IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

The 4 most notorious hackers

From Snowden to Mitnick, we trace the lives of those who hack

Edward Snowden picture

Unlike white hat or ethical hackers, who hack to help find flaws and vulnerabilities and fix them to protect organizations and governments, black hat hackers are in it for the money. Black hat hacking costs consumers and companies trillions of dollars every year. 

Whatever black hat hackers’ motivation is, they leave a trail of computational carnage and victims in their wake. Here, we investigate the world’s most notorious hackers, who they were, what they did, and what happened to them.

1. Kevin Mitnick

Possibly the most well-known hacker of all time is Kevin Mitnick. In fact, the Department of Justice called him the "most wanted computer criminal in US history." He was also one of the FBI’s Most Wanted after hacking into 40 major corporations. 

His high-profile 1995 arrest and five years in prison for various cyber crimes brought him into the mainstream just as the internet took off. 

In 1999, as part of a deal, he pled guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting communications.

Since then, he has become a highly sought-after security consultant to many large corporations, organizations, and governments worldwide. That means he now gets paid lots of money doing the kind of thing he went to prison for.

2. Edward Snowden

While he did not use hacking tools, Edward Snowden used social engineering techniques and lax security policies to rifle through the National Security Agency’s (NSA) servers and 20,000 documents without leaving a trace. 

Employed as a system administrator for the NSA, Snowden had access to top-secret documents, and no one was auditing systems for leaks. With the privileges of a system administrator, Snowden could look for any file he wanted, pop it onto a memory stick, and leave. 

He later flew to Hong Kong to meet Guardian journalist Glenn Greenwald and filmmaker Laura Poitras. Revelations about US security started appearing in the Guardian and Washington Post in the following weeks. 

Snowden fled to Russia and claimed political asylum. 

3. Graham Ivan Clark

This teen hacker orchestrated one of the summer 2020 Twitter hacks. He and two others used social engineering and other techniques to access the social media giant’s internal systems. They proceeded to use 130 celebrities’ accounts to make more than $100,000 in a cryptocurrency scam.

Among the celebrities whose accounts were taken over were President Joe Biden, former President Barack Obama, Elon Musk, Kanye West, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffet, Floyd Mayweather, Kim Kardashian, Apple, Uber, and other companies.

As part of a plea deal, Clark will spend three years in prison and be banned from using computers without permission and supervision from law enforcement.

4. Adrian Lamo

Also known as the “Homeless Hacker,” Lamo broke into the networks of The New York Times, Google, Yahoo!, and Microsoft before his 2003 arrest. He got his nickname because he hacked companies from coffee shops and libraries and lived in abandoned buildings or on friend’s couches. 

In 2004, Lamo pled guilty to one felony count of computer crimes against the Times, LexisNexis, and Microsoft. For that, he received six months’ detention and two years’ probation.

In 2010, Chelsea Manning, an army private then known as Bradley Manning, contacted Lamo via instant message. Manning told Lamo about the leak of a classified video of a helicopter attack in Baghdad that killed 12 people to Wikileaks. Lamo then reported the theft to the FBI. 

Lamo died in 2018 at 37 years old. According to the coroner's report, Lamo’s bloodstream contained a range of prescription drugs at the time of death. Lamo’s death was ruled an accident, according to an NPR report.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022