What is hacking? The history of hacking from 1980 to 2013. With the touch of information technology, people’s lives have become easier and richer with various benefits, but at the same time, another issue has come in front of everyone. And that is hacking. And yes, the crime trend of online criminal groups is now one of the most talked-about in the technology world.
What is hacking?
In the present context, hacking is the act of accessing, deleting, or altering important information from another person’s an account/network/computer without any permission, which is harmful to that person or organization. What can not be done with the help of this hacking! Theft of money from online accounts, collection of personal information, viruses, malware attacks. Even your life can be ruined if worn in the hands of a very bad hacker. Even the crack software you use is due to this hacking.
The beginning of hacking
Although there is an extremely negative attitude towards hacking nowadays, the origin of hacking was not like that. In the fifties and sixties of the last century, some students of the Massachusetts Institute of Technology (MIT) formed a special team to make the best use of their talents, who are far ahead of other students in thinking and skills. This team from MIT is the last hope to solve any programming problem. Every member of this group was called a hacker.
Gradually the use of computer increased manifold. And its field of use is also expanding. At the same time, the capacity of MIT members continues to grow. The spread of computers also gained new momentum due to their talent and skills. Almost all of these hackers were young. Innovation, talent and depth of thought were their main weapons. The current trend of hacking was also the seed of these hackers. The extraordinary skill on programming gave them immense power. The abuse of power begins to some extent among those young hackers.
History of hacking:
The Freaks appeared in the 1970s as hackers, but they were named after their type of work. They hacked the network of the telephone system and talked on the telephone free of cost. A freaker named John Thomas Draper was arrested multiple times in 1970 for hacking telephone network networks. Also known as Captain Crunch. Also two members of the Homebrew Computer Club of California. Created a device called “blue boxes” that could be used to hack telephone network networks and talk for free. These two later became known as “Berkeley Blue” and “Oak Toebark”. You will be surprised to hear that there were two of them – “Berkeley Blue” (Steve Jobs) and “Oak Toebark” (Steve Wozniak) who later founded Apple Computer.
- In the 1980s, hackers attacked 60 high-profile computer networks, including Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank. These hackers were all members of MIT’s hacker team. In 1983, these 6 hackers were arrested. In the same year, a computer scientist named Ken Thompson, who received the Turing Award, mentioned in his speech that Trojan horse malware is a program that is harmful to computers.
- Since 1983, Hacking Magazine 2600 has been published regularly with various tips for hackers. And the harassment of hackers is increasing.
- In 1978, the US government enacted a law to prevent hacking called the Computer Fraud and Abuse Act, but hackers did not stop there, but their activities continued to expand.
- Then, in 1986, a virus called “Morris worm” spread to 6,000 computer systems in ARPANET’s network. That same year, the National Bank of Chicago lost 60 million to computer hacking.
- Then in 1973, two hackers, Data Street and Kuji hacked Griffith’s Air Force Base, NASA’s network.
- In 1998, Microsoft’s Windows NT operating system was attacked by a high profile.
- In 1998, the Pentagon’s database was attacked.
Hacking anew in the new century:
- In the year 2000, hackers were able to spread their activities all over the world. In just three days, a Canadian hacker “MafiaBoy” hacked the servers of big organizations like Yahoo, eBay, Amazon.com, CCN. The attack was carried out by hackers using “Denial-of-service“. Hackers have stolen more than 55,000 credit card information from the Creditcard.com site. The computer worm “ILOVEYOU” spread through the internet worldwide in 2000. The worm virus later spread worldwide under the pseudonym of love letters. That same year, Microsoft reported that some hackers had entered their network and stolen source code for some upcoming Windows versions.
- The “Anna Kournikova” virus, named after the then popular tennis star “Anna Kournikova”, came out in 2001.
- In 2007, a Turkish hacker named “İskorpitx” hacked 21,549 websites.
- In 2006, the UN website was hacked by a Turkish hacker whose code name was “kerem125“.
- In 2009, the popular anti-virus Kaspersky Network was hacked by hackers. The hack is Google’s China network, the effects of which spread to all of Google’s networks. This attack is known as Operation Aurora. The attack targeted Adobe Systems, Juniper Networks and Rackspace, in addition to Google. The attack was carried out from China, which resulted in the closure of Google services in China (http://www.google.cn/ still closed). However, Google has opened a new website for Hong Kong: www.google.com.hk. This year, a virus called “Conficker” has spread around the world and millions of computers have been affected by the virus, including some high-security government computers.
- In 2010, another virus called “Stuxnet” spread through Windows computers and an Indian hacker named “A0drul3z” spread a very powerful malware for Symbian OS.
- In 2011, a Turkey hacker hacked the Bank of America website with the code name “JeOPaRDY“. The FBI learned from him that he had stolen 85,000 credit card numbers, but bank officials said the website did not have credit card information. This year, PlayStation Network was hacked by hackers and 6 million account information was stolen, including credit card information.
- Bangladeshi hacker TiGER-M @ TE hacked 600,000 sites and set a world record and Indian hacker Prince Bhalani hacked 200 GB database of Swiss Bank.
- Earlier this year, Saudi hacker 0xOmar published 400,000 credit card information online and threatened to publish 1 million credit card information in Israel. As a result, an Israeli hacker published 200 credit card information online in Saudi Arabia.
- The hacker group The Hacker Encrypters found a SQLi exploit on Facebook and they published it on Paste bin.
- Turkey hacker F0RTYS3V3N hacked important Turkey websites and at the same time hacked Google, Yandex, Microsoft, Gmail, Msn, Hotmail, PayPal Turkish office websites.
- And one of them is “India vs Bangladesh Cyber War”. It hacked numerous government and private websites in Bangladesh and India. Which took Bangladesh far ahead in the cyber world.
If you look at the links below, you will understand what a terrible war was going on
In 2013, there was a lot of hacking, one of which was the Zero-day Java vulnerability attack with the help of Facebook network, Microsoft, Apple computers, malware was spread by some hackers, as a result of which they were able to access the information of those computers.
In February 2013, Twitter’s server was hacked and the passwords of 250,000 users’ accounts were hacked.
A hacker group of “Syrian loyalists” hacked the Twitter account of Associated Press, a news media company.
After the hack, they tweeted “Breaking: Two explosions in the White House and Barack Obama is injured.” The message immediately reached their 1.9 million followers. Also hacked was NASA’s sub-domain website larc.nasa.gov. Important Government Websites of Saudi Arabia, Philippines. The DDoS attack shut down the servers of major US banks. This year saw the highest number of DDoS attacks. I don’t know how much more hacking will happen in 2014.
If you are still interested today, I will try to post more about hacking later.
If you like it, share it and let others know and of course comment. This will encourage tech-Bengalis to post more information. Thanks, stay well!