Recent in Technology

Hacking Cases Before 2017

 




Hacking Cases Before 2017

In the last article, the history of the earliest use of the word Hacking in the field of technology was told as far as I can remember.

👉👉👉👉👉 If you want to read, click here to read 👈👈👈👈👈👈


As far as I know, since 2015, more and more people are interested in hacking in Myanmar.


So, this time, we will describe some hacking events from 2017 to the previous years that are still little known


1878

Early telephone calls

Back in the day, making telephone calls wasn't as easy as it is now. Those who are familiar with the communication system known as Auto exchange, which was found in Burma until 2010-11, can communicate with rural areas. It is a system where employees use switchboards to connect communication between customers.


(You can see it in the picture below.)




The earliest incident started with a company called the Bell, which employed teenage employees. After the group of teenage boys learned how these systems worked, they began to block the phones and make them reach others without reaching the person they wanted to call. Because of this incident, all the teenage boys were fired. Because they've done it over and over again. That was in 1878, two years after Alexander Graham Bell received the first US patent for the telephone.


It is an event that has been included in hacking history because it is consistent with the nature of hacking.


1903    

Wireless telegraphy

In the late 19th century, electromagnetic waves were discovered. That is what led to the first incident of actual hacking. This is how it happened. It was hacked in 1903 by Nevil Maskelyne, a wireless enthusiast. The discovery of electromagnetic waves led to wireless telegraphy. An Italian scientist named Guglielmo Marconi invented wireless telegraphy in 1895. There is someone who worked for Marconi. John Ambrose Fleming was an English electrical engineer and physicist. In 1903, John Ambrose Fleming performed the first public demonstration of Marconi's "safe wireless telegraphy". That's when Nevil Maskelyne interrupted John Ambrose Fleming by sending Morse code messages.


Shortly after the affair, Fleming himself asked the readers of the Times to cover up the troublemaker (as he used the term 'scientific vandal') responsible for the incident. Interesting and respectable. What is more interesting is that Nevil Maskelyne himself made a reply and came back saying that the evidence was only to point out the Vulnerability (weakness) of the wireless telegraphy system. Since they are respectable people, I have attached their WiKi link below. Those who want to read about them can click on the link. Let's move on to the next event.

Guglielmo Marconi  https://en.wikipedia.org/wiki/Guglielmo_Marconi 

Ambrose Fleming  https://en.wikipedia.org/wiki/John_Ambrose_Fleming 

Nevil Maskelyne  

https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)



1939-1945

Military Codebreaking     


Fig: Colossus machine 

In the past, there were many methods of sending information, and when these methods were not safe, encryption systems called ciphers developed to prevent interception and readability. During World War II, special operations were conducted to uncover the encryption systems used by the Axis Powers. They did the most at Bletchley Park in the UK. Most famously, in 1939, the Bombe, an electronic device that could decipher the German Enigma-machine-encrypt code, was invented. In addition, they were able to identify the Lorenz Cypher system used by German high-level military intelligence. And they were able to develop the world's first programmable electronic computer (named Colossus) that used thermionic vulves to perform boolean and counting operations.


Wiki link about Colossus ==>  https://en.wikipedia.org/wiki/Colossus_computer 

About secret messages during World War II -- Wiki Link ==>

https://en.wikipedia.org/wiki/World_War_II_cryptography 


1957-1980

Phone Phreaking     



In the late 1950s, people called Phone Hacker (Phone Phreakers) became fashionable in America. They listened to the tones emitted by the phones in order to identify the routes of the calls. What was different was a blind boy named Joe Engressia who was only 7 years old. He heard a high-pitched tone from a telephone line in 1957. And it made a whistling sound with a frequency of exactly 2600Hz. That was the exact frequency needed to communicate with the phone lines. Phreakers, including John Draper, known as Captain Crunch (due to the use of crackers in Cap'n Crunch food cans); Apple founders Steve Wonzniak and Steve Jobs began building blue boxes in 1975, electronic devices that communicate with phone lines. They are Phreakers too.

Wiki Link ==> https://en.wikipedia.org/wiki/Phreaking 


1970-1995

Kevin Mitnick


In the late 1950s, people called Phone Hacker (Phone Phreakers) became fashionable in America. They listened to the tones emitted by the phones in order to identify the routes of the calls. What was different was a blind boy named Joe Engressia who was only 7 years old. He heard a high-pitched tone from a telephone line in 1957. And it made a whistling sound with a frequency of exactly 2600Hz. That was the exact frequency needed to communicate with the phone lines. Phreakers, including John Draper, known as Captain Crunch (due to the use of crackers in Cap'n Crunch food cans); Apple founders Steve Wonzniak and Steve Jobs began building blue boxes in 1975, electronic devices that communicate with phone lines. They are Phreakers too.

Wiki Link ==>  https://en.wikipedia.org/wiki/Kevin_Mitnick 


1988

The Morris Worm


In 1988, Robert Morris, a graduate student at Cornell University, created what became known as the first worm on the Internet. I just wanted to know that the creator is still a student at MIT, so I launched it from a computer at MIT. When he first posted it, he posted it as a harmless bug. However, there was a bug in the spreading method of the worm, and it caused unexpected DoS attacks. The spread of the infection was much faster than expected, so it became very contagious and very bad. Since he already understood the issue, he tried to fix it by telling the developers how to kill it, but it was too late, so he found out who created it. Thus, Morris is listed as the first person to be sentenced under the Computer Fraud and Abuse Act.

Wiki link ==> https://en.wikipedia.org/wiki/Morris_worm 


1988-1991

Kevin Poulsen


Dark Dante (attacker name) Kevin Poulsen is a really talented and versatile teenager. He has also been in prison since he was a teenager. Later, he was recruited and trained by the Research Institute SRI International, but he did not become a good person and continued to operate underground. After breaking into a telephone company and finding an unpaid bill in a storage locker, he was tracked down. Through that, 1 blank birth certificate, Along with the fake IDs, photos of Poulsen were discovered and his actions and exploits began to leak.


That was in 1988. He managed to escape and was recaptured around April 1991. Among his attacks, the most famous was the hijacking of the phone lines of a Los Angeles radio station. The phone lines went down so badly that it was even featured on NBC's Unsolved Mysteries.

Wiki link ==> https://en.wikipedia.org/wiki/Kevin_Poulsen 



1994

Datastream Cowboy and Kuji

     Kuji

 Datastream Cowboy


Two young hackers also created issues that will go down in history. On March 28, 1994, administrators at the Rome Air Development Center, a research facility of the US Air Force, discovered that a password sniffer had been installed on their networks. From that, about 100 account passwords were leaked, and they were able to log in using the damn acc. Later, the investigation revealed that there were 2 of them behind the matter. Further investigation revealed that the two had carried out around 150 other attacks, and Scotland Yard detectives were able to arrest the Datastream Cowboy at his home. His real name is Richard Pryce. Kuji was arrested two years later, and his real name was Matthew Bevan.

Kuji (Wiki link) ==> https://en.wikipedia.org/wiki/Mathew_Bevan 

Datastream Cowboy (no Wiki Link) 

https://www.soldierx.com/hdb/Datastream-Cowboy 



2001-2002

Gary McKinnon


He is the one who can easily find Burmese texts and pictures with Burmese background sound and videos on Facebook. Between February 2001 and February 2002, he hacked 97 computers belonging to the US military and NASA. In addition, the US military's military district network in Washington shut down about 2,000 computers for 24 hours and deleted some important files. He hacked the US military's website and even posted a warning saying "Your security is crap". He did these under the pseudonym solo and from his girlfriend's aunt's house. The United States spent about $700,000 to find out what he had done and to fix it. His full story can be found on Wiki.

Wiki link ==> https://en.wikipedia.org/wiki/Gary_McKinnon 



2010

The Stuxnet worm


The Stuxnet Worm, which was first discovered in 2010, is different from previous viruses and is very serious. The Stuxnet worm is even called the world's first digital weapon. Because it is designed to cause physical damage to equipment controlled by computers. This is the first case where hackers physically damage equipment in the real world, and it's more complicated and more terrifying. This was noticed after the unexpected breakdown of several uranium sensors at nuclear power plants in Iran. The Stuxnet Worm infected at least 200,000 computers and damaged about 1,000. You can read the details on Wikipedia.

 https://en.wikipedia.org/wiki/Stuxnet 


2011-2012

LulzSec

ထိုစဥ်က Twitter Screenshot တစ်ခု

Since the era of social media has improved, hacking related things are seen on social media, and hackers also show the things they have hacked on social media platforms in order to get people's attention. Including LulzSec. They hack websites and post on Twitter to embarrass website owners. More than 250 public and private organizations have been targeted, including the 2011 fox.com attack. Including the attack on Sony's PlayStation network. In the Sony attack, the information of 24.6 million customers was stolen. It was so bad that Sony had to shut down its network for 23 days. The FBI later tracked down LulzSec co-founder Hector Xavier Monsegur in 2012 and obtained the personal information of other members from him. As a result, 5 members were arrested in the UK and Ireland.

Wiki link ==> https://en.wikipedia.org/wiki/LulzSec 



2016

DNC email leak


Hack & leak တွေသည် လူထုရဲ့ ထင်မြင်ယူဆချက်တွေကိုပါ သက်ရောက်မှုရှိကြောင်း ၂၀၁၆ အမေရိကန်သမ္မတရွေးကောက်ပွဲက သက်သေပြခဲ့သလို ရှိပါတယ်။ ၂၀၁၆ ဇူလိုင်လမှာ ဒီမိုကရက်တစ်အမျိုးသားလွှတ်တော်ကော်မတီတွေရဲ့ email တွေ အများကြီး ပေါက်ကြားခဲ့ပြီး WikiLeaks ကလည်း ဖော်ထုတ်ဖောက်ချခဲ့ပါတယ်။ ၁၉၂၅၂ စောင်သော email တွေနဲ့ 8034 attachment တွေစသည်ဖြင့် ပေါက်ကြားခဲ့ပြီး ပါတီအကြီးတန်းအရာရှိတွေက သူတို့ဘက်က သမ္မတလောင်းကို Barnie Sanders ထက် Hillary Clinton ကို မျက်နှာသာပေးဖွယ်ရှိတဲ့လို့ ပေါက်ကြားခဲ့ပါတယ်။ တကယ်လည်း ဖြစ်လာခဲ့ပါတယ်။ ဒါတွေကလည်း ပြိုင်ဘက် Donal Trump ကို အနည်းငယ် ပိုပြီးအသာရစေခဲ့တယ်လို့ ဆိုနိုင်ပါတယ်။ 

email leak အကြောင်း Wiki link

==> https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak 


WikiLeaks အကြောင်း Wiki Link (မြန်မာလို Wiki link ဖြစ်လို့ ဒီ post ထဲမှာ သီးသန့် ထည့်မရေးတော့ပါဘူးဗျ) သွားဖတ်ကြည့်ကြပါ။ 

==> https://my.wikipedia.org/wiki/WikiLeaks 



References:

https://wikipedia.org/ 

https://www.khitminnyo.com/ 

https://eandt.theiet.org/ 



Special thanks to all those who read and encourage.

Thank you even more to those who read without using ad block.


Another upcoming topic will be a compilation of cases where millions of user accounts were hacked at the same time, including Yahoo, so I invite you to come and visit the blog.


Post a Comment

0 Comments

People