Hackers come in three different hats: black, white, and gray. But the black hat hackers always seem to get the most notoriety for their mischievous deeds. Black hats use viruses, malware, phishing scams, and anything to boost their cred or their pocket book. When they’re successful, they usually end up on the news and force you to change your passwords. But who among them are the elite? Here are 25 Most Notorious Hackers In History.
Known by the name Mafiaboy, Michael Calce essentially helped write several cybercrime laws, but not how you might think. At the age of fifteen, he brought down the internet during its infancy. He took down the likes of Amazon, Yahoo!, Dell, eBay, CNN, and others. Eventually caught, he was sentenced to eight months in a youth group home. Now, he’s turned his black hat over to a white hat and helps others find vulnerabilities in computer systems.
The Syrian Electronic Army
Coming to the scene in 2011, the Syrian Electronic Army was a group of hackers intent on protecting and helping Syrian President Bashar Al-Assad. Using every trick in the book like DDoS, malware, website defacement, and phishing, the hacker group targeted anyone neutral or against Al-Assad.
David L. Smith
David L. Smith created the “Melissa Virus,” a dangerous email virus in 1996 that struck thousands of email systems. At the time, it was considered one of the worst virus attacks of its kind. Smith was arrested by the FBI and sentenced to two years in prison and a $5,000 fine.
Max Ray Butler
Max Ray Butler, also known as Iceman, is a black hat hacker that hacked credit card information centers, stealing 1.8 million credit card numbers and $86.4 million. He was convicted in 2010 and sentenced to 13 years in prison. He was also forced to pay restitution of $27.5 million.
Evgeniy Mikhailovich Bogachev
Evgeniy Mikhailovich Bogachev, or Lucky12345, is currently wanted by the FBI with a bounty of $3 million on his head. He’s a notorious Russian hacker who uses phishing, malware, and viruses to skim bank account information from computers. Due to his exploits, financial losses so far have racked up to $100 million.
Photo: 25. Pixabay.com (Public Domain), 24. Nichollas Harrison, Steve Wozniak 2012, CC BY-SA 3.0, 23. Wikipedia Commons.com (Public Domain), 22. Naranj8, 3458188 640px, CC BY-SA 4.0, 21. © User:Colin / Wikimedia Commons / CC BY-SA 4.0, Backlit keyboard, CC BY-SA 4.0, 20. Wikipedia Commons.com (Public Domain), 19. Eneas De Troya from Mexico City, México, Kevin Mitnick (4892570820), CC BY 2.0, 18. Pixabay.com (Public Domain), 17. anonymous, MarkAbene1, CC BY-SA 3.0, 16. Klpoulsen, Kevin Poulsen 2014, CC BY-SA 3.0, 15. Pixabay.com (Public Domain), 14. Christoph Scholz via flickr. CC BY 2.0 , 13. Bill Bertram, Amiga500 system, CC BY-SA 2.5, 12. Trevor Blackwell, Robert Tappan Morris, CC BY-SA 3.0, 11. Florian Belmonte, Aging Anonymous, CC BY-SA 4.0, 10. Almudena Fernández via flickr. CC BY 2.o , 9. Thibaut Démare via flickr. CC By 2.0 , 8. Wikipedia Commons.com (Public Domain), 7. NullSession from Bettendorf, Iowa, United States, John McAfee Def Con (14902350795) (cropped), CC BY-SA 2.0, 6. Pixabay.com (Public Domain), 5. SEA ARMY, SYRIAN ELECTRONIC ARMY, CC BY-SA 4.0, 4. Pixabay.com (Public Domain), 3 Pixabay.com (Public Domain), 2. Pixabay.com (Public Domain), 1. US Department of State (Public Domain)