December 19, 2023 | Jennifer Crump

Ingenious Facts About Hacking


Hacks can be simple or complex, hilarious or downright vindictive. And hackers? They can be motivated by the challenge, hubris, politics, and yes, profit. We’ve gathered the facts on 23 of the most infamous hacks of all time.


1. Conficker Worm

This is the hack that simply won't stop persisting. Launched in 2008, it still affects up to a million computers every year by replicating itself and then either converting computers into bots to send out more copies of itself or reading your credit card numbers. In 2015, Conficker was believed to be accountable for 20% of all cyber attacks, and it had even infiltrated body cams used by law enforcement agencies.

Hacking

2. First Digital Weapon

The worm Stuxnet infiltrated Iran’s nuclear refinement plant network—oof, that doesn't sound safe. And it wasn't: Hackers infected USB drives and then distributed them to five companies connected to the Iranian nuclear program. The worm eventually caused uranium centrifuges to spin out of control, destroyed thousands of uranium samples, and had leading Iranian scientists convinced that they were doing something to cause the problems. As a result, Stuxnet has been called the world's first digital weapon.

Hacking facts Getty Images

Advertisement

3. Home Depot Credit Card Attack

It started with hackers stealing a single password from a Home Depot vendor, and it ended with the exposure of 56 million credit cards and 53 million email accounts. Hackers used a vulnerability in Microsoft to jump from the vendor to Home Depot’s database. Code lurked there undetected for five months while quietly gathering information.

Hacking facts Shutterstock

4. Spamhaus 2013

Launched by a 17-year-old London teenager, this hack targeted Spamhaus, a non-profit web protection service that generates blacklists of spammers and hackers. It started with using infected computers to flood and overload the Spamhaus servers with web traffic (in what is called a distributed denial of service attack), and it quickly (and accidentally) slowed down the entire Internet.

Hacking factsShutterstock

5. So...Did I Win the Bid?

In 2014, the personal data of 145 million eBay users was compromised in a phishing attack. Hackers posted fake listings with malicious javascript in order to get users' login credentials.

Hacking facts Shutterstock

Advertisement

6. Making Bank

In June 2014, (likely) Russian hackers used a list of applications and programs used by JP Morgan’s computers and crosschecked it with possible vulnerabilities to find a way into the bank’s system. Although they scooped up information from 7 million businesses and 75 million households, they didn't move any money and didn't take any financial information. Which, uh, is actually kind of creepier.

Hacking facts Shutterstock

7. It's Always Explicit Content

The Melissa Virus works by distributing an infected email attachment that, once opened, sends itself along to your first 50 contacts. The virus originated in the same manner as many other viruses: through explicit adult content. In 1999, the virus was first distributed in the Usenet group alt.s in a file that contained passwords to pornographic sites. Be careful out there, lads.

Hacking factsShutterstock

8. LinkedOut

It took four years for LinkedIn to realize that a hacker named “Peace” had stolen the passwords and logins of millions of users, and they only discovered it at all because the info was being auctioned off on the dark web for about $2,300 for each bit. Oops.

Hacking facts Pixabay

Advertisement

9. Gamer Hack

In 2011, hackers launched an attack on Sony PlayStation that exposed the personal data of 77 million gamers, and added insult to injury by locking PlayStation users out of the system for over a week. The breach cost the company over $160 million. Worst of all? Millions of boyfriends had to actually spend time with their girlfriends.

Hacking facts PxHere

Factinate

Sign up to our newsletter.

History’s most fascinating stories and darkest secrets, delivered to your inbox daily. Making distraction rewarding since 2017.

Thank you!
Error, please try again.

10. Chip on Your Shoulder

In 2012, hackers accessed information on millions of credit cards and their users through Global Payments, a company that handles credit card transactions. Know how the US only just got chip credit cards, and had lagged behind other countries for years in getting the technology? Yeah, this attack took real advantage of that.

