blackhat

xVisceral

IRL Name: 
Michael Hogue
Biography: 

xVisceral is one of the guys who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he offered malware for sale, including remote access tools (RATs) that allowed the user to take over and remotely control the operations of an infected victim-computer. Hogue’s RAT, for example, enabled the user to turn on the web camera on victims’ computers to spy on them and to record every keystroke of the victim-computer’s user. If the victim visited a banking website and entered his or her user name and password, the key logging program could record that information, which could then be used to access the victim’s bank account. "

References

zer0, zer0iq

IRL Name: 
Jarand Moen Romtveit
Biography: 

Jarand Moen Romtveit a.k.a zer0 is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he used hacking tools to steal information from the internal databases of a bank, a hotel, and various online retailers, and then sold the information to others."

References

Cosmo, CosmotheGod

Biography: 

Cosmo a.k.a CosmotheGod is a social-engineering mastermind who weaseled his way past security systems at Amazon, Apple, AT&T, PayPal, AOL, Netflix, Network Solutions, and Microsoft (year 2012) at the age of 15. With his group, UGNazi (short for “underground nazi” and pronounced “you-gee” not “uhg”), Cosmo took part in some of the most notorious hacks of the year (2012). Throughout the winter and spring, they DDoS’ed all manner of government and financial sites, including NASDAQ, ca.gov, and CIA.gov, which they took down for a matter of hours in April. They bypassed Google two step, hijacked 4chan’s DNS and redirected it to their own Twitter feed, and repeatedly posted Mayor Michael Bloomberg’s address and Social Security number online. After breaking into one billing agency using social-engineering techniques this past May, they proceeded to dump some 500,000 credit card numbers online. Cosmo was the social engineer of the crew, a specialist in talking his way past security barriers. His arsenal of tricks held clever-yet-idiot-proof ways of getting into accounts on Amazon, Apple, AOL, PayPal, Best Buy, Buy.com, Live.com (think: Hotmail, Outlook, Xbox) and more. He was able to hijack phone numbers from AT&T, Sprint, T-Mobile and your local telco.

References

Comex

IRL Name: 
Nicholas Allegra
Biography: 

Nicholas Allegra (Comex) has cracked open the iOS security on three different occasions. He created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 which allows millions of users to strip away in seconds the ultra-strict security measures Apple has placed on its iPhones and iPads, devices that account for more than half the company’s $100 billion in revenues.

Pictures: 
References

neuron

IRL Name: 
Raynaldo Rivera
Biography: 

Raynaldo Rivera a 20 year-old of Tempe, Arizona is a member of Lulz Sec. He stole information from Sony Pictures computer systems in May and June of 2011 using an "SQL injection" against the Sony website. He also played a role in the SPE attack from which thousands of Sony users information were released online. He covered his tracks by using a variety of pseudonyms including "neuron", "royal" and "wildicv". He also used a proxy server to further avoid detection. He was studying computer science at the University of Advancing Technology according to his Facebook page.

Pictures: 
References

atlas

Biography: 

atlas is a a disciple of the illustrious Skodo. He was just a kiddie when asked to write his first exploit in order to qualify for dc13's capture-the-flag. After conquering his sense of inadaquacy, he went on to win the individual competitiion and finish third even among the teams.

References

Chanda Leir

IRL Name: 
Karen
Biography: 

Chanda Leir is the first ch1xor featured in Phrack Magazine's Pro-Phile. According to her phrack profile, she started using BBSes in the D.C. area in 1983 (at the ripe age of 13). A guy by the name of Hack-Man (she supposes this was the "original" H-M) was running a board off of the dead side of the local 678 loop. Her introduction to phone "stuff" began when she called the "board" one day and found instead 30 people on the line instead of a carrier.

She was dumbfounded, and being female, there were 30 guys on the conference ready and willing to provide her with information as to origins of loops, conferences, boxing, etc. Scott (Hack-Man) later filled her in on the rest, gave her more numbers and such and that's where it all began.

One of the reasons she quit the phreak/hack world was because of a visit from the Secret Service in February 1985, although they didn't really come for her... A "friend" wanted for credit card fraud called her while his line was hooked to a pin register. The same weekend he called Karen, was Inauguration Weekend and she and her brother called the 456 (White House) loop something like 21 times in the 4-day weekend period. In any case the SS wanted to catch Eric and when her number showed up in two places, they decided to investigate.

References

Karl Marx

IRL Name: 
James Salsman
Biography: 

Karl Marx (not the philosopher) is a phone phreaker who was featured in the Phrack Magazine Issue #22 and who got busted for being in a hotel room with Steve Dahl. He was convicted of the law that says, in effect "it's illegal to lie to somebody more powerful than you." He stopped phreaking because he was on probation and didn't want to go to prison.

According to his phrack profile, he wrote something about Nitroglycerin. He probably killed a lot of aspiring phreaks on Plovernet by not putting in enough warnings like "Remember, DON'T make more than a few grams or you will be found dead and identified as Dinty Morre Beef Stew." He also came up with the "RESCOC --Remote Satellite Course Correction System" file. It was PURE bullshit, but with headings like "How to manuver a satelite to crash it into cities (like Moscow)" it was a big hit with the "Hacker-Hype" media. AT&T denied everything.

References

Dave Starr

Biography: 

According to his phrack profile, he started out on The Source, and stuck with them for 6 to 8 months hacking around the system because the system was so slow security-wise, and of course, from there, he got involved with hacking Primes. One of the security agents named Paul from Dialcom got in contact with Dave and discussed Dave's hacking on The Source (his system). After talking, they found they had common interests, which included hacking and phreaking. Paul gave Dave his first code to a local dial-up for Sprint. He also led him in the direction of 8BBS, which brought him to meet the best of the nation's phreakers and hackers at the time, which included Susan Thunder, Roscoe DuPran, and Kevin Mitnick. Susan and Roscoe were strong friends of Dave that he personally met as well as Kevin, but he never met Kevin. He met Susan in the L.A. County Courthouse testifying against her, with Susan and Roscoe using these handles as real names on the charges of harassment. The phreak/hack BBS's that were most memorable for Dave were 8BBS and his own, Starcom Network, which had hidden commands for accessing the phreak section. Starcom Network was a nationally networked system that Dave created and operated. This was a virtual copy of The Source, for which he went to court over. They claimed it was their system, but he supressed them with a threat of publicity. Modem Over Manhattan was another memorable board on a TRS-80.

References

The Nightstalker

Biography: 

According to his phrack profile, he started in the phreak world in 1971 due to the Esquire article on blue boxes and YIPL magazine. He obtained his first blue box by January, 1972. He started hacking in 1975 after obtaining a TI Silent 700 Series, Model 700 exceedingly dumb terminal. He stumbled upon ARPAnet in Massachusetts, the bridge at MIT...1 hour later, he figured out how to get on. He toyed with the MIT exchange and found the MULTICS system and their artificial intelligence system. They were just beginning to use a language called LISP at the time.

References
Syndicate content