33
/pt/
AIzaSyAYiBZKx7MnpbEhh9jyipgxe19OcubqV5w
August 1, 2025
Public Timelines
Menu
Public Timelines
FAQ
Public Timelines
FAQ
For education
For educational institutions
For teachers
For students
Cabinet
For educational institutions
For teachers
For students
Open cabinet
Criar
Close
Create a timeline
Public timelines
Library
FAQ
Editar
Baixar
Export
Criar uma cópia
Premium
Incorporar ao site
Share
Hacking Incidents
Category:
História
Atualizado:
7 meses atrás
0
0
84
Autores
Created by
JJ LeBlanc
Attachments
Comments
Eventos
Nevil Maskelyne is widely considered to do the first form of digital hacking. Sending insulting Morse Code to a man named Guglielmo Marconi's auditoriam projector
The Enigma machine code is broken by polish cryptologists Marian Rejewski, Jerzy Różycki and Henryk Zygalski. It takes them only 10 weeks to finish.
French General René Carmille hacks the Nazi used punch card system in order to disrupt their efforts to locate Jewish people during WW2. This is one of the earliest known examples of "ethical hacking"
Joe Engressia, a blind seven-year-old boy with perfect pitch, discovered that whistling the fourth E above middle C (a frequency of 2600 Hz) would interfere with AT&T's automated telephone systems, thereby inadvertently opening the door for phreaking. Which is a form of hacking telecommunication systems. Engressia went on to become a pioneer "Phone Phreak" becoming known as "Joybubbles"
The first ever reference to malicious hacking is 'telephone hackers' in MIT's student newspaper, The Tech of hackers tying up the lines with Harvard, configuring the PDP-1 to make free calls, accumulating large phone bills. The use of the phrase 'hacking' had officially become a mainstream phrase.
The first known incidence of network penetration hacking took place when members of a computer club at a suburban Chicago area high school were provided access to IBM's APL network.
Esquire magazine does a story on "Phreaking" using subjects such as "Joybubbles" and John Draper
Kevin Mitnick breaks into his first major computer system called "The Ark," Mitnick is a very revered hacker and we will come back to him later in the timeline.
The FBI investigates a breach of security which ended up being hackers, describing them in quote as "technical experts, skilled, often young, computer programmers who almost whimsically probe the defenses of a computer system, searching out the limits and the possibilities of the machine." Bringing more attention to the evolution of hacking
The Chaos Computer Club is founded on September 12th 1981. It has since become Europe's largest association of hackers. They currently have over 7700 members.
Ian Murphy becomes the first cracker to be convicted as a felon. A cracker is someone who hacks purley for malicious intent. Murphy broke into AT&T's computers in 1981 and changed the internal clocks that metered billing rates.
A hacking group that goes by "The 414s" break into 60 computer systems at institutions including cancer centers and laboratorys.
KILOBAUD is founded
Wargames is released, a movie based entirley on hacking.
The U.S. House of Representatives begins hearings on computer security hacking for issues such as the hackings the 414's did.
Ken Thompson explains his idea of a security breach called "The Trojan Horse" which has become very popular today. It is essentially the "Hot singles in your area" clickbait that if clicked will completely destroy your computer with viruses.
The Legion of Doom is founded in early 1984, and would go on the become one of the most influential hacking groups ever.
The Comprehensive Crime Control Act gives the Secret Service jurisdiction over computer fraud.
William Gibson releases 'Neruomancer' which is well known as the first novel to introduce themes relating to 'cyberpunk' and about a hacker. The book would introduce iconic phrases for hackers such as 'the matrix' and 'cyberspace'
KILOBAUD renames itself to P.H.I.R.M.
'Phrack' is founded, the first ever e-magazine for hackers
'The Hackers Hanbook' is released by Peter Sommer under the name Hugo Cornwall and production would run until 1990. The book is now highly sought after.
Congress passes the Computer Fraud and Abuse Act, which makes it a crime to break into computer systems. However the law does not apply to juvinlies which leads to many problems later.
The first conviction for unauthorized computer system access occurs when Robert Schifreen and Stephen Gold are found guilty of using the Forgery and Counterfeiting Act 1981 in the United Kingdom to get access to the Duke of Edinburgh's Telecom Gold account. Since hacking does not fall under the legal definition of forgery, the conviction is reversed upon appeal.
A hacker who calls himself 'The Mentor', was arrested. Shortly after his arrest, he wrote a now-famous essay that became known as the Hacker Manifesto and was published in the e-zine Phrack. This is still the most well-known work of hacker literature and is widely used to show "how hackers think."
Astronomer Clifford Stoll plays a pivotal role in tracking down hacker Markus Hess, events later covered in Stoll's 1990 book The Cuckoo's Egg.
The VNET, BITNET, and EARN networks are severely disrupted by the Christmas Tree EXEC "worm". A worm is a type of malicious software, to spread across a network and cause harm.
The Morris Worm. Cornell University graduate student Robert T. Morris, Jr. introduces a worm onto the government's ARPAnet. The worm clogs university and government systems after infecting 6,000 networked PCs. Robert Morris receives a $10,000 fine, three years of probation, and dismissal from Cornell. The FBI has since called in the "first major attack on the internet"
First National Bank of Chicago is the victim of $70 million computer theft.
The Father Christmas (computer worm) spreads over DECnet networks.
Dutch magazine Hack-Tic is published and runs until 1994
The Cuckoo's Egg by Clifford Stoll is published. The book that details the events from back in 1986.
The detection of AIDS (Trojan horse) is the first instance of a ransomware detection. Ransomware is a type of software that keeps the software held from the creator until they pay to get it back.
The launch of Operation Sundevil. Following a protracted undercover investigation, Secret Service officers launch early-morning raids and make arrests against BBS leaders and notable members in 14 American cities, including the Legion of Doom. The arrests are part of an effort to combat wire and phone fraud as well as credit card theft. As a result, the hacker community breaks down, with individuals exchanging information for immunity.
The Computer Misuse Act 1990 is passed in the United Kingdom, criminalising any unauthorised access to computer systems.
One of the first ISPs, MindVox, opens to the public.
The first documented application of polymorphic code, 1260, was created by Bulgarian virus writer Dark Avenger. It was intended to get beyond the kind of pattern recognition that antivirus software and, more recently, intrusion detection systems utilize.
AOL gives its users access to Usenet, precipitating Eternal September. Which is when people felt "too many" people were on the internet due to AOL and that it would create a lot of issues for chronic internet users before the boom.
$10 million is stolen from Citibank by Russian crackers, who then move the funds to bank accounts all across the world. The 30-year-old ringleader, Vladimir Levin, transferred the money to accounts in Finland and Israel after work using his work laptop. Levin faces trial in the US and receives a three-year prison term. All but $400,000 of the stolen funds are recovered by the authorities.
The freeware program AOHell is made available, enabling a growing number of inexperienced script kiddies to cause havoc on America Online. For days, hundreds of thousands of AOL users experience spam messages disrupting their chat rooms and multi-megabyte email bombs flooding their mailboxes.
The phrase "My kung fu is stronger than yours" became popularized after computer security expert Tsutomu Shimomura began receiving prank calls following an IP spoofing assault by Kevin Mitnick.
The Canadian ISP dlcwest.com is hacked and website replaced with a graphic and the caption "You've been hacked MOFO"
The FBI raids the "Phone Masters" and arrests 6 of the members. They were a cybercrime group whose main point of attack was against telecommunication companies.
Canadian hacker group, Brotherhood, breaks into the Canadian Broadcasting Corporation.
John Sabo A.K.A. FizzleB/Peanut, a hacker from Arizona, was arrested for breaking into the Canadian ISP dlcwest.com and alleging that the company was overcharging consumers.
The US general accounting office reports that hackers attempted to break into Defense Department computer files over 250,000 times in 1995 alone with a success rate of about 65% and doubling annually.
Lucifer-X, widley known as the best AOL hacking program ever, is made available.
Yahoo! notifies Internet users that anyone visiting its site in the past month might have downloaded a logic bomb and worm planted by hackers claiming a "logic bomb" will go off if computer hacker Kevin Mitnick is not released from prison.
A sixteen-year-old Croatian boy breaks into computers at a Guam U.S. Air Force installation.
To secure DNS servers, the Internet Software Consortium suggests using DNSSEC (Domain Name System Security Extensions).
U.S. President Bill Clinton announces a $1.46 billion initiative to improve government computer security.
Kevin Mitnick, is sentenced to 5 years, of which over 4 years had already been spent pre-trial including 8 months' solitary confinement.
The United States Department of Justice sentences the "Phone Masters".
The ILOVEYOU worm is released. It is a VBScript computer worm that is also referred to as the VBS/Loveletter and Love Bug worm. Within a few hours of its distribution, it infected millions of computers across the globe. It is regarded as one of the most harmful worms ever discovered.
Jonathan James, a computer hacker, is the first minor to be imprisoned for hacking.
A Dutch hacker releases the Anna Kournikova virus, a viruse madse to tempts users to open the infected attachment by promising a "sexy picture" of the Russian tennis star.
The National Cyber Security Alliance (NCSA) is established in response to the September 11 attacks on the World Trade Center.
Bill Gates launches a large internal training and quality control program and orders Microsoft to secure its goods and services.
Gary McKinnon, known famously under the alias "Solo" is arrested following unauthorized access to US military and NASA computers.
A bill to establish the Department of Homeland Security, which will be in charge of safeguarding the country's vital IT infrastructure, is filed by the Bush administration.
The hacktivist group Anonymous was formed.
New Zealand's Government official website defaced by hacktivist group BlackMask
North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems.
The U.S. Department of Homeland Security and the National Cyber Security Alliance established National Cyber Security Awareness Month.
After arriving at Miami International Airport, Rafael Núñez, a well-known hacker from the World of Hell organization, is arrested for breaching the Defense Information Systems Agency computer system in June 2001.
For breaking into T-Mobile's network and hacking Paris Hilton's' phone, hacker Cameron Lacroix is given an 11-month sentence.
The largest defacement in Web History as of that time is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot.
Robert Moore and Edwin Pena were the first people to be charged by U.S. authorities for VoIP hacking. Which is essentially turning someones phone into your own. Meaning that you steal their number and they get your phone bills
FBI Operation Bot Roast finds over 1 million botnet victims
United Nations official website hacked by Indian Hacker Pankaj Kumar Singh.
Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, including the Pentagon. They operated from an apartment on a Chinese Island
MALCON, the first Malware Conference, was held in India. Established by Rajshekhar Murthy, this yearly event, sponsored by the Indian government, invites malware coders to demonstrate their abilities.
The hacker group Lulz Security is formed. A cyber group known for mixing memes and cyberhacking while putting a humerous spin on it.
A Turkish hacker by the name of "JeOPaRDY" gained access to the Bank of America website. It was estimated that the attack resulted in the theft of 85,000 credit card data and accounts.
By hacking 700,000 websites in one go, Bangladeshi hacker TiGER-M@TE set a new record for defacement.
After being hacked, the Sesame Street YouTube channel streamed porn for almost twenty-two minutes.
A hacker promised to reveal one million credit cards in the future after releasing over 400,000 credit cards online. Following that event, more than 200 Albanian credit cards were made public online by an Israeli hacker.
A group of Norwegian hackers known as "Team Appunity" were taken into custody after breaching the country's biggest prostitution website and making the user database public.
A hacker collective known as "Swagg Security" breaches Foxconn, exposing a large amount of information, including server and email login passwords and—even more concerning—bank account information belonging to major corporations like Apple and Microsoft. A Foxconn demonstration about the appalling working conditions in southern China sparks the attack, which is staged by Swagg Security.
A recently formed hacking group called UGNazi hacked MyBB, defacing the website for around a day. They say they did this because they were angry that the topic board Hackforums.net was using their software.
Nearly 6.5 million user accounts on LinkedIn had their passwords stolen by hackers.
Computer hacker sl1nk declared that he has compromised the SCADA systems of nine different nations. The United States, France, Norway, Russia, Spain, and Sweden.
Hackers target the social networking site Tumblr. As a result, Tumblr exposed 65,469,298 distinct emails and passwords.
Yahoo! data breaches occurred. More than 3 billion users data are being leaked.
There was a hack into the White House computer system. The strikes were described as "among the most sophisticated attacks ever launched against U.S. government systems" by the FBI, the Secret Service, and other U.S. intelligence organizations.
A hacking collective identifying itself as "Guardian of Peace" breaches Sony Pictures' servers in reaction to the release of the movie The Interview.
21.5 million people's records, including fingerprints, dates of birth, residences, social security numbers, and details pertaining to security clearances, are stolen from the US Office of Personnel Management.
The servers of extramarital affairs website Ashley Madison were breached. Leaking out most of the names to the public in an attempt to "rid the world of cheaters"
Documents from the 2016 Democratic National Committee email dump were made public by WikiLeaks.
After being apprehended for breaching U.S. servers and transferring the compromised data to ISIL terrorists in 2015, hacker Ardit Ferizi was given a 20-year prison sentence.
Hackers take 600,000 driver's license numbers of Uber drivers and 57 million people's identities, phone numbers, and email information from the company's international customer base. Uber used Amazon's cloud-based technology to access its GitHub account. Uber gave the hackers $100,000 in exchange for guarantees that the data would be deleted.
After trying to extort the online entertainment corporation Netflix, a hacker collective identifying itself as "The Dark Overlord" uploaded unreleased episodes of the Orange Is the New Black TV series to the internet.
An unidentified organization demanding ransoms obtained and publicized 25,000 digital photographs and ID scans of patients from the Grozio Chirurgija cosmetic surgery facility in Lithuania without their consent. It impacted thousands of customers in over 60 countries. Information security flaws in Lithuania were highlighted by the hack.
Hackers using ransomware take control of computer systems in the Georgian city of Atlanta. They refused to pay the ransom [119], and the FBI charged two Iranians with cybercrime in connection with the hack.
Hackers using ransomware took control of computer systems in West Haven, Connecticut, and demanded a $2,000 payment.
Hackers in the U.S. state of Georgia used ransomware to take control of Jackson County computer systems, and they were forced to pay a ransom of $400,000. A ransomware cyberattack occurs in the U.S. state of New York, specifically in the city of Albany.
Hackers use the "RobbinHood" ransomware, which encrypts files using a "file-locking" virus, and the EternalBlue program to take over computer systems owned by the City of Baltimore.
The city of Riviera Beach, Florida, paid hackers who used ransomware to take over their computers almost $600,000 in Bitcoin. Hackers demanded a ransom of $150,000 after stealing 18 hours of unreleased music from Radiohead. In any case, Radiohead released the music soon after, which angered the city of Riviera Beach. The music was unheard sessions from the album 'OK Computer'
On May 28, three days after George Floyd was murdered, Anonymous announced a significant hack. "We are Legion," said someone purporting to speak for Anonymous. We're not forgiving. We don't forget. In a since-deleted video, "Expect us."
The 2020 Twitter bitcoin scam occurred. Where multiple celebrities twitters read "please send bitcoin and we will double it" with a link. They were obviously hacked and many people lost money due to the scam.
About & Feedback
Acordo
Privacidade
Biblioteca
FAQ
Support 24/7
Cabinet
Get premium
Donate
The service accepts bank transfer (ACH, Wire) or cards (Visa, MasterCard, etc). Processed by Stripe.
Secured with SSL
Comments