Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
In August and October 1999, c0mrade entered the computer network run by the Defense Threat
Reduction Agency, whose mission is to reduce the threat from nuclear, biological, chemical,
conventional and special weapons to the United States. By entering through a router in Dulles, Va.,
and installing a back door for access, he intercepted DTRA e-mail, 19 user names and passwords of
employees, including 10 on military computers.
Source: http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-
to-them/
DDoS attacks are surprisingly low tech. Using a network of computers (dubbed zombies) controlled
by a single master machine, the hacker tries to overwhelm a website's servers. It's a brute-force
approach the network of hacker-controlled computers floods the server with requests for data
until the server overloads and comes crashing down. Graham Cluley, a computer security
expert, likened the attack to "15 fat men trying to get through a revolving door at the same time."
The attacks do no lasting damage user data aren't compromised, and the site isn't down for long.
Once the fat men stop rushing the doors, everything returns to normal.
Source: http://content.time.com/time/business/article/0,8599,1915003,00.html
Source: http://www.independent.co.uk/news/world/asia/snapchat-hackers-india-poor-country-
release-data-ceo-claim-users-account-information-a7687651.html
The Ukrainian Hacker Who Became the FBIs Best
WeaponAnd Worst Nightmare
In 2004 there are so many breaches had hacked in the ukrainians hacker from VMwares karnel
code, that was used in hacking the code of vmwares instead of they access the FBIs mailing account
and hack some important mails. The hacker use this code for bargain. He demand $30,000. EMC
the vmware copany had quietly made a deal with Popov in 2005, he said, paying him $30,000 by
wire transfer and promising a second payment, of $40,000, in four years if the stolen VMware source
code didnt leak. He kept his part of the bargain. The code never leaked, and the fact that the
sensitive blueprints for VMware were in the hands of overseas hackers remained a secret from
customers and shareholders alike.
Source: https://www.wired.com/2016/05/maksym-igor-popov-fbi/
While in Kearny he was accused of being the mastermind of a group of hackers called the
Shadowcrew group, which trafficked in 1.5 million stolen credit and ATM card numbers.[5]Although
considered the mastermind of the scheme (operating on the site under the screen name of
"CumbaJohnny"), he was not indicted. According to the indictment there were 4,000 people who
registered with the Shadowcrew.com website. Once registered they could buy stolen account
numbers or counterfeit documents at auction or read Tutorials and How-Tos describing the use
of cryptography in magnetic strips on credit cards, debit cards and ATM cards so that the numbers
could be used.[6] Moderators of the website punished members who did not abide by the site's
rules, including providing refunds to buyers if the stolen card numbers proved invalid
Source: http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-
happened-to-them/
https://en.wikipedia.org/wiki/Albert_Gonzalez#ShadowCrew
Kevin Poulsen
Kevin Poulsen, also known as Dark Dante, earned his 15 minutes of fame by utilizing his intricate
knowledge of telephone systems. At one point, he hacked a radio stations (KIIS-FM) phone lines and
fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was
the Hannibal Lecter of computer crime. He got himself onto the FBIs wanted list when he hacked
into federal systems and stole wiretap information. He was later captured in a supermarket (of all
places) and sentenced to 51 months in prison and a bill for $56,000 in restitution.
Source: http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-
happened-to-them/
Gang Cyber Crime Arrested For Infecting Over 1
Million Phones With Banking Trojan
The Russian Interior Ministry announced on Monday the arrest of 20 individuals from a major
cybercriminal gang that had stolen nearly $900,000 from bank accounts after infecting over one
million Android smartphones with a mobile Trojan called "CronBot." The gang even inserted the
malware into fake mobile apps for popular pornography websites. Once victims downloaded and
installed these fake apps on their devices, the apps added itself to the auto-start and the malware
hidden inside them granted the hackers the ability to phish victims banking credentials and
intercept SMS messages containing confirmation codes sent by the bank to verify the transactions.
"After installation, the program added itself to the auto-start and could send SMS messages to the
phone numbers indicated by the criminals, upload SMS messages received by the victim to C&C
servers, and hide SMS messages coming from the bank," writes Group-IB.
"The approach was rather simple: after a victims phone got infected, the Trojan could automatically
transfer money from the users bank account to accounts controlled by the intruders. To successfully
withdraw stolen money, the hackers opened more than 6 thousand bank accounts." The gang
usually sent text messages to the banks initiating a transfer of up to $120 to one of their 6,000 bank
accounts the group set up to receive the fraudulent payments.
The malware would then intercept the two-step verification codes sent by the bank to confirm the
transaction and block the victims from receiving a message notifying them about the transaction.
Source: https://the-real-hacker-news.blogspot.com/2017/05/gang-cyber-crime-arrested-for-
infecting.html#more
Source: http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-
happened-to-them/
Operation Payback
It was a coordinated, decentralized group of attacks on high-profile opponents of Internet
piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retaliation
to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to
launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on
major pro-copyright and anti-piracy organizations, law firms, and individuals.
Source: https://en.wikipedia.org/wiki/Operation_Payback
Source: https://itechhacks.com/hack-paypal-account/
Source: http://heartbleed.com/
Source: https://gizmodo.com/how-hackers-reportedly-side-stepped-gmails-two-factor-a-
1653631338
Logjam
The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to
512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over
the connection. The attack is reminiscent of the FREAK attack, but is due to a flaw in the TLS protocol
rather than an implementation vulnerability, and attacks a Diffie-Hellman key exchange rather than
an RSA key exchange. The attack affects any server that supports DHE_EXPORT ciphers, and affects
all modern web browsers. 8.4% of the Top 1 Million domains were initially vulnerable.
Source: https://www.schneier.com/blog/archives/2015/05/the_logjam_and_.html
Source: https://arstechnica.com/information-technology/2015/02/lenovo-pcs-ship-with-man-
in-the-middle-adware-that-breaks-https-connections/
Bibliography
https://www.dawn.com/news/1279013
https://www.documentcloud.org/documents/3031638-Select-Slides-FINAL-PMR-4-24-13-
Redacted.html
https://www.wired.com/story/hackers-gain-switch-flipping-access-to-us-power-systems/
https://qz.com/1084032/this-is-how-you-win-the-hearts-and-minds-of-colleagues-in-distant-time-
zones/
https://www.quora.com/search?q=Interesting+Hacking+Techniques
https://the-real-hacker-news.blogspot.com/2017/05/found-malware-uses-7-nsa-hacking-
tools.html#more
http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/
https://the-real-hacker-news.blogspot.com/2017/05/gang-cyber-crime-arrested-for-
infecting.html#more
https://thehackernews.com/2017/09/backdoored-hacking-tools.html
https://plus.google.com/u/0/+TheHackerNews/posts/Cv1ZoLdbbAd