Hackweiser

Last updated
Hackweiser
Formation1999
Dissolved2003
Location
Origin
North America
Founders
p4ntera , B33rc4n

HackWeiser is an underground hacking group and hacking magazine founded in 1999. In early-2001 the founder and leader, p4ntera, left the group with saying very little.

In April 2001 Hackweiser claimed credit with the start of Project China. The project was a focus of hack attacks based at Mainland Chinese computer systems. [1]

The group has appeared in the news due to having defaced well known websites, including websites owned by Microsoft, Sony, Walmart, Girlscouts of America, Jenny Craig, DARE, Nellis Air Force Base aka Area 51, CyberNanny. [2] and countless others. They have been noted by the US Attorney's Bulletin in reference to "Responsible hackers". [3] They have won multiple categories in the "State of the Hack Awards" [4]

The members of the groups were a mix of Grey hat and Black Hat hackers.

Members included; R4ncid, Bighawk, [P]hoenix, ka0x, Immortal, RaFa, Squirrlman, odin, x[beast]x, rootgoat, Phiz, Jak-away (AKA Hackah Jak), psaux, bi0cide, xor, xar, [s]pider, vicious, p4ntera, prod1gy, pr0phet, mythras, scurvy, skye, blackdog.

The group eventually fell apart and disbanded after the arrest of Jesse Tuttle (Hackah Jak) in mid-2003. Although reports still indicate that many ex-members are active on the underground.

. [5]

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">InfraGard</span> FBI Initiative for Public-Private Sector Infrastructure protection

InfraGard is a national non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members. InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to preventing hostile acts against the United States.

<span class="mw-page-title-main">YTCracker</span> Hip-hop musician

Bryce Case Jr., otherwise known as YTCracker, is an American rapper from La Mirada, California. His stage name derives from having formerly been a black hat hacker. Case is best known for his contributions to the Hacking community along with nerdcore hip hop subculture.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Level Seven (hacker group)</span> Hacker group

The Level Seven Crew, also known as Level Seven, Level 7 or L7 was a hacking group that was in operation during the mid to late 1990s. It is rumored to have dispersed in early 2010 when the founder 'vent' was raided by the FBI on February 25, 2013.

<span class="mw-page-title-main">Timeline of Internet conflicts</span>

The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

Patriotic hacking is a term for computer hacking or system cracking in which citizens or supporters of a country, traditionally industrialized Western countries but increasingly developing countries, attempt to perpetrate attacks on, or block attacks by, perceived enemies of the state.

EC-Council is a cybersecurity certification, education, training, and services company based in Albuquerque, New Mexico.

<span class="mw-page-title-main">Cyberattacks during the Russo-Georgian War</span> Series of cyber attacks during Russo-Georgian war in 2008

During the Russo-Georgian War, a series of cyberattacks swamped and disabled websites of numerous South Ossetian, Georgian, Russian and Azerbaijani organisations. The attacks were initiated three weeks before the shooting war began.

World of Hell was a grey hat computer hacker group that claims to be responsible for several high-profile attacks in the year 2001. It gained attention due to its high-profile targets and the lighthearted messages it has posted in the aftermath of its attacks.

Global kOS ('kos' pronounced as chaos) were a grey hat computer hacker group active from 1996 through 2000, considered a highly influential group who were involved in multiple high-profile security breaches and defacements as well as a releasing notable network security and intrusion tools. Global kOS were involved with the media heavily and were interviewed and profiled by journalist Jon Newton in his blog titled "On The Road in Cyberspace" (OTRiCS). The group were reported multiple times to the FBI by Carolyn Meinel who attempted to bring the group to justice while members of Global kOS openly mocked her. The FBI had a San Antonio based informant within the group and individually raided several members after contact with the informant.

<span class="mw-page-title-main">Syrian Electronic Army</span> Hacker group affiliated with the Syrian government

The Syrian Electronic Army is a group of computer hackers which first surfaced online in 2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website defacement, malware, phishing, and denial-of-service attacks, it has targeted terrorist organizations, political opposition groups, western news outlets, human rights groups and websites that are seemingly neutral to the Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense contractors. As of 2011, the SEA has been "the first Arab country to have a public Internet Army hosted on its national networks to openly launch cyber attacks on its enemies".

Lizard Squad Hacker group

Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service (DDoS) attacks primarily to disrupt gaming-related services.

<span class="mw-page-title-main">Islamic State Hacking Division</span>

The Islamic State Hacking Division (ISHD) or The United Cyber Caliphate(UCC) is a merger of several hacker groups self-identifying as the digital army for the Islamic State of Iraq and Levant (ISIS/ISIL). The unified organization comprises at least four distinct groups, including the Ghost Caliphate Section, Sons Caliphate Army (SCA), Caliphate Cyber Army (CCA), and the Kalashnikov E-Security Team. Other groups potentially involved with the United Cyber Caliphate are the Pro-ISIS Media group Rabitat Al-Ansar (League of Supporters) and the Islamic Cyber Army (ICA). Evidence does not support the direct involvement of the Islamic State leadership. It suggests external and independent coordination of Pro-ISIS cyber campaigns under the United Cyber Caliphate(UCC) name. Investigations also display alleged links to Russian Intelligence group, APT28, using the name as a guise to wage war against western nations.

Ghost Squad Hackers ("GSH") is a hacktivist group responsible for several cyber attacks. Former targets of the group include central banks, Fox News, CNN, the United States Armed Forces and the government of Israel. The group is led by a de facto leader known as s1ege, and selects targets primarily for political reasons. The group forms a part of the hacktivist group Anonymous.

Jesse Tuttlea.k.a.Hackah Jak', is an American tech consultant, software developer, and convicted hacker from the hacker group Hackweiser, Project China, and the Dispatchers.

References

  1. Sam Costello (2001-05-02). "Chinese hackers continue Web defacements". CNN.com. Archived from the original on 2008-03-05. Retrieved 2008-02-03.
  2. Jennifer DiSabatino (2001-04-20). "CyberNanny Web site hacked with vulgar language". ComputerWorld. Archived from the original on 2006-10-16. Retrieved 2006-07-09.
  3. Daniel A. Morris. "Tracking a Computer Hacker". US Attorney's Office. Archived from the original on 2006-07-08. Retrieved 2006-07-09.
  4. "The State of The Hack Awards #1" . Retrieved 2006-07-09.
  5. Dan Horn (2003-07-23). "Hacker claims he was working for FBI". Cincinnati Enquirer. Retrieved 2008-02-03.