Ad Code

Responsive Advertisement

Ticker

6/recent/ticker-posts

Top 5 Most Notorious Hackers of All Time

What is hacking?

Computer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities in order to fix them. Black hat hackers operate with malicious intent. That said, there is a large grey area populated by political activists and hackers who wear both hats.

World Best Hacking Groups which is always involved in doing big bang!


ANONYMOUS

Anonymous is a decentralized international activist/hacktivist collective/movement widely known for its various cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology

Motto: We Are Anonymous

Founded: 2003

Membership: Decentralized affinity group

Purpose: Anti-cyber-surveillance; Anti-cyber-censorship; Internet activism; Internet vigilantism

Formation: c. 2003

Recently Elon Musk has become the latest target for the renowned hacker group Anonymous. In a new video elaborating on his wrongdoings, Anonymous has sent warning shots to the Tesla CEO, blaming him for destroying the lives of cryptocurrency investors with his tweets.


Fancy Bear

APT28, also known as Fancy Bear, is a Russian hacker group that is believed to be associated with Russia's GRU military intelligence agency that has been blamed for carrying out numerous cyber attacks on Western governments, think tanks, and corporations in recent years. 
The name "Fancy Bear" comes from a coding system security  researcher Dimitri Alperovitch uses to identify hackers.
Fancy Bear's targeted list includes Adrian Chen, the Armenian journalist Maria Titizian, Eliot Higgins at Bellingcat, Ellen Barry and at least 50 other New York Times reporters, at least 50 foreign correspondents based in Moscow who worked for independent news outlets, Josh Rogin, a Washington Post columnist, Shane.

Lazarus Group
Lazarus Group is a cybercrime group made up of an unknown number of individuals. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them over the last decade. Originallya criminal group, the group has now been designated as an advanced persistent threats  due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cyber security firms include HIDDEN COBRA (by the United States Intelligence Community)
It is not clear who is really behind the group, but media reports have suggested the group has links to North Korea.


Lizard Squad

Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service attacks primarily to disrupt gaming-related services.

On September 3, 2014, Lizard Squad seemingly announced that it had disbanded only to return later on, claiming responsibility for a variety of attacks on prominent websites. The organization at one point participated in the Darkcode hacking forums and shared hosting with them.

On April 30, 2016, Cloudflare published a blogpost detailing how cyber criminals using this group's name were issuing random threats of carrying out DDoS attacks, despite these threats, Cloudflare claim they failed to carry through with a single attack. As a result of this, the City of London Police issued an alert warning businesses not to comply with ransom messages threatening DDoS attacks.

Founder: Zachary Buchta



Syrian Electronic Army


The Syrian Electronic Army is a loosely organized collective of hactivists, or hackers with an ideological motive. Although not directly affiliated with the government of Syrian President Bashar al-Assad, the group is known for distributing propaganda in support of his regime. Some of the tactics of hactivism they use to attack those deemed "opponents" of the regime include spear-phishing, Web site defacement using SQL injection, DNS hijacking, fabricating Facebook and YouTube sites to collect log-in credentials and spread malware, and disseminating DDoS attack tools. 

Using their Web sites and social media accounts, the Syrian Electronic Army has been able to recruit and educate sympathizers, report on successful hacking operations, and leak stolen information. 

Syrian Electronic Army Hackers Are Targeting Android Phones With Fake WhatsApp Attacks.

Among them whose work you like the most ?



Post a Comment

0 Comments

Ad Code

Responsive Advertisement