blackhat

Xon

Biography: 

Xon was the guy who took over the leadership of the Electronik Tribulation Army after the arrest of GhostExodus and made claims that they have gone whitehat but still continued harassing a security expert named Robert Wesley McGrew. His house was raided by the FBI in 2010 after a complaint against their anarchist hacking group ETA.

References

GhostExodus

IRL Name: 
Jesse William McGraw
Biography: 

Jesse William McGraw is a former contract security guard at the North Central Medical Plaza on North Central Expressway in Dallas, who admitted hacking into that hospital’s computer systems by putting malware on a dozen machines. He also installed the remote-access program LogMeIn on the hospital’s Windows-controlled HVAC system. McGraw admitted that he intended to use the bots and the compromised computers to launch DDoS attacks on the websites of rival hacker groups. He was sent to jail after a security expert named Wesley McGrew tipped off the FBI in 2009.

References

The Fixer, etaFixer, thefixer25, fix, c0aX, ballsdeep

IRL Name: 
Benjamin Nichols
Biography: 

Benjamin Nichols is one of the members of an anarchistic hacking group called the Electronik Tribulation Army that harassed a security expert Robert Wesley McGrew of McGrew Security who helped put the group’s leader in jail, according to an unsealed search warrant affidavit.

Nichols Harvested email addresses from Mississippi State University where Wesley Mcgrew was attending. Nichols spammed invitations to the website wesleymcgrew.com to entire campus ( a website Nichols registered as a platform to harass Wesley Mcgrew) from wesley@mcgrewsecurity.com with the Subject line "Hey everyone check out my new website!"

The website featured photo-shopped images of Wesley Mcgrew's face on gay bondage photos and an order form where users could mail dildos to Mcgrews home address titled "Show your support for the whitehat community, Mail Wesley Mcgrew a dildo!" Nichols himself has also sent sex toys to Wesley Mcgrews residence. His home was raided by the FBI last June 23, 2010. He has a dox in pastebin.

On April 5th 2016, Nichols pleaded guilty to “knowingly and purposefully launching a distributed denial of service (DDoS) attack” on or before May 2010 against mcgrewsecurity.com. News articles have stated that the attack caused a $6,500 loss and that Nichols faces up to 10 years in federal prison along with a $250,000 fine.

References

Hitcher

Biography: 

Hitcher is a current member of the Pakistan Cyber Force, he was a former member of the ZCompany Hacker Crew. He hacked 96k official main pages and they don't hack any Pakistani site. He hates the US and NATO due to the butchery of innocent people.

References

S3rver.exe

Biography: 

A 13 year old hacker from Australia, he is known for hacking Sony Pictures, Zuffa’s Ultimate Fighting Championship (UFC), and major government sites. He claims to be a gray hat hacker because he likes to help people out. He uses the Blackhole exploit kit along with botnets to help him with the DDOS attacks.

References

ReD-Zar

IRL Name: 
Ridouan
Biography: 

A member of the new hacking group called Arab Electronic Army. He was involved in some attacks that defaced websites in the United States in response to a video called Innocence of Muslims. Many of the defaced web sites had Brazilian domain names. They targeted many low-profile sites but they threatened to target more sites as a protest.

References

Barrett Brown

Biography: 

Barrett Brown is a 31 year old computer hacker living in Dallas, Texas. He claims to be the leader of Anonymous even though the group boasts itself on having no leader. He is known for wanting to hack the Zeta's which is a deadly drug cartel in Mexico. He was arrested on September 12, 2012 at his home due to him threatening the FBI agent Robert Smith during a Tinychat session.

Pictures: 
References

404myth

IRL Name: 
Christian Cangeopol
Biography: 

is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he engaged in illegal instoring at Walmart to obtain Apple electronic devices with stolen credit cards. Instoring is a term used by carders to refer to using stolen credit card accounts to make in-store, as opposed to online, purchases of items using stolen credit card information and matching fake identifications. As part of the alleged scheme, Cangeopol and a co-conspirator used stolen credit card data to order electronic devices on Walmart’s website; in selecting a delivery option, they opted to have items delivered to various Walmart stores in Georgia; Cangeopol then picked up the items using a fake identification; Cangeopol and the co-conspirator then resold the carded electronics and split the proceeds."

References

iwearaMAGNUM

IRL Name: 
Peter Ketchum
Biography: 

Peter Ketchum a.k.a iwearaMAGNUM is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Sean Harper a.k.a Kabraxis314, each sold drop services to other carders in return for money or carded merchandise."

References

Kabraxis314

IRL Name: 
Sean Harper
Biography: 

Sean Harper is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Peter Ketchum a.k.a iwearaMAGNUM, each sold drop services to other carders in return for money or carded merchandise."

References
Syndicate content