blackhat

K4C3 Undetected

Biography: 

K4C3 Undetected is an Indonesian defacer and blogger who maintains Indonesian hacking websites and works with the “Indonesian Liberation Army. He is associated with the following email addresses [email protected], [email protected], and [email protected].

Pictures: 
References

Sam Chihlung Yin

IRL Name: 
Sam Chihlung Yin
Biography: 

Sam Chihlung Yin was fired after purchasing more than $100,000 worth of Gucci goods with his employee discount, of note being that a year prior to his termination he setup a fake employee account. A forensics investigation found that after he left the job, he called the company's IT department posing as the fake employee to get his former co-workers to activate the fob, and from there he used that access to delete servers, destroy storage set-ups ,and wipe employee mailboxes -- essentially cutting off employee access to files and email across the U.S. for nearly an entire business day. For his actions, he was sentenced to two to six years in prison.

Pictures: 
References

Lance Moore

IRL Name: 
Lance Moore
Biography: 

Lance Moore is known as 'Anonymous’ Inside Man at AT&T' for being a former AT&T Mobility contractor who handed over to Anonymous tens of thousands of phone numbers, confidential server names with IP addresses, usernames, and passwords to log into them, plus corporate emails, presentation documents, and intellectual property that was used by the LulzSec/Antisec movement. On June 25, 2011, the computer hacking group LulzSec publicized that they had obtained confidential AT&T documents and made them publicly available on the Internet. The documents were the ones Moore had previously uploaded to Fileape.com.

References

Vladimir Tsastsin

IRL Name: 
Vladimir Tsastsin
Biography: 

Vladimir Tsastsin lead the development of DNSchanger malware together with Timur Gerassimenko, Dmitri Jegorov, Valeri Aleksejev, Konstantin Poltev and Anton Ivanvov to help perpetrate a profitable clickjacking scheme that netted it $14 million in stolen advertising views. The malware pioneered the method of using social engineering techniques to deliver unobtrusive payloads used to hijack victims’ DNS settings in order to set up revenue streams based on their manipulated browsing. Law enforcement closed in on the takedown after a multiyear, public-private investigation it dubbed “Operation Ghost Click,” which was initiated nearly five years ago after researchers with Trend Micro brought the gang’s botnet to the attention of the Feds.

Pictures: 
References

Recursion

IRL Name: 
Cody Andrew Kretsinger
Biography: 

Cody Andrew Kretsinger is a Former Lulzsec member who was arrested for allegedly carrying out the summer attacks against Sony Pictures on behalf of LulzSec. Authorities apparently hunted down Kretsinger through the U.K.-based HideMyAss proxy server service provider he used to help him “anonymously” carry out his SQL injection attack against Sony. The provider coughed up the logs to the authorities that allowed them to match time-stamps with IP addresses to pinpoint Kretsinger as the suspect in question.

Pictures: 
References

DBCoopa, DellCam

IRL Name: 
Cordell James Cameron, Jr.
Biography: 

Cordell Cameron is the Facebook Admin of Occupy Dallas and handles the twitter accounts @DBCOOPA, @DellCam, @SubversivePress, @YourAnonNews, and @YourAnonLive.

Pictures: 
References

OfficialNull, Jac3

IRL Name: 
Andrew L. Swanson
Biography: 

Andrew L. Swanson is the spokesman and a member of the hacktivist group NullCrew and the owner of the Twitter account @OfficialNull. His dox can be found on pastebin. Their group takes responsibility for multiple high profile computer attacks against corporations, educational institutions, and government agencies like World Health Organization(Who), PBS, Sony, etc.

References

u4ea

Biography: 

u4ea is one of the members of h4g1s (Hackers Against Geeks in Snowsuits), the group that hacked the National Aeronautics & Space Administration website in the year 1997 which started a private little cyber war between h4g1s members; tr0ut and u4ea against Jay Dyson, a whitehat who works for NASA. tr0ut and u4ea also hacked two Internet service providers to fuck up Jay Dyson by cracking his home business and harassing his wife which in turn costs his marriage. h4g1s has also breached Yahoo and propeller-head sites Slashdot and Rootshell. Each time, it engaged in a little nanny-nanny-boo-boo and made demands for the release of a jailed hacker hero, Kevin Mitnick. When h4g1s cracked the Greenpeace, it posted a warning: "Phree Kevin Mitnick or we will club 600 baby seals."

References

tr0ut

IRL Name: 
Jason Mewhiney
Biography: 

tr0ut is one of the members of h4g1s (Hackers Against Geeks in Snowsuits), the group that hacked the National Aeronautics & Space Administration website in the year 1997 which started a private little cyber war between h4g1s members; u4ea and tr0ut against Jay Dyson, a whitehat who works for NASA. tr0ut and u4ea also hacked two Internet service providers to fuck up Jay Dyson by cracking his home business and harassing his wife which in turn costs his marriage. h4g1s has also breached Yahoo and propeller-head sites Slashdot and Rootshell. Each time, it engaged in a little nanny-nanny-boo-boo and made demands for the release of a jailed hacker hero, Kevin Mitnick. When Hagis cracked the Greenpeace, it posted a warning: "Phree Kevin Mitnick or we will club 600 baby seals."

References

PV.F0rMl3s$

IRL Name: 
Romar San Pedro
Biography: 

PV.F0rMl3s$ is a Filipino defacer and self-proclaimed hacktivist who is one of the crew members of Pinoy Vendetta. He manages the following Facebook Fan pages; Xl3gi0n h4ckers, Anonymous Bulacan, Anonymous Forever, Crypt0nymous News Network, and xF0rMl3sS.

Pictures: 
References
Syndicate content