Hacker group

Last updated

Hacker groups are informal communities that began to flourish in the early 1980s, with the advent of the home computervHere are some examples DuckSec,LulzSec, Lizard Squad.+919783283846

Contents

Overview

Prior to that time, the term hacker was simply a referral to any computer hobbyist. The hacker groups were out to make names for themselves, and were often spurred on by their own press. This was a heyday of hacking, at a time before there was much law against computer crime. Hacker groups provided access to information and resources, and a place to learn from other members. [1] Hackers could also gain credibility by being affiliated with an elite group. [1] The names of hacker groups parody large corporations, governments, police and criminals; [2] and often used specialized orthography. [2]

See also

Related Research Articles

A computer hacker is a computer expert who uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems. Law enforcement agencies have also been using hacking techniques in order to collect evidence on criminals and other malicious actors using anonymity tools and the dark web to mask their identities online.

Internet Relay Chat Protocol for real-time Internet chat and messaging

Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model. IRC clients are computer programs that users can install on their system or web based applications running either locally in the browser or on a 3rd party server. These clients communicate with chat servers to transfer messages to other clients. IRC is mainly designed for group communication in discussion forums, called channels, but also allows one-on-one communication via private messages as well as chat and data transfer, including file sharing.

In Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

The hacker culture is a subculture of individuals who enjoy the intellectual challenge of creatively overcoming limitations of software systems to achieve novel and clever outcomes. The act of engaging in activities in a spirit of playfulness and exploration is termed "hacking". However, the defining characteristic of a hacker is not the activities performed themselves, but the manner in which it is done and whether it is something exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. Therefore, the hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damages. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.

A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground".

Anonymous (group) Hacktivist group

Anonymous is a decentralized international activist/hacktivist collective/movement that is widely known for its various cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.

GhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an advanced persistent threat, or a network actor that spies undetected. Its command and control infrastructure is based mainly in the People's Republic of China and GhostNet has infiltrated high-value political, economic and media locations in 103 countries. Computer systems belonging to embassies, foreign ministries and other government offices, and the Dalai Lama's Tibetan exile centers in India, London and New York City were compromised.

Antisec Movement

The Anti Security Movement is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Topiary, real name Jake Leslie Davis, is a hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. He was an associate of the Internet group Anonymous, which has publicly claimed various online attacks, including hacking HBGary, Westboro Baptist Church, and Gawker. They have also claimed responsibility for the defacing of government websites in countries such as Zimbabwe, Syria, Tunisia, Ireland, and Egypt.

LulzSec Hacker group

Lulz Security, commonly abbreviated as LulzSec, was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist Hector Monsegur, who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. British authorities had previously announced the arrests of two teenagers they allege are LulzSec members T-flow and Topiary.

Operation AntiSec Series of cyberattacks conducted by Anonymous and LulzSec

Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of the hacking group LulzSec and Anonymous, and others inspired by the announcement of the operation. LulzSec performed the earliest attacks of the operation, with the first against the Serious Organised Crime Agency on 20 June 2011. Soon after, the group released information taken from the servers of the Arizona Department of Public Safety; Anonymous would later release information from the same agency two more times. An offshoot of the group calling themselves LulzSecBrazil launched attacks on numerous websites belonging to the Government of Brazil and the energy company Petrobras. LulzSec claimed to retire as a group, but on 18 July they reconvened to hack into the websites of British newspapers The Sun and The Times, posting a fake news story of the death of the publication's owner Rupert Murdoch.

Hector Xavier Monsegur, known also by the online pseudonym Sabu, is an American computer hacker and co-founder of the hacking group LulzSec. Facing a sentence of 124 years in prison, Monsegur became an informant for the FBI, working with the agency for over ten months to aid them in identifying the other hackers from LulzSec and related groups. LulzSec intervened in the affairs of organizations such as News Corporation, Stratfor, UK and American law enforcement bodies and Irish political party Fine Gael.

Mustafa Al-Bassam British computer hacker and co-founder of the hacking group LulzSec

Mustafa Al-Bassam is a British computer security researcher and hacker. He co-founded the hacker group LulzSec in 2011, which was responsible for several high profile breaches. He later went on to co-found Chainspace, a company implementing a smart contract platform, which was acquired by Facebook in 2019. He is currently a PhD student in the Information Security Research Group at University College London working on peer-to-peer systems. Forbes listed Al-Bassam as one of the 30 Under 30 entrepreneurs in technology in 2016.

Ryan Ackroyd Black Hat Hacker

Ryan Ackroyd, a.k.a.Kayla and lolspoon, is a former black hat hacker who was one of the six core members of the hacking group "LulzSec" during its 50-day spree of attacks from 6 May 2011 until 26 June 2011. At the time, Ackroyd posed as a hacker named "Kayla" and was responsible for the penetration of multiple military and government domains and many high profile intrusions into the networks of Gawker in December 2010, HBGaryFederal in 2011, PBS, Sony, Infragard Atlanta, Fox Entertainment and others. He eventually served 30 months in prison for his hacking activities.

The Shadow Network is a China-based computer espionage operation that stole classified documents and emails from the Indian government, the office of the Dalai Lama, and other high-level government networks. This is the second cyber espionage operation of this sort discovered by researchers at the Information Warfare Monitor, following the discovery of GhostNet in March 2009. The Shadow Network report "Shadows in the Cloud: Investigating Cyber Espionage 2.0" was released 6 April 2010, approximately one year after the publication of "Tracking GhostNet".

Elias Ladopoulos is a technologist and investor from New York City. Under the pseudonym AcidPhreak, he was a founder of the Masters of Deception (MOD) hacker group along with Phiber Optik and Scorpion. Referred to as The Gang That Ruled Cyberspace in a 1995 non-fiction book, MOD was at the forefront of exploiting telephone systems to hack into the private networks of major corporations. In his later career, Ladopoulos developed new techniques for electronic trading and computerized projections of stocks and shares performance, as well as working as a security consultant for the defense department. He is currently CEO of Supermassive Corp, which is a hacker-based incubation studio for technology start-ups.

References

  1. 1 2 Thomas, Douglas (2003). Hacker Culture . University of Minnesota Press. p. 90. ISBN   978-0-8166-3346-3.
  2. 1 2 Sterling, Bruce (1993). "Part 2(d)". The Hacker Crackdown . McLean, Virginia: IndyPublish.com. p. 61. ISBN   1-4043-0641-2.