5 million for a hacker's head: the most famous hacker groups

Hacker

Professional
Messages
1,044
Reaction score
812
Points
113
This article was written for educational purposes only. We do not call anyone to anything, only for information purposes! The author is not responsible for your actions

In early December 2019, the US Department of Justice filed charges against two Russians. Maxim Yakubets and Igor Turashev are accused of creating the hacker group Evil Corp, and the Federal Bureau of Investigation promises to pay $ 5 million for helping to catch them. For comparison, the same was paid for information about Hakimullah Mehsud. This is the leader of the Afghan Taliban, who organized several terrorist attacks and is responsible for the death of thousands of people. For help in the capture of Khun Sa - the opium king of the world - the US government was willing to pay three million. If you are reading this inscription, it means that someone took this article from BroDude.ru That is, such amounts are assigned for the heads of the most hellish characters, and here there are just some hackers. The point, as it turns out, is in the amounts. Evil Corp specialized in stealing money from individuals and organizations in the US and UK. The exact data are still unknown, but the charges are about $ 70 million. It is assumed that the real amount may be several times higher. In general, 5 million for the head of a cybercriminal is an absolute record in world history, but Evil Corp is far from the only hacker group worthy of attention.

Red Hacker Alliance.

6e0ed34f719200e3c6f6d.png


The Red Hacker Alliance is probably the largest hacking group in the world. However, it is not surprising, this is China. According to some estimates, the size of the group exceeds 80,000 people. If so, then they do not even need any software for a DDoS attack: they can lay down any site manually, simply by accessing it at the same time. Although the "Alliance of Red Hackers" is considered an informal organization, no one doubts their cooperation with the PRC government. Otherwise, they would not have existed for a long time. It is believed that the "Alliance" is a unit in the People's Liberation Army of China and reports directly to the General Staff. Members of the Red Hacker Alliance have been implicated in attacks on major Western media outlets, in particular CNN.

9ecee520f652217ac8e5f.png


The term anonymous appeared in 2003 on anonymous imageboards. It denoted the concept of uniting anonymous users to achieve any goals. The unification has always been anarchic in nature, and the goal is usually simple fun. By the end of the 2000s, the word "Anonymous" became associated with international hacktivism. Despite the hype in the media space, there is more noise from the "announcers" than the deeds. An international group of hackers is conducting more actions offline than on the Internet. However, there are also high-profile network achievements. For example, "Operation Paris" - hacking of several thousand accounts of members of the terrorist group "Islamic State". They also notoriously flogged with lovers of child pornography. In 2011, the announcements hacked one of the largest thematic sites and made the data of one and a half thousand of its users publicly available. All in all, Anonymous is a decentralized movement with no permanent focal points and no common goal. Moreover, any group of hackers, or even a loner, can carry out some kind of attack on behalf of Anonymous. No one will be able to confirm or deny the involvement, because any person hiding under the mask can be an anonymous person. Among them there are people of completely different political views, pursuing the most different goals, speaking different languages. In general, this is precisely why the phenomenon of "anonymous" is curious. Among them there are people of completely different political views, pursuing the most different goals, speaking different languages. In general, this is precisely why the phenomenon of "anonymous" is curious. Among them there are people of completely different political views, pursuing the most different goals, speaking different languages. In general, this is precisely why the phenomenon of "anonymous" is curious.

3291b06b25312812064e5.png


"Platoon of Lizards" is one of the youngest hacker groups, its member at the time of arrest was 15 to 17 years old. The leader of the "lizards" Zachary Bukhta began his journey with a phone bombing service. So it was called - "phonebomber". It was possible to place an order on the site, after which threatening calls from fake numbers were received on the victim's phone every hour. Sometimes the "bombing" of one victim continued for several weeks. Soon, Lizard Squad decided to expand the list of services and began to offer the organization of DDoS attacks. For Christmas 2014, they laid down the Sony PlayStation and Microsoft Xbox Live gaming networks, which they boasted about on Twitter. Then the Maltsov suffered: they began to accept orders for attacks on government sites, in particular on the National Crime Agency of Great Britain. Besides, they continued to brag on social media in every possible way, leaving victims with taunts like "No one can catch a lizard." As a result, they got caught. Another group of hackers broke into the Lizard Squad website and leaked the owner's personal data to the public. The investigation lasted more than two years, 20-year-old Zachary Bukhta was sentenced to only three months in prison, but ordered to pay a fine of 350 thousand dollars. Initially, he was threatened with up to 10 years in prison, but Zachary made a deal with the investigation. Another group of hackers broke into the Lizard Squad website and leaked the owner's personal data to the public.

Chaos Computer Club - one of the oldest hacker groups in the world, was founded in 1981 in Germany. Since these are Germans, they started their activities accordingly, that is, they consulted with representatives of law enforcement agencies regarding the legality of their actions. Hence the motto of the group “Hacking is not a crime”. It is believed that it was Chaos Computer Club who were the first to bypass fingerprint protection on the then new iPhone 5. According to the hackers, to access someone else's iPhone, it is enough to get a clear fingerprint of its owner, for example, on a window glass. Then this print is photographed with a camera with a good resolution, processed in a photo editor and printed on thick paper. The resulting material is filled with liquid latex, which is removed after drying. That ' s it - the real fingerprint is ready. By the way,

Very little is known about the Bureau 121 hacker group, because these guys are from the DPRK. Dissonance immediately arises: it seems like where is North Korea and where are the hackers? They don't even have the Internet in the country. Only a select few have access to the Internet, less than 1% of the entire population of North Korea. This percentage includes hackers from Bureau 121, however, many of them are dispersed throughout the world under the guise of diplomats. The families of these people remain in the DPRK, but they enjoy privileges and have a high social status. The Bureau, also known as Unit 121, became widely known in 2014. Then the company Sony Pictures canceled the premiere of its comedy film "Interview", which was supposed to show the assassination attempt on Kim Jong-un. An eerie noise rose: Director of US National Intelligence James Klepper called the cyberattack against Sony Pictures the largest hacker attack ever launched against US interests. Of course, this was a thickening of colors, because everyone knows the relationship between the United States and the DPRK, but then even more interesting details emerged. It turned out that Korea is being accused for a reason, but with direct evidence. Back in 2010, US NSA employees infiltrated North Korean computer networks and launched spyware on them. Thanks to this, Washington was able to quickly determine where the attack on Sony Pictures came from. Back in 2010, US NSA employees infiltrated North Korean computer networks and launched spyware on them. Thanks to this, Washington was able to quickly determine where the attack on Sony Pictures came from. Back in 2010, US NSA employees infiltrated North Korean computer networks and launched spyware on them. Thanks to this, Washington was able to quickly determine where the attack on Sony Pictures came from.
 
Top