Hacking factsShutterstock

11. The Hack of the Century

Just as Sony Pictures was preparing to launch The Interview, a film featuring Seth Rogen that revolves around the plot to take down North Korean leader Kim Jong-un, hackers (presumably backed by North Korea) initiated a crippling attack that initially downloaded and then obliterated all of the company's data. Employees logging on to their computers were greeted by the sound of gunfire and the dancing, zombie-like heads of Sony execs. As a parting gift, the malware dumped the social security numbers of 47,000 employees, a slew of embarrassing emails, and even unreleased films into the waiting arms of the Internet. It's been called "the hack of the century," and that's no understatement.

Hacking facts Shutterstock

Advertisement

12. Oil and Trouble

In 2012, an unwitting computer technician in Saudi Arabia clicked on a link in an email, eventually crashing 35,000 computers belonging to Saudi Aramco, a company responsible for delivering 10% of the world’s oil. Aramco was reduced to relying on faxes and typewriters, and the hack even created a temporary shortage of hard drives; the company was scouring the earth for  50,000 of them.

Hacking facts Shutterstock

13. Sofa Theft

In the '90s, Russian hacker Vladimir Levin (with his team) managed to divert millions in Citibank wire transfers to his own accounts. Working from his laptop in London, England, Levin first accessed the Citibank network and was then able to download a list of customers and passwords. The FBI called the attack one of the first ever attempts to rob a bank by means of a computer.

Hacking facts Shutterstock

14. NASA

In 1999, a 15-year-old under the pseudonym C0mrade cracked a password, gaining access to NASA's network. He made away with $1.7 million worth of software and also breached the Pentagon's computer system in the process. NASA shut down its computers for almost a month, and Jonathan James (his real name) became the youngest person to be incarcerated for cybercrime.

Hacking facts Pexels

Advertisement

15. Thunderstruck!

In 2012, computers in Iran’s nuclear facilities began to randomly play AC/DC’s "Thunderstruck" at full volume in the middle of the night. The hackers were never identified, and they caused little other damage. Maybe they just really wanted to spread the word about AC/DC.

Live Concert of AC/DC Stadium Vicente Calderon MadridPhotography Stock Ruiz, Shutterstock

16. Operation Cupcake

Hackers don't always exist on the outskirts of society; many are employed by governments. When individuals attempted to download the handbook titled "How to Create a Dangerous Device in Your Mother's Kitchen" from al-Qaeda's premier English-language magazine, Inspire, they were greeted unexpectedly with...recipes for cupcakes? MI6 had hacked the site and replaced the pdf with cupcake concoctions, including "Mojito"and "Rocky Road," from none other than Ellen Degeneres.

Hacking factsPixabay

17. Flame

The Flame virus is seen as one of the most refined tools of cyber espionage ever crafted. As a Trojan disguising itself as harmless software, a backdoor offering entry points for hackers, and a worm capable of moving between computers, it presents threefold danger. Once it infiltrated computers across Iran in 2012, Flame was able to acquire passwords, take screengrabs, record conversations both within and around computers, and transfer data to its own servers.

1980s factsWikimedia Commons

Advertisement

18. I Love You

There wasn’t a lot of love in the fake email love letter sent to millions of computers in 2000. The email originated in the Philippines, and the worm it contained caused an estimated $10 billion in damages by replicating itself, replacing files on the computer's hard drive, and executing a password-stealing application.

Hacking factsShutterstock

19. The Big Sick

In the fall of 2016, a botnet virus named Mirai began bombarding servers worldwide, eventually bringing down Netflix, Twitter, and CNN, among others. It also affected several newspapers including The Guardian. As you can at least guess from the breadth of its victims, this botnet was likely the largest of its kind the world had ever seen.

Hacking factsPixabay

20. Anonymous

Ironically, we've all heard of the hacktivist group Anonymous, which grew out of the 4Chan message boards. The group has used the Guy Fawkes mask from V for Vendetta as a kind of mascotand generally aligns itself with liberal causes. Anonymous has targeted the Church of Scientology, the Westboro Baptist Church, and even Donald Trump.

Hacking factsPixabay

Advertisement

21. Fessing Up

It took almost two years for Yahoo to admit it had been the victim of the biggest data breach in history (500 million users affected), and then it beat its own record by disclosing a few months later that it had suffered an earlier data breach that doubled the size of that attack: 1 billion users were affected. An ignominious record, to say the least.

Hacking factsPxHere

22. Don't Let Yourself Be Next

Recently, several celebrities have had their revealing or provocative photos inadvertently shared online. Celebrities aren't the only one at risk; hackers may target an individual for financial gains, or as a vendetta. Individual hacking is a growing concern, and you are at risk of being hacked and having your information exposed if you fail to take precaution online.

Use different passwords for different online services. If you're using the same password across multiple platforms, then you're exposed to significant risk. First, hackers that get access to one platform can effectively get access to all services using the same password. Second, you lose your failsafe; mst online platforms have password resets that use different email addresses, but you can't use this feature if you've lost access to all platforms.

Be wary of public hotspots. There are applications, such as Firesheep, that can access information on any device on a public system. Your files, photos, and cookie data can be accessed.

If you aren't looking to download something trusted and specific, don't download anything. Any time you're browsing online or opening an email, be careful if you're prompted to download, run, or open a file. Ask yourself if the source is trusted, and do research before clicking that download button.

Hacking factsShutterstock

23. Ashley Madison

In 2015, a hacker group named Impact Team infiltrated the servers of Ashley Madison, a matchmaking service for potential cheaters, and gathered the private information of millions of users, including several individuals employed in defense services and governmental positions. While the site carefully encrypted its users' passwords, it still left its servers largely unprotected. What's worse: identity theft or having your affair revealed to your wife?

Hacking factsShutterstock 

Sources: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35


More from Factinate

Featured Article

I tried to get my ex-wife served with divorce papers. I knew that she was going to take it badly, but I had no idea about the insane lengths she would go to just to get revenge and mess with my life.

These People Got Genius Revenges

When someone really pushes our buttons, we'd like to think that we'd hold our head high and turn the other cheek, but revenge is so, so sweet.
April 22, 2020 Scott Mazza

Featured Article

Catherine of Aragon is now infamous as King Henry VIII’s rejected queen—but few people know her even darker history.

Catherine of Aragon Facts

Tragic Facts About Catherine of Aragon, Henry VIII’s First Wife

Catherine of Aragon is now infamous as King Henry VIII’s rejected queen—but very few people know her even darker history.
June 7, 2018 Christine Tran

More from Factinate

Featured Article

My mom never told me how her best friend died. Years later, I was using her phone when I made an utterly chilling discovery.

Dark Family Secrets

Dark Family Secrets Exposed

Nothing stays hidden forever—and these dark family secrets are proof that when the truth comes out, it can range from devastating to utterly chilling.
April 8, 2020 Samantha Henman

Featured Article

Madame de Pompadour was the alluring chief mistress of King Louis XV, but few people know her dark history—or the chilling secret shared by her and Louis.

Madame de Pompadour Facts

Entrancing Facts About Madame de Pompadour, France's Most Powerful Mistress

Madame de Pompadour was the alluring chief mistress of King Louis XV, but few people know her dark history—or the chilling secret shared by her and Louis.
December 7, 2018 Kyle Climans



Dear reader,


Want to tell us to write facts on a topic? We’re always looking for your input! Please reach out to us to let us know what you’re interested in reading. Your suggestions can be as general or specific as you like, from “Life” to “Compact Cars and Trucks” to “A Subspecies of Capybara Called Hydrochoerus Isthmius.” We’ll get our writers on it because we want to create articles on the topics you’re interested in. Please submit feedback to contribute@factinate.com. Thanks for your time!


Do you question the accuracy of a fact you just read? At Factinate, we’re dedicated to getting things right. Our credibility is the turbo-charged engine of our success. We want our readers to trust us. Our editors are instructed to fact check thoroughly, including finding at least three references for each fact. However, despite our best efforts, we sometimes miss the mark. When we do, we depend on our loyal, helpful readers to point out how we can do better. Please let us know if a fact we’ve published is inaccurate (or even if you just suspect it’s inaccurate) by reaching out to us at contribute@factinate.com. Thanks for your help!


Warmest regards,



The Factinate team




Want to learn something new every day?

Join thousands of others and start your morning with our Fact Of The Day newsletter.

Thank you!

Error, please try again.