Arrested

Michael Buen

IRL Name: 
Michael Buen
Biography: 

Michael Buen is a Filipino programmer who was with Onel de Guzman at Amaconda and were friends. He was the suspected author of the I Love You Virus which made a history in the field of computer viruses because it swept through banks, securities firms, web hosting companies. The virus forced The Pentagon, CIA, the British Parliament, and most large corporations to completely shut down their mail systems.

Last February 2000 (Before the outbreak of the virus), a virus was sent to clients of Sophos, a security firm based in Oxfordshire, England. It came in the form of a CV in the name of Michael Buen and it came from the Philippines. The virus was designed to reproduce itself and infect Word documents. It would spread by e-mail - if someone received an infected document and opened it, their files would become infected. The CV tricked people into thinking the sender was looking for a job - but it contained a threat:

"Warning! If I don't get a stable job by the end of the month, I will release a third virus that will remove all folders in the primary hard disc," it said.

In the company of his lawyer, Michael Buen declined to give details. He denied he was capable of writing the Love Bug virus.

Pictures: 
References

w0rmer

IRL Name: 
Higinio O. Ochoa III
Biography: 

Ochoa is allegedly a member of a hacking group called CabinCr3w which allegedly planned the attacks under the banner of Anonymous. He hacked The West Virginia Chiefs of Police website www.wvcop.com. He obtained the entire user database that contained usernames and passwords for 150 law enforcement officials. He also obtained the addresses, and phone numbers from them.

Pictures: 
References

Sabu

IRL Name: 
Hector Xavier Monsegur
Biography: 

Sabu was a computer hacker and ringleader of the Anonymous offshoot group LulzSec. He was an unemployed computer hacker that lost his job at Limewire after it got hit with multiple lawsuits for copyright infringement. He received welfare and was the legal guardian of two young children. Prior to forming LulzSec he was a part of another collective called Internet Feds which was affiliated with Anonymous. He helped in an incident which e-mails were stolen from HBGary accounts. He helped in leaking passwords, altering several employees' Linkedln profiles and leaking a database of X Factor contestants containing contact information of 73,000 contestants. They claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. They also took down the CIA website offline. Now he is helping the FBi track down and gather evidence against his associates, tweeting misinformation and protecting the CIA among other government and financial institutions from hackers. He was charged with aggrevated identity theft and a two-year prison sentence to hang over his head if he did not help the FBI or CIA. They bribed him with his kids by telling him if he cooperated he can be with them. He pleaded guilty in August 11, 2011 to more than ten charges relating to his hacking activity. He did help take down the other high-level members of LulzSec and Anonymous. The FBI has provided him with a PC laptop to help take down other members. He currently works with the government to protect and prevent assault from hackers.

Pictures: 
References

TriCk

IRL Name: 
Junaid Hussain
Biography: 

A member of TeaMp0isoN and representing the United Kingdom. TriCk is responsible for data breaches which of T-Mobile and the United Nations were targeted. He and his team target countries such as Nigeria, Palestine, Syria and Peru. In January 2011 unauthorized status updates were posted on Mark Zuckerberg and French President Nicolas Sarkozy's accounts on facebook, The Daily Beast reported 16 year old hacker TriCk along with members of a hacking team known as "ZHC" said they had exploited a bug in the site allowing them to post updates and block newsfeeds. They joined Anonymous to launch Operation Robin Hood, intending to hack into websites to obtain credit cards and make donations to activists’ organizations around the world in an echo to the Bank Transfer Day movement. TriCk was arrested on or around April 14, 2012, Operation Retaliation was announced by TeaMp0isoN April 16, 2012.

On August 28th, 2015, it was reported that TriCk had joined ISIS as one of their most prominent hackers and had been killed by a drone strike.

Pictures: 
References

Kimble

IRL Name: 
Kim Schmitz
Biography: 

Kim Schmitz, also known as Kimble or Kim Dotcom, was born in Germany on January 21, 1974.

He is a known computer criminal and businessman. He is also one of the leaders of Megaupload.

He has been arrested several times for credit card fraud, computer fraud, insider trading, embezzlement and handling stolen goods.

Although he used to be known for his arrogant and flamboyant style, he has abandoned this way of life and is now acting as an advisor to Internet startup companies such as Friendster, iFilm, Gizmodo and Megaupload.

Pictures: 
References

Docent

IRL Name: 
Oleg Nikolaenko
Biography: 

Oleg Nikolaenko of Moscow, also know by his online nickname “Docent”, is thought to be the man behind the “Mega-D” bot network of 500,000 infected computers. The botnet sends out millions of spam messages on behalf of scam artists selling fake prescriptions and Rolex watches. According to the FBI, Oleg was responsible for 1/3 of the world's spam as of 12-03-2010.

According to The Smoking Gun, Nikolaenko is the first person to be named in conjunction with the operation and creation of “Mega-D”. FBI investigators have managed to collect financial records from Nikolaenko showing that he had earned nearly $500,000 over a period of six months from fellow spammer Lance Atkinson.

Nikolaenko’s botnet was taken out in 2009 by FireEye, a network security company, which was able to identify the affected computers being hijacked by “Mega D”.

Pictures: 
References

Soupnazi, CumbaJohnny

IRL Name: 
Albert Gonzalez
Biography: 

a computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the biggest such fraud in history.
Gonzalez and his accomplices used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet sniffing (specifically, ARP Spoofing) attacks which allowed him to steal computer data from internal corporate networks.
During his spree he was said to have to thrown himself a $75,000 birthday party and complained about having to count $340,000 by hand after his currency-counting machine broke. Gonzalez stayed at lavish hotels but his formal homes were modest.[1]
Gonzalez had three federal indictments:

May 2008 in New York for the Dave & Busters case (trial schedule September 2009)
May 2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010)
August 2009 in New Jersey in connection with the Heartland Payment case.

On March 25, 2010, Gonzalez was sentenced to 20 years in federal prison.

Pictures: 
References

Brian Dorsett

IRL Name: 
Brian Dorsett
Biography: 

Brian Dorsett reverse-engineered the NDS satellite access smartcard known as the HU card.

Pictures: 
References

OnTheFly

IRL Name: 
Jan De Wit
Biography: 

Creator of the Anna Kournikova Virus, he created this virus from a Visual basic Virus making kit and distributed it on a news group that same day. He was only 20 years old at the time this happened. he received only 150 hours of community service. He claimed not to be a maker but collector of viruses, about 7,200 at the time of his arrest.

References

Mindphasr

IRL Name: 
Chad Davis
Biography: 

An American hacker from Green Bay, Wisconsin, who operated under the alias of Mindphasr. He was the subject of one of the most high-profile prosecutions of cybercriminals of the late 20th century. Davis is a founding member of the globalHell syndicate of hackers, and is suspected to have authored or participated in the hacking of the websites of numerous businesses and government agencies.

Officials said that typically Davis used the ColdFusion software development framework, and attacked vulnerabilities in Microsoft Windows programs to gain backdoor entry into a system. It should be noted that Davis did not program in ColdFusion; rather, he exploited a vulnerability discovered by rain.forest.puppy and extended to allow file uploads by a member of the L0pht. Davis also allegedly used Domain Name System spoofing extensively, especially on the Eris Free Network.

References
Syndicate content