fbpx

Legendary Hacks

Date Posted:

25/08/2022

Author:

Tags:

Share this Post:

Legendary Hacks

Today the word “Hacker” is synonymous with individuals who use technical know-how to gain illegal access to data. It came from a term first used in 1955 by the ‘Technical Model Railroad Club’ to describe how members would modify their high-tech train sets.

There are many thousands of “hacks” every year varying in size and severity. The motivation behind these attacks can range from financial rewards to gathering intelligence; sometimes it can purely be curiosity or aim to cause trouble. We had a look back to see some of the most legendary hacks.   

1. Phreaking

Phreaking is the term used to describe the activity of gaining entry to secure telecommunication networks to make free phone calls. Considered one of the earliest forms of hacking, it began in the late 1950s and involved imitating the dialling tones used by phone networks to trigger switches.  

Some of the tones used at the time by AT&T were for internal company usage only. One of these being a tone of 2600 Hz which would tell the telephone switch that the call had ended; if this was imitated and the phone was never put down, you would be able to carry out long-distance and international calls for free.  This was discovered by a seven-year-old boy by the name of Joe Engressia who had perfect pitch and found that when he whistled the fourth E above middle C (2637.02 Hz), the phone recording stopped.

Years later a friend of Engrassia, John Draper, also known as Captain Crunch, learned that a toy whistle included in Cap’n Crunch cereal boxes emitted a tone of, you guessed it, 2600 Hz.

cap'n crunch whistle

2. Heartland Payment Systems

One of the biggest credit card processing companies, Heartland Payment Systems, had a huge data breach in 2008 when two Russian hackers installed malware and managed to steal over 100 million debit and credit card numbers. Afterwards, they implemented rafts of security measures to ensure an attack would never happen again. So much so, in 2015 they issued a data breach warranty to their customers:

“Heartland Payment Systems is so confident in the security of its payment processing technology that, on Jan. 12, it announced a new breach warranty for its users. The warranty program will reimburse merchants for costs incurred from a data breach that involves the Heartland Secure credit card payment processing system.”

This confidence was however misplaced. On May 8th 2015, Albert Gonzales broke into their offices and stole computers with access to data such as banking info, social security numbers and payroll customers.

The perpetrator was caught and sentenced to 20 years in prison, whilst Heartland Payment Systems incurred $140 million in fines.

3. Melissa Virus

Named after an exotic dancer in Florida, according to it’s creator David Lee Smith, the virus was first posted in 1999 as a file on an internet newsgroup called “alt.sex”, with the promise that it contained passwords to gain free access to fee-based adult websites. When a user opened it in Microsoft Word, the virus was installed. The reason it spread so far and wide was that it would use the person’s Microsoft Outlook email to send the virus out to the first 50 people in their contact list. 

The virus wasn’t intended to steal any money, but it overloaded the email servers of over 300 corporations and government bodies across the world. The cost to rectify affected computers and networks is estimated at $80 million. 

Microsoft Office 97 wordmark

This would act as inspiration for future cyber attacks and was effectively one of the first phishing attacks. On the other hand, it also led to improvements and a higher awareness of the threats posed all computer users.

4. NASA Cyber Attack

In 1999, NASA had to shut down computers that supported the international space station for 21 days after its network was accessed by a 15-year-old hacker, James Jonathon, who went under the name of ‘c0mrade’.

After first being introduced to computers at the age of six, where he would simply play games, his attention soon turned to learning programming languages and operating systems. After his parents became worried about his obsession with computers, they banned the use of his computer. He insisted that his time on the computer wasn’t affecting his high grades at school; it was later revealed that he had hacked into his school’s network to change his scores.

After installing malware on a server in Alabama, he was able to compromise 13 computers on NASA’s network and act as an employee, downloading source code which controlled the life support systems on the ISS. The worth of which was estimated to be in the millions. After discovering this, NASA disconnected the server and infected machines for three weeks to find the cause of the intrusion, costing them roughly 40 thousand dollars.

International Space Station

5. Adobe Cyber Attack

In 2013, software-maker, Adobe, reported that the personal data of 38 million of its users had been stolen in a cyber-attack. 33.1 million of those users had their customer IDs and passwords stolen, while the other 2.9 million had their debit and credit card compromised also.

Furthermore, parts of the source code to Adobe’s Photoshop, Acrobat and ColdFusion had been illegally accessed. These products are some of the most popular in their respective fields, with this breach, their programs could be copied which in turn may increase competition.

Legendary Hacks - Adobe Photoshop

Something all of these hacks had in common, was that the victims of these breaches were unprepared and didn’t expect an attack to happen to them. These companies were forced to be more secure through having to react to a negative situation, rather than improving their cyber security beforehand. Instead of letting the worst happen, you should ensure your environment is secure to prevent breaches. If you’d like to find out how you can do this, get in touch with our team of Cyber Security Specialists today.

Share this Post:

You May Also Like:

Tech Driven. People Powered.

Protect your business today

To find out more about how we can secure your organisation against all forms of cyber security attack, get in touch with SEP2 now or sign up to our newsletter.

Sign Up

join our newsletter today

To find out more about how we can secure your organisation against all forms of cyber security attack sign up to our newsletter.

Your data will be handled in accordance with our Privacy Notice

Kieron sitting at a desk in the SEP2 office posing for his headshot

Kieron

Central Response Team Manager

Kieron has been with SEP2 since 2019 and works in our support team.

For Kieron, there is no typical day at SEP2, for one day he can be working through open tickets, another day you could be working on a priority case for the duration of the day, and another day you could be working on an ongoing project, but what Kieron enjoys is that the mix of challenges keeps the role fresh and interesting.

Kieron likes that within the support team everybody works well together, and shares knowledge between every level and are constantly being encouraged to learn.

In his spare time, Kieron’s current favourite hobby is working on his allotment, which gives him a nice change of scenery and a break from technology.