10 Most Notorious Hackers of All Time | Hacked: Hacking Finance

Top Lists

10 Most Notorious Hackers of All Time

Posted on .

10 Most Notorious Hackers of All Time


This article was posted on Thursday, 08:56, UTC.

There are many notable hackers around the world. We at Hacked have put together a list of the 10 most notorious hackers of all time. 

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

1. Jonathan James

JonathonJamesKnown as “comrade” by many online, 15-year-old Jonathan James was the first juvenile convicted and jailed in the United States for hacking. James hacked into companies like Bell South, as well as the Miami-Dade school system and the Department of Defense in 1999. He gained access to information like the source code responsible for operating the International Space Station.

Once NASA detected the breach, the space agency shut down their computers for three weeks, apparently losing an estimated $41,000. Arrested on January 26, 2000, James plea-bargained and was sentenced to house arrest and probation. He later served six months in an Alabama prison after failing a drug test and thus violating his probation. Boston Market, Barnes & Noble, Office Max and other companies were victims of a 2007 massive hack. James was investigated by law enforcement for the crimes despite his denying any involvement.

James was found dead from a self-inflicted gunshot wound on May 18, 2008. In his suicide note he wrote he was troubled by the justice system and believed he would be prosecuted for newer crimes with which he had nothing to do.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //


2. Vladimir Levin

Russian hacker Vladimir Levin accessed Citibank computers in 1995 and re-routed $10 million into other bank accounts around the world.

Interestingly, Levin did not use the Internet to gain access to the bank’s database. Instead, he tapped into telecommunications systems and listened to customers state their account information. All but $400,000 was recovered, and he pled guilty to one charge of making $3.7 million in unauthorized transfers, according to the Wall Street Journal. Levin received three years in prison and was ordered to pay back $240,000 to Citibank. As the Federal Bureau of Investigation writes in 2014:

It was hardly the opening salvo in a new era of virtual crime, but it was certainly a shot across the bow.

Two decades ago, a group of enterprising criminals on multiple continents—led by a young computer programmer in St. Petersburg, Russia—hacked into the electronic systems of a major U.S. bank and secretly started stealing money. No mask, no note, no gun—this was bank robbery for the technological age.

Our case began in July 1994, when several corporate bank customers discovered that a total of $400,000 was missing from their accounts. Once bank officials realized the problem, they immediately contacted the FBI. Hackers had apparently targeted the institution’s cash management computer system—which allowed corporate clients to move funds from their own accounts into other banks around the world. The criminals gained access by exploiting the telecommunications network and compromising valid user IDs and passwords.


3. Gary McKinnon


Between 2001 and 2002, Scottish computer hacker Gary McKinnon gained access to 97 American military networks between 2001 and 2002, even leaving the military a message on its website: “Your security is crap.” McKinnon’s goal was to prove the existence of UFOs. The US failed to extradite him.

His hack has been called the “biggest military computer hack of all time.”  Today the former hacker has re-invented himself as a SEO wizard, charging 40 pounds per hour to help firms rank. Here is what the well-known hacker said he found during his hacks:



4. John McAfee


When John McAfee lived in Belize, he planned to study plants. Probably some psycho-active plants. He had a lab for this. Authorities seized his property for creating drugs in this lab, claims McAfee, after an official came seeking political bribes from the gringo. To get back at the Belize government and prove their corruption, he hacked every major computer from Belize government bureaucracies. He found evidence implicating officials in corruption, laundering, drug running and murder. He had to organize his own escape out of Belize to avoid arrest. He did this by faking a heart attack.

Today McAfee lays low, believing he is routinely being tracked by law enforcement. He recently posted on social media he got into a shootout with police after having been arrested.


5. Astra

Astra, a pseudonym, stands for a Greek hacker who gained access to French aviation company Dassault Group computers, stealing weapons technology data for more than five years. Astra sold information about jet fighters and military aircrafts to countries during the period spanning the hacks. Astra’s infiltration of Dassault computers apparently cost the company more than $360 million. Astra’s identity, never identified, is described by authorities as a 58-year old mathematician. Caught in January 2008, Astra was sentenced to six years in jail.


Stephen Wozniak // Viappy / Shutterstock

Stephen Wozniak // Viappy / Shutterstock

6. Stephen Wozniak

Co-founder of Apple Stephen Wozniak’s first white-hat hacking involved “phone-phreaking.” He bypassed the phone system and, while studying at the University of California, made devices for friends called “blue boxes” which enabled free long-distance phone calls. Wozniak reportedly used one of these devices to try and call the Pope. He later formed Apple Computer with pal Steve Jobs.


7. James Kosta

James Kosta and partners hacked big business and military computers, including major banks, General Electric and IBM. He was 14-year-old. Convicted of 45 counts of technical burglary and 45 years in prison, he instead joined the Navy at 18 years-old as intelligence analyst. At 20 he joined the CIA to track warlords in Africa and Middle East, and at 24 he sold his first dotcom company for millions of dollars. Today he mentors “troubled youth” to tap their full potential.

“When you look a little deeper, as people did with me, you’re able to get kids focused on their potential,” he once said.  Here is a recent Ted Talk he gave on the online gambling.


8. Kevin Mitnick

Kevin Mitnick has had a long lasting impact on the security industry. In early adulthood, he made free calls on hacked cellphones and stole code from companies such as Sun Microsystems and Novell, according to The New York Times. He told the times he even hacked into NSA phone calls. After pleading guilty to numerous fraud charges, he served five years in prison and now works as a professional security consultant. He remains active today, especially on Twitter.


9. Adrian Lamo


Chelsea Manning

The “homeless hacker”, Adriam Lamo, is also one of the world’s most hated hackers after turning in Chelsea Manning for leaking classified US Army documents.

Before that, he hacked the computer of The New York Times in 2002 gaining access to private databases including information of all 3,000 authors of op-eds at the paper. Sentenced two years probation and fined nearly $65,000, Lamo went on to bigger fame later in life.

Lamo turned in Chelsea Manning for being a source to WikiLeaks. He said Manning’s long sentence would be a “lasting regret.

I think about him every day. The decision was not one I decided to make, but was thrust upon me.


10. David L. Smith

David Smith authored the Melissa worm virus; that is, the first successful email-aware virus distributed in the Usenet discussion group alt. sex. Arrested and sentenced for causing more than $80 million in damage, David Smith remains one of the world’s original notorious hackers after serving 20 months in jail.

There are other notable hackers, such as Max Ray “Iceman” Butler (ran up over $86 million in fraudulent charges), Kevin Poulson (military and phone company hacks), Jeremy Hammond (Anonymous) and Albert Gonzalez ( hack of TJ Maxx and other retailers). Of course, there are entire hacker groups, such as Anonymous, as well. 

Who are some of the most notorious hackers in your mind? Let us know in the comment field below.

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.

Feedback or Requests?

Justin OConnell

Justin OConnell


Justin O'Connell is the founder of financial technology focused CryptographicAsset.com. Justin organized the launch of the largest Bitcoin ATM hardware and software provider in the world at the historical Hotel del Coronado in southern California. His works appear in the U.S.'s third largest weekly, the San Diego Reader, VICE and elsewhere.

  • user

    AUTHOR mmb

    Posted on 7:47 pm September 6, 2015.

    After being denied by administrators, Mark Bolzern hacked the University of Alaska statewide computer network in 1978, doing something they didn’t think was possible. He used the central Honeywell 66 in Fairbanks to send emails to all system users inviting them to participate in an Apple II user group via an early shared account he created, and then set up group communication via what was then called xmail. Perhaps the first BBS in history. The Apple access (terminal emulation, etc) was done free via software written and distributed by Bolzern and an associate that made any Apple II with a Hayes modem into a remote terminal for this GCOS system, later an IBM PC version called PC Communicator (By Bolzern, before PC-Talk) was released as well. GCOS was a very early variant of Unix, and is why the field in Linux where the user’s full name goes is called the GCOS field. The Apple software written by Bolzern was to my knowledge the worlds very first instance of a remote computer booting itself from scratch into networked cooperation with host computer. Any user could type one line of hex codes on his Apple II (received via email, or on paper), which then dialed the UofA system, downloaded and launched the rest of the software. Mark also used this software himself to continue accessing and using the system in his third floor Lathrop Hall Dorm room (holes in the walls still there in the 90s, and maybe even now), via wires to the one phone down the hall. Also from anywhere else he happened to be with his Apple II and Hayes Modem, as well as to communicate with his family back home via email, and continued after graduation as an Electrical Engineer in 1981. What Bolzern created at UAF soon became used by university teachers and students for years thereafter. For a hint of what he has accomplished since see the WIkipedia entry on him, or his LinkedIN profile. Very impressive. Definitely one of the unsung heros of the last fourty years. https://en.wikipedia.org/wiki/Mark_Bolzern

  • View Comments (1) ...
    The team:
    Dmitriy Lavrov
    Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
    Jonas Borchgrevink
    Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com. // -- Discuss and ask Read More
    Mate Csar
    Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
    Mati Greenspan
    Senior Market Analyst at Etoro.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Important: Never invest Read More
    Rakesh Upadhyay
    Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
    Pamela Meropiali
    Account Manager
    Pamela Meropiali is responsible for users on Hacked.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Read More
    Joseph Young
    Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More
    Google changed its logo, and the Internet did what it…