blackhat

Fry Guy

Biography: 

Fry Guy was more of a social engineer than a real hacker. Fry Guy got his alias interestingly enough, by acquiring the password to McDonalds' mainframe computers from a McDonalds' manager. Once he was in, he quickly increased the salaries of some of his friends who worked there.

Fry Guy then moved on to credit card scamming. He would request cash advances from Western Union with stolen credit card numbers. As a policy, Western Union would call the number on the credit card to double-check the identity of the caller. Fry Guy would re-route the calls to his phone - effectively making him the card owner. Most of this activity took place while he was a meager 16 years old.

On July 22, 1990 as his parents watched, Fry Guy was arrested by the Secret Service. On September 14, 1990 Fry Guy was sentenced to 400 hours community service and 44 months of probation. All in all, Fry Guy had made over $6,000 off of Western Union alone.

Fry Guy is also partly blamed for letting authorities and the phone companies know that there were hackers listening in on conversations, setting up their own phone numbers and accounts, and re-routing calls. He had actually called up the phone company threatening that the Legion of Doom would crash the phone system. Not surprisingly, this is what led to his arrest and later the war on the Legion of Doom.

References

Mark Tabas

IRL Name: 
Corey Lindsly
Biography: 

Where some see hacking as the gaining of knowledge, Tabas used his knowledge for personal profit. He worked for a plastic card company that made blanks for credit card companies, and decided to liberate 1,350 of these for future sale. All was well until Steve Dahl agreed to take a reduced sentence in return for arranging a sting. Dahl was given an embossing machine and told to meet Tabas in a bugged hotel room. The rest is history.

Pictures: 
References

Knight Lightning

IRL Name: 
Craig Neidorf
Biography: 

Born 1960
Probably published more phreaking documents than all others combined in the 1980s. Indicted for his txtfile describing the e911 phone system.

1990, Neidorf was facing 31 years in jail after being arrested and charged with receiving a document stolen from Bell South, and with publicly distributing it online. Charges were essentially dropped as the document in question was more of a memorandum and not actual source code.

Pictures: 
References

Bill From RNOC

IRL Name: 
Dave Buchwald
Biography: 

Dave Buchwald (born September 4th 1970), also known by his handle Bill From RNOC, was the leader of the Legion of Doom in the mid-1980s and at his peak was considered one of the country's best social engineers. Due to his skill in hacking Bell and AT&T systems (of note being COSMOS, SCCS, and LMOS) he was highly respected and somewhat feared in the hacker community. He also served as a mentor to many other hackers during his time with LOD. Currently, he works as a film editor and freelance photographer in New York City with some of his work appearing as coverart for 2600 Magazine.

References

Fluffi Bunni

IRL Name: 
Lynn Htun
Biography: 

Fluffi Bunni (AKA Fluffy Bunny), infamous web site defacer, was arrested 29 April 2003 in London by Scotland Yard while attending InfoSecurity Europe 2003. His real name is Lynn Htun and his first public defacement was a Linux box belonging to hogeschoolnederland.nl. He embarrassed leading Internet security organizations by breaking into their own computers and replacing Web pages with a message that "Fluffi Bunni ownz you" and a digital photograph of a pink rabbit at a keyboard. The attacks, which began in June 2000, lasted about 18 months, then stopped mysteriously and created one of the Internet's most significant hacker whodunits in years. Victims have included the Washington-based SANS Institute, which offers security training for technology professionals; Security Focus, now owned by Symantec Corp.; and Attrition.org, a site run by experts who formerly tracked computer break-ins. Other victims included McDonald's Corp. and the online security department for Exodus Communications Inc., now part of London-based Cable & Wireless plc.

References

Vladimir Levin

Biography: 

Levin is a biochemist from St Petersburg, is a cult figure of Russian cybercrime, and is considered to be one of the fathers of hacking in Russia.

Levin was delivered into U.S. custody in September 1997, and tried in the United States District Court for the Southern District of New York. In his plea agreement he admitted to only one count of conspiracy to defraud and to stealing US$3.7 million. In February 1998 he was convicted and sentenced to three years in jail, and ordered to make restitution of US$240,015. Citibank claimed that all but US$400,000 of the stolen US$10.7 million had been recovered.

After Levin was convicted, a different hacking group from St Petersburg claimed that they were the ones to originally gain access to Citibank — which they then sold to Levin for $100.

References

Mafia Boy

IRL Name: 
Michael Demon Calce
Biography: 

The U.S. Federal Bureau of Investigation and the Royal Canadian Mounted Police first noticed Mafia boy when he started claiming in IRC chatrooms that he was responsible for the attacks. He became the chief suspect when he claimed to have brought down Dell's website, an attack that had not been publicized at that time

Pictures: 
References

Phoenix

IRL Name: 
Nahshon Even-Chaim
Biography: 

Phoenix was born May 1971, he was the first major computer hacker to be convicted in Australia.
Like other hackers of his era, Even-Chaim began breaking into systems by dialing in directly or placing a call through X.25 networks, later taking advantage of Internet connectivity as it became available. He developed a reputation within The Realm, his computer hacking group, for skill and arrogance. Phoenix was 18 yrs old when he was arrested.

References

Electron

IRL Name: 
Richard Jones
Biography: 

Electron was born June 1969, He was apart of a group called The Realm. Electron arrested at 20 yrs old and convicted shortly thereafter for computer crimes involving intrusion on US Defense and Government systems.

References

Pitbull

IRL Name: 
Shane E. Pitman
Biography: 

Former leader of Razor1911.

Razor 1911 began to release ISOs when they became the standard of the day, led most significantly by The Punisher. He was instrumental in Razor's recovery and its solid performance in the ISO scene. Following The Punisher's retirement, Razor was led by various different people and underwent some internal problems in the form of leadership challenges. This was solved when Pitbull, an old Razor member from the 1990s, took over the leadership role. According to the Razor1911 site, Pitbull participated in the building of Razor's very powerful internet division.

Pitman was among more than 40 individuals targeted worldwide by Operation Buccaneer, a 14-month undercover investigation by a variety of law enforcement agencies. Other groups targeted were known as DrinkOrDie, RiSC, RiSCISO, Request To Send (RTS), ShadowRealm (SRM), We Love Warez (WLW), and POPZ.

References
Syndicate content