globalHell (known as 'gH') was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m. [1] The group was called a "cyber gang" as it had many of the same characteristics of a gang and carried out the same activities as a gang, including trafficking in stolen credit card numbers. [2]
Formation | February 1998 |
---|---|
Founder | Patrick W. Gregory (MostHateD), Chad Davis (Mindphasr) |
Dissolved | 1999 |
Purpose | Hacking |
Membership (1998-1999) | 20-25 |
Official language | English |
Leader | Patrick W. Gregory (MostHateD) |
Global Hell was more concerned with gaining notoriety for defacing prominent Web sites than with destroying or capturing sensitive information. [3] The members of the group were responsible for breaking and defacing around 115 sites. A few of the systems they broke into include those of United States Army, White House, United States Cellular, Ameritech, US Postal Service, NASA and National Oceanic and Atmospheric Administration. [4] [5] The group disbanded in 1999 due to being prosecuted for computer intrusion. [1] IRC channel called #feed-the-goats was the home of hacking group. [6] [7]
The group was founded by Patrick Gregory and Chad Davis in February 1998. Gregory was a member of a street gang who turned to cyberspace to escape from the gang. [8] Between 1998 and 2000, the group's membership was estimated between 15 and 20. [9]
In April 1999, the group invaded computer systems operated by the White House, the U.S. Army, Ameritech, U.S. Cellular and several other companies. On May 2, 1999, hackers invaded the White House website and put a picture of flowered panties on its home page. [10] Along with gH, a group called 'Hong Kong Danger Duo' also took part in the White House hack. [11]
On May 8, 1999, FBI agents arrested Eric Burns, known as Zyklon, charging him with multiple felony counts of computer intrusion, causing damage in excess of $40,000. On May 9, 1999, FBI launched raids on suspected members. [12] [13] [14] [15]
On May 27, the group retaliated for doing searches of nine of its members by the FBI by flooding the FBI Web site with thousands of requests for access. The FBI shut down the site as to not cause anymore damage to the server. A hacker named 'Israeli Ghost' took credit for the attack on the FBI’s site. [16] Over the next week, Global Hell also attacked the Virginia Senate. [17] [18] Hackers from other organizations defaced website of United States Department of the Interior and a site run by an Idaho-based federal supercomputer laboratory. A note threatening the destruction of the computers "if the FBI doesn't stop" was posted on a site maintained by the Idaho National Laboratory. [19] [20] [21] [22] [23] Global Hell was not able break into classified servers. [24]
Two members of the group were willing to cooperate. Through them, they got the address of Davis (Mindphasr). On June 2, FBI raided the Davis's apartment and he admitted being a member. [25] On June 28, at 2:14 a.m., Davis gained access to the Army's website and put a message "Global Hell is alive. Global Hell will not die". [26] [27] He also gained access to an unidentified Army network and modified the computer files. The website was tampered with for as long as nine hours. [28] Public access was restored within two hours of knowing. After this attack, the Army switched its website from Microsoft's Windows NT servers to WebStar servers running Mac OS. [29] [30] [31]
Davis was arrested on August 30, 1999, [32] and he pleaded guilty on January 4, 2000. On March 1, 2000, he received a six-month jail term and three years' probation. He was ordered to pay restitution in the amount of $8,054. Davis was the first person to be arrested in this investigation. [33] [34] [35] [36] [37] [38]
Burns pleaded guilty to his charges on September 7, 1999. On November 19, 1999, he was sentenced to 15 months in prison and three years' probation, plus an order to pay $36,240 in restitution to his victims. Burns was prohibited from using a computer for three years. [39]
In December 1999, Curador, a Wales-based 16-year-old member of the group reportedly compromised 26 companies, including a number of ISPs. When authorities tracked him down and confiscated his system, they found more than 200,000 Pacific Bell Internet user accounts of which 63,000 were already cracked. [40] [41] PacBell, then a part of SBC Communications, responded by asking the affected customers to change their passwords immediately. [42] Losses were estimated to be $3 million. [43] [44]
The group disbanded in 1999 as 12 participants in the group have been prosecuted for computer intrusions and about 30 more have faced lesser penalties. [45] [46]
On Feb 12, 2000, a hacker calling himself Coolio redirected users from RSA Security's website to another hacked site in Colombia on which he left a message "owned by coolio". [47] He was assumed to be a member of gH by Reuters. But law inforcement was searching "Coolio" lived in New Hampshire, not gH member "Coolio" who resided in Southern California. [48] [49]
In March 2000, Patrick Gregory or MostHateD, agreed to plead guilty to conspiracy to commit teleconferencing fraud and computer trespass. On March 31, he was arrested on charges of car theft and burglary by the local burglary squad. Later sheriff's department discovered that Gregory was expected in federal court. Due to his arrest, he missed an important federal court appointment where he was to plead guilty to computer trespass, telephone fraud and data theft. [50] [51] [52]
On April 12, 2000, Patrick Gregory plead guilty to conspiracy for "computer hacking" and "telecommunications fraud" [53] . Gregory also admitted to stealing codes that allowed him to create illegal conference calls. Those conversations were some of the most important evidence against gH members. On September 6, 2000, he was sentenced to 26 months in prison and had pay $154,529.86 in restitution. [54] [55] [56] [57]
The Melissa virus is a mass-mailing macro virus released on or around March 26, 1999. It targets Microsoft Word and Outlook-based systems and created considerable network traffic. The virus infects computers via email; the email is titled "Important Message From," followed by the current username. Upon clicking the message, the body reads, "Here's that document you asked for. Don't show anyone else ;)." Attached is a Word document titled "list.doc," containing a list of pornographic sites and accompanying logins for each. It then mass-mails itself to the first fifty people in the user's contact list and disables multiple safeguard features on Microsoft Word and Microsoft Outlook.
InfraGard is a national non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members. InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to preventing hostile acts against the United States.
GameSpot is an American video gaming website that provides news, reviews, previews, downloads, and other information on video games. The site was launched on May 1, 1996, created by Pete Deemer, Vince Broady, and Jon Epstein. In addition to the information produced by GameSpot staff, the site also allows users to write their own reviews, blogs, and post on the site's forums. It has been owned by Fandom, Inc. since October 2022.
The Level Seven Crew, also known as Level Seven, Level 7 or L7 was a hacking group that was in operation during the mid to late 1990s. It is rumored to have dispersed in early 2010 when the founder 'vent' was raided by the FBI on February 25, 2013.
The i-Opener was a low-cost internet appliance produced by Netpliance between 1999 and 2002. The hardware was sold as a loss leader for a monthly internet service. Because of the low cost of the hardware, it was popular with computer hobbyists, who modified it to run desktop PC software without the internet service.
HackWeiser was an underground hacking group and hacking magazine. It was a pro-US hacker group. It was one of the top hacker groups in year 2000. It had more than fifteen hackers who were a mix of Grey hat and Black Hat hackers.
Dennis Michael Moran, also known by his alias Coolio, was an American computer hacker from Wolfeboro, New Hampshire, who was accused in February 2000 of a series of denial-of-service attacks that shut down some of the most popular websites on the Internet. He was 17 years old when he committed the attacks. He was later arrested and pleaded guilty to defacing the websites of Drug Abuse Resistance Education and RSA Security, as well as unauthorized access of the U.S. Army and Air Force computer systems at four military bases. Moran died of a drug overdose in 2013.
The Collusion Syndicate, formerly the Collusion Group and sometimes spelled Collu5ion, C0llu5i0n or C011u5i0n, was a Computer Security and Internet Politics Special Interest Group (SIG) founded in 1995 and effectively disbanded around 2002.
Patrick Naughton is an American software developer and convicted sex offender. He is one of the creators of the Java programming language.
Global kOS ('kos' pronounced as chaos) were a grey hat computer hacker group active from 1996 through 2000, considered a highly influential group who were involved in multiple high-profile security breaches and defacements as well as a releasing notable network security and intrusion tools. Global kOS were involved with the media heavily and were interviewed and profiled by journalist Jon Newton in his blog titled "On The Road in Cyberspace" (OTRiCS). The group were reported multiple times to the FBI by Carolyn Meinel who attempted to bring the group to justice while members of Global kOS openly mocked her. The FBI had a San Antonio based informant within the group and individually raided several members after contact with the informant.
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.
Kali Linux is a Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security. The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories.
Playpen was a notorious darknet child pornography website that operated from August 2014 to March 2015. The website operated through the Tor network which allowed users to use the website anonymously. After running the website for 6 months, the website owner Steven W. Chase was captured by the FBI. After his capture, the FBI continued to run the website for another 13 days as part of Operation Pacifier.
NiceHash is a cryptocurrency broker and exchange with an open marketplace for buyers and sellers of hashing power. The company provides software for cryptocurrency mining. The company was founded in 2014 by two Slovenian university students, Marko Kobal and Matjaž Škorjanc. The company is based in The British Virgin Islands and has offices in Maribor, Slovenia.
Hamza Bendelladj is an Algerian cybercriminal and carder who goes by the code name BX1 and has been nicknamed as the "Smiling Hacker".
Double Dragon is a hacking organization with alleged ties to the Chinese Ministry of State Security (MSS). Classified as an advanced persistent threat, the organization was named by the United States Department of Justice in September 2020 in relation to charges brought against five Chinese and two Malaysian nationals for allegedly compromising more than 100 companies around the world.
FIN7, also called Carbon Spider, ELBRUS, or Sangria Tempest, is a Russian criminal advanced persistent threat group that has primarily targeted the U.S. retail, restaurant, and hospitality sectors since mid-2015. A portion of FIN7 is run out of the front company Combi Security. It has been called one of the most successful criminal hacking groups in the world. FIN7 is also associated with GOLD NIAGARA, ITG14, ALPHV and BlackCat.
LockBit is a cybercriminal group proposing ransomware as a service (RaaS). Software developed by the group enables malicious actors who are willing to pay for using it to carry out attacks in two tactics where they not only encrypt the victim's data and demand payment of a ransom, but also threaten to leak it publicly if their demands are not met.
Jesse Tuttle is an American tech consultant, Speaker, software engineer, and hacker, who is a former member of the hacking groups Hackweiser, Project China, and The Dispatchers.