When we think of hackers, we often picture hoodie-clad tech wizards typing furiously in dark rooms, bypassing firewalls in seconds. But the reality is often far more mundane—and more human. Some of history’s most famous hackers weren’t out for money or power. Many just wanted to see if they could do it.  

Before we get into the list, it’s helpful to understand that not all hackers operate with the same intentions—or methods. Some hack for profit or chaos; others for curiosity or justice. 

Let’s take a quick look at the types of hackers you’ll see on this list. 

Types of Hackers: Black Hat, White Hat, and Grey Hat 

When you think of a hacker, you’re probably imagining a black-hat hacker: the kind who exploits system weaknesses for personal gain or to cause harm. But not all hackers are bad.  

Here’s a quick breakdown of the three main types: 

  • Black-hat hackers: Criminal hackers who break into systems to steal data, cause disruption, or profit illegally. 
  • White-hat hackers: Ethical hackers who are hired by companies to find and fix vulnerabilities before criminals can exploit them. 
  • Grey-hat hackers: Hackers who find and expose flaws without permission, sometimes even sending the company a “bill” for their help. They don’t have malicious intent, but their methods are still legally questionable. 

7 Famous Hackers Who Made History 

From government network infiltrations to cyber activism, these hackers made headlines and history. Some worked alone, others in collectives. Some sought justice; others sought thrills or financial gain. 

Here are seven of the most famous hackers of all time and the stories behind their cyber escapades. 

1. Kevin Mitnick 

Kevin Mitnick became “the world’s most famous hacker” after stealing computer code from tech companies like Nokia and Motorola. However, his crowning achievement came in 1982 when he hacked into the North American Aerospace Defense Command (NORAD), a stunt that got him on the FBI’s most wanted list and inspired the movie “War Games.” Mitnick was only in it for cheap thrills. Still, that didn’t stop authorities from sentencing him to five years in prison.  

Mitnick employed social engineering, a concept he helped popularize that involves deceiving a user into providing secure information. In the case of Motorola, Mitnick simply called and asked for the security manager’s username and password, and he got it! Today, Mitnick is a renowned white-hat hacker, offering his unique set of skills to companies at risk of cyberattack.   

2. Anonymous 

Anonymous is a collective of online “hacktivists” whose origins can be traced to the early days of 4chan, an anonymous imageboard (hence the name). Members would organize raids of online chatrooms to troll users, but with time, their antics became socially and politically motivated.

Recently, the group declared a cyber war against Russia for its invasion of Ukraine. Dozens of hackers with alleged ties to Anonymous have been arrested, but with no real leadership or structure, the group continues to launch cyberattacks on world governments and million-dollar corporations in the name of social justice.  

3. Astra 

Little is known of the hacker who went by the name Astra. In 2002, Astra infiltrated the Dassault Group, a French company with civil and military aviation subsidies, and stole and subsequently sold corporate secrets, including information on weapons systems. Dassault reported damages in excess of $361 million.

Astra was arrested in Athens, Greece, in 2008. Greek authorities have yet to release his name to the public but describe him as “a 58-year-old mathematician.” 

4. Gary McKinnon 

Gary McKinnon committed “the biggest military computer hack of all time” when, between February 2001 and March 2002, he accessed NASA and other defense websites, disrupting supply lines, causing $700,000 in damage, and leaving notes like “Your security is crap.”

His reason?

Aliens.

McKinnon claims he was searching for evidence of UFOs. McKinnon, a London resident, was to be extradited from the U.K. to the U.S., but then-Home-Secretary Theresa May blocked the extradition, declaring that it would infringe upon his human rights. 

5. Steve Wozniak 

Steve Wozniak, “the Woz,” is known for cofounding Apple, but his first foray into business involved an illegal phone-hacking circuit board. In the fall of 1971, Wozniak happened upon Ron Rosenbaum’s “Secrets of the Little Blue Box,” an article about devices that generate the tones needed to trick telephone networks into making long-distance calls for free.  

Wozniak and then-high-school-senior Steve Jobs got to work building a blue box of their own. After making a working model, they went dorm to dorm selling copies to fellow students at Berkeley. (Wozniak was expelled from the University of Colorado Boulder for hacking into the school’s network.) Creating a blue box gave the two Steves enough confidence to build something a little more ambitious. “If we wouldn’t have made blue boxes, there would have been no Apple,” said Jobs

6. Gummo 

Gummo’s story went viral after he sat down for an interview on the YouTube channel Soft White Underbelly. He shared how computers helped him cope with a troubled childhood, including the loss of his mother, and how hacking offered the means to survive.

After creating and selling software that hacked DirecTV, Gummo was arrested and offered a choice: go to prison or lend his expertise as a consultant. He chose the latter. After paying off his debt to society, Gummo did consulting work that led to him setting up networks used by the Chicago Mercantile Exchange (CME) and the New York Stock Exchange (NYSE).  

Despite claiming to have over $7 billion in Bitcoin stashed away, Gummo works 9 to 5 protecting organizations and individuals as a white-hat hacker. “Knowing that I’m preventing someone’s grandmother from being a victim of some sort of cyber extortion scheme,” he said, “that’s the thing I get up for each day.” 

7. Adrian Lamo 

Adrian Lamo is a grey-hat hacker through and through. Known as the “Homeless Hacker,” Lamo would travel around the country by Greyhound bus, hacking into corporations like AOL, Yahoo, and The New York Times and offering to fix their security vulnerabilities for free before notifying the media of his escapades. He did this not to cause harm but to prove how dangerous the internet could be for anyone who left themselves vulnerable.  

In the case of the Times, Lamo accessed their internal server in 2002 and added himself to their list of op-ed contributors. He was later caught and sentenced to six months of house arrest. Hacking one of the nation’s largest newspapers has its consequences, but in Lamo’s defense, he was only able to gain access because some Times employees were using their Social Security numbers as passwords.  

Ready to Level Up in Your Current Field? 

Curious about a career in tech? Or maybe you’re thinking about leveling up in your current field. Whatever the case may be, at The University of Texas Permian Basin, we offer 100% online bachelor’s and