, spreading spam, phishing and spreading viruses. On the main side of the site that is being attacked, the stench, as a rule, places political messages and the Syrian ensign. The victims of Syrian computers have already become The Independent, The Daily Telegraph, The Evening Standard, The Daily Express, Forbes, Chicago Tribune, CBC, La Repubblica and others. Members of the Syrian Electronic Army also attacked the Facebook accounts of Barack Obama and Nicolas Sarkozy.

For the rest of the day, many of us first thought about hackers from Lizard Squad, and they already caught on to take the double-deal. DDoS attacks: to the Malaysia Airlines website, which will redirect the coristuvachs to the side with the inscription “404 - not found”, the one on Facebook, which is inaccessible with a total of 40 whilins.

Facebook, however, quips about the hacker attack; natomist the cause of the problems with the robot site was called the pardon of the retailers. Malaysia Airlines also already caught the names of the koristuvachs, that the site was not hacked, they just moved it to another domain name.

And yet, who is the Lizard Squad? Damn "hacktivists" who are trying to convey their political program, what group of pidlіtkіv, what are they doing? Chi represent the stink of a real threat, what is stronger in words? Is there a place among other groups of hackers? Let's talk about the hackers below, they said the most loudly about themselves in the last hour.

Lizard Squad gained popularity after the attacks, similar to the largest IT companies, such as Sony, Microsoft and Facebook. Formerly, a wide public sensed about them at the beginning of 2014, if the stench broke the online game, the League of Legends brand and Destiny. They were followed by more significant attacks on the Sony Playstation Network and Microsoft Xbox Live.

There is an animosity that hackers may have some special rahunki from Sony. In the middle of 2014, the stench was told about a bomb on board the liner, as if one of the presidents of the company could fly. As a result, the plane made an emergency landing.

In addition, the grouping is pushing its own accountability to the Islamic state. Under the hour of the attack on Malaysia Airlines, the stench called themselves the Cyber ​​Caliphate (this is how the hacker propaganda of the Islamic State is called). More than that, the IDIL ensign was installed on the Sony servers at the sickle stench.

At first glance, Lizard Squad seem to have political motives, however, it is more important for them to demonstrate the possibility of their Lizard Stresser service. In this rank, declare about the connection with the Islamic power, you can be nothing else, as if you were trying to turn the greater respect of ZMI.

After the attacks on PSN and Xbox Live, the government of America and Great Britain conducted an investigation, as it ended with the arrest of a 22-year-old resident of Twickenham and an officer from Southport (Britain).

Imovirno, the most famous hacker organization, Anonymous - have decentralized the organization of dozens of thousands of "hacktivists", like a joint hackers hacking sites, hanging their protest in such a manner.

The group gained popularity after attacks on the low great political, religious and corporate resources. In the middle of their reach - the evil site of the Pentagon, threaten Facebook and Los Zetas, the Mexican drug cartel and the denunciation of the war of the Church of Scientology.

In 2010, Anonymous rozpochali operation Payback after the fact that Visa, MasterCard, PayPal and other companies began to service WikiLeaks. The stinks also blatantly promoted the “Zhope Wall Street” rumble in 2011 by attacking the New York Stock Exchange website.

Starting from 2009, impersonal people were arrested for suspicion of being Anonymous in America, Great Britain, Australia, the Netherlands, Spain and Turkey. The proteo organization protests against the retrial, calling them “martyrs of the Rukh”.

The motto of the group seems to be: “Mi is Anonymous. I'm a legion to us. We are unforgivable. We don't forget. Check us out."

LulzSec (abbreviated as Lulz Security) hid behind the scenes after the hacking of HBGary Federal in 2011, the rotation was turned into Anonymous. Seven people became the main driving force of the group, as they chose the phrase “Laughing for your safety in 2011” as their motto.

The first attack was made by a team on Fox.com, having stolen a few passwords, LinkedIn accounts and the names of 73 thousand participants in the X-Factor show. In 2011, the smell of stench went far away, hacking the CIA website.

LulzSec became famous for great organizations, for they choose stench as a whole, and as a reminder, as they flood sites after evil. Deyakі ekspіnjuyut activity organіzаtsії svvidshe like prankіng, nizh real threat, but the participants of grouping stverdzhuyut, scho building and more serious kroki.

In 2011, the rotation group published the statement “50 days of lulza”, in which it announced about self-dissolution. On the 18th of September, the stench launched yet another attack on the newspapers that belong to the News Corporation holding, reminiscent of them with fake news about the death of the company's chief executive, Rupert Murdoch.

In 2012, the FBI arrested the main participants in the denunciation of the leader of the group, Hector Monsegur, who was under the name of Sabu. Behind the words of the prosecutor Sandip Patel, the political ambitions of Anonymous were rejected by the hackers and the stench revealed itself to be “current pirates”.

The Syrian Electronic Army (SEA) has declared publicly that it supports the ranks of the lowest President of Syria, Bashar al-Assad. These are the main meta-political opposition and foreign sites, especially new resources and organizations fighting for the rights of people.

They didn’t understand in return the grouping from the Syrian order. On the official website, the SEA calls itself "a group of young Syrian enthusiasts who cannot calmly react to the facts about the recent rebellion." Deyakі eksperti vvazhayut, scho hackers rightly can otrimuvat finansuvanny vіd vlady.

The main methods of SEA - spam, deface, phishing and spoofing shkidlivih programs. Often, hackers replace the company's web page with a reminder of the lower order or the image of the Syrian ensign.

The Syrians have already caught up with the evil side of Barack Obama and Nicolas Sarkozy on Facebook, as well as the Twitter accounts of new agencies and IT companies. At any reminder, like the stench of the evil one, even differ in style: among them, it’s like a serious one, it’s very political, it’s also ironic.

© 2022 androidas.ru - All about Android