{"id":3467,"date":"2023-12-13T13:57:38","date_gmt":"2023-12-13T12:57:38","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/blog\/top-3-most-notorious-hackers-and-hacker-groups\/"},"modified":"2024-08-05T14:27:49","modified_gmt":"2024-08-05T12:27:49","slug":"top-3-most-notorious-hackers-and-hacker-groups","status":"publish","type":"post","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/blog\/top-3-most-notorious-hackers-and-hacker-groups\/","title":{"rendered":"Top 3 most notorious hackers and hacker groups"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>In previous blogs we\u2019ve talked about <a href=\"https:\/\/opensight.indivontwikkelt.nl\/blog\/de-grootste-cyberaanval-in-de-geschiedenis\/\">the biggest cyberattacks in history,<\/a> but just as interesting are the people behind it. In this blog we\u2019re going to look at the elite of the cyberworld and what these names have done to get into the cybersecurity hall of fame.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"623\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/007-1024x623.png\" alt=\"Top 3 most notorious hackers and hacker groups\" class=\"wp-image-1625\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/007-1024x623.png 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/007-300x183.png 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/007-768x468.png 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/007-1536x935.png 1536w, https:\/\/opensight.indivontwikkelt.nl\/content\/007.png 1544w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">Kevin Mitnick, a.k.a. Condor<\/h3>\n\n\n\n<p><a href=\"https:\/\/nl.wikipedia.org\/wiki\/Kevin_Mitnick\" data-type=\"URL\" data-id=\"https:\/\/nl.wikipedia.org\/wiki\/Kevin_Mitnick\">Kevin Mitnick<\/a> a.k.a. Condor is seen as one of the most influential individuals in the hacker world and is considered a legend amongst other hackers. Kevin achieved this status through several hacks he performed in the 1980s and 1990s. In 1983 Condor successfully hacked into the servers of Pentagon (The Department of Defense and America&#8217;s largest government agency), resulting in his second arrest. Besides a few other infamous hacks, Kevin also became known by hacking into the NORAD (North American Aerospace Defense Command) and the NSA (National Security Agency). In 2003 Kevin Mitnick was released from prison and since then he has been a consultant and owner at his consultancy company in the (cyber) security industry, as well as an ethical hacker.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Anonymous (collective)<\/h3>\n\n\n\n<p><a href=\"https:\/\/nl.wikipedia.org\/wiki\/Anonymous_(collectief)\">Anonymous<\/a> is an international collective of hackers and activists founded in 2003. Anonymous have made themselves known through various attacks targeting websites and other communication channels of governments, companies, and agencies. The hacker movement usually carries out attacks against organizations it condemns to be incorrect and unjust. The most well-known attacks are for example the attack on the Church of Scientology, where they repeatedly had faxes from the organization print black pages, they were making phony phone calls and carrying out attacks where they took down the organization&#8217;s websites. Digital attacks in response to the IS attacks, in which sites and social media accounts were taken offline and members&#8217; personal data were distributed were also claimed by Anonymous. And most recently, Anonymous have received a lot of publicity because of the (cyber)war against Russia after the attack on Ukraine, because of this declaration several Russian government websites were taken offline, private data of government employees was distributed, and Russian state television channels were hacked, and war images were broadcast.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Evgeniy Mikhailovich Bogachev<\/h3>\n\n\n\n<p>Evgeniy Mikhailovich Bogachev is still on the FBI&#8217;s most wanted list. The 39-year-old Russian has been wanted for years by, among others, the FBI, the Russian FSB, and the Dutch police. In 2014, Bogachev was identified as the mastermind behind the harmful <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zeus_(malware)\">ZeuS virus<\/a>, after which the United States offered a $3 million reward in 2015 for information leading to Bogachev&#8217;s arrest The Russian is estimated to have captured several hundreds of millions using so-called hostage software. Police documents show that Bogachev previously found a victim in the ABN AMRO bank. Bogachev usually works under the pseudonyms &#8216;Umbro&#8217;, &#8216;Lucky12345&#8217;, &#8216;Monster&#8217; and &#8216;Slavik&#8217;. It is also known that the police have previously been able to arrest hundreds of criminals from his organization, but he himself remained out of reach of the arm of the law.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">Arm yourself and your company against hackers.<\/h3>\n\n\n\n<p>It remains a cat and mouse game when it comes to hackers and anti-hackers. One is always one step ahead of the other and that one continues to develop. Yet there is only one way that always ensures that it\u2019s easy for hackers to break in: do nothing. And that&#8217;s easily avoidable. To help you on your way, you can use <a href=\"https:\/\/opensight.indivontwikkelt.nl\/blog\/5-handige-tips-voor-het-omgaan-met-gegevensbeheer-en-dataveiligheid\/\" data-type=\"post\">this blog<\/a> in which we give several useful tips And as a basis the following applies: start <a href=\"https:\/\/opensight.indivontwikkelt.nl\/tips-bij-het-maken-van-een-ijzersterk-wachtwoord\" data-type=\"URL\">improving your passwords<\/a> now!<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Top 3 most notorious hackers and hacker groups - OpenSight","_seopress_titles_desc":"Who are the biggest hackers? In this blog we\u2019re going to look at the elite of the cyberworld and what these names have done to get into the cybersecurity hall of fame.","_seopress_robots_index":"","footnotes":""},"categories":[45],"tags":[],"class_list":["post-3467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/3467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/comments?post=3467"}],"version-history":[{"count":2,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/3467\/revisions"}],"predecessor-version":[{"id":5555,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/posts\/3467\/revisions\/5555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media\/1626"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=3467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/categories?post=3467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/tags?post=3467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}