blackhat

Zhang Haoran

IRL Name: 
Zhang Haoran
Biography: 

Zhang Haoran is part of a Chinese hacking group known as APT 41 and BARIUM. On August 15, 2019, a Grand Jury in the District of Columbia returned an indictment against Chinese nationals ZHANG Haoran and TAN Dailin on multiple charges including Conspiracy to Cause Damage to, and Obtain Information by Unauthorized Access to, Protected Computers; Conspiracy to Commit Wire Fraud; Wire Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Aggravated Identity Theft; Money Laundering; and Aiding and Abetting. These charges primarily stemmed from alleged activity targeting high technology and video gaming companies, and a United Kingdom citizen.

Pictures: 
References

Viet Quoc Nguyen

IRL Name: 
Viet Quoc Nguyen
Biography: 

Viet Quoc Nguyen is wanted for allegedly hacking into at least eight E-Mail Service Providers (ESPs) and stealing confidential information, including proprietary marketing data containing over one billion e-mail addresses. The ESPs were located all over the United States, including two based in the Northern District of Georgia. The massive data breach occurred between approximately February of 2009 and June of 2012. During that time, Nguyen allegedly hacked into the ESPs' computer databases and used his unauthorized access to launch spam attacks on tens of millions of e-mail recipients who had their addresses stolen. Additionally, Nguyen also allegedly entered into an arrangement that allowed him to generate revenue from his computer hacks by receiving a commission on sales generated from Internet traffic that he directed to websites promoting specific products.

Pictures: 
References

Park Jin-hyok

IRL Name: 
Park Jin-hyok
Biography: 

Park Jin-hyok is allegedly a North Korean computer programmer who is part of a state-sponsored hacking organization responsible for some of the costliest computer intrusions in history, including the cyber attack on Sony Pictures Entertainment, a series of attacks targeting banks across the world that collectively attempted to steal more than one billion dollars, and the WannaCry ransomware attack that affected tens of thousands of computer systems across the globe.

Park has traveled to China in the past and conducted legitimate IT work under the front company "Chosun Expo" or the Korean Expo Joint Venture in addition to activities conducted on behalf of North Korea's Reconnaissance General Bureau.

Pictures: 
References

aeonhack

IRL Name: 
Taylor Huddleston
Biography: 

Taylor Huddleston aka aeonhack is an active forum member of hackforums.net where he marketed his very own NanoCore RAT. Despite his RaT's copy protection abilities — denizens of Hackforums were able to pirate copies of NanoCore and spread it far and wide in malware and phishing campaigns. Eventually, Huddleston said he grew weary of all the drama and sold both programs to another Hackforums member, using the $60,000 or so in proceeds to move out of the rusty trailer he and his girlfriend shared and buy a house in a low-income corner of Hot Springs, Arkansas.

Pictures: 
References

Bitcoin Baron

IRL Name: 
Randall Charles Tucker
Biography: 

Bitcoin Baron is a skiddie, hacker, mad man, homophobe, and troll who who was sentenced to 20 months in prison for launching DDoS attacks against the city of Madison, Wisconsin —attacks which caused delays and outages to various municipality services, including its 911 emergency call center. The DDoS attacks took place between March 9 and March 14, 2015. He also launched DDoS attacks against News2Share.com, a user-generated video-based news portal, on two different occasions, demanding they feature one of his self-made hacker "call for arms" videos.

Pictures: 
References

Ronald Dale Harris

IRL Name: 
Ronald Dale Harris
Biography: 

Ronald Dale Harris is a computer programmer who worked for the Nevada Gaming Control Board in the early 1990s and was responsible for finding flaws and gaffes in software that runs computerized casino games. Harris took advantage of his expertise, reputation and access to source code to illegally modify certain slot machines to pay out large sums of money when a specific sequence and number of coins were inserted. Harris was banned from New Jersey casinos in 1995.

Harris’ story can be seen on the Biography Channel, History Channel and Discovery Channel program Breaking Vegas, which features interviews and reenactments of some of Harris' casino-breaking scheme. The Travel Channel's Vegas Cheaters Exposed also briefly explains his story.

Pictures: 
References

Dr Mengele

IRL Name: 
Calin Mateias
Biography: 

Calin Mateias is a Romanian man went by "Dr Mengele" and launched DDoS attacks on World of Warcraft servers in Europe between February and September 2010, typically in connection with in-game disputes with other players. Mateias was indicted for the crime in 2011 following an investigation by the FBI, but was only extradited to the US to face justice last 2017. He's been in custody since November 20, 2017. He agreed to plead guilty to a single count of intentional damage to a protected computer; in exchange, the US government agreed to drop separate charges related to an attempted hack and robbery of Ingram Micro in 2004.

References

Shaun Harrison

IRL Name: 
Shaun Harrison
Biography: 

Harrison, along with Saverio Mondelli, developed code designed to track users on Myspace. After attempting to extort Myspace by demanding a $150,000 consulting fee, they would be arrested and receive three years probation.

Pictures: 
References

Saverio Mondelli

IRL Name: 
Saverio Mondelli
Biography: 

Mondelli, along with Shaun Harrison, developed code designed to track users on Myspace. After attempting to extort Myspace by demanding a $150,000 consulting fee, they would be arrested and receive three years probation.

Pictures: 
References

Adrian Lamo

IRL Name: 
Adrian Lamo
Biography: 

Adrian Lamo was most well known for snitching out Wikileaks source Bradley Manning. He died of a snitch juice overdose on March 14, 2018.

Adrian Lamo was previously most well known for breaking into The New York Times internal computer network in February 2002, adding his name to confidential databases of expert sources, and using the paper's LexisNexis account to conduct research on high-profile subjects, although his first published activities involved operating AOL watchdog site Inside-AOL.com. The Times filed a complaint and a warrant for Lamo's arrest was issued in August 2003 following a 15 month investigation by federal prosecutors in New York. At 10:15 AM on September 9, after spending a few days in hiding, he surrendered to the US Marshals in Sacramento, California. He re-surrendered to the FBI in New York City on September 11, and plead guilty to one count of computer crimes against Microsoft, Lexis-Nexis and The New York Times on January 8, 2004.

Later in 2004, Lamo was sentenced to six months detention at his parent's home plus two years probation, and was ordered to pay roughly $65,000 in restitution. He was convicted of compromising security at The New York Times and Microsoft, and is alleged to have admitted to exploiting security weaknesses at Excite@Home,Yahoo!, MCI WorldCom, Ameritech, Cingular and has allegedly violated network security at AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems. Companies sometimes use proxies to allow their employees access to the internet, without giving the internet access to their internal network. However, when these proxies are improperly configured, they can allow access to the company's internal network. Lamo often exploited this, sometimes using a tool called ProxyHunter. One of the things that made him unique is that he did all of his intrusion without any programming.

Pictures: 
References
Syndicate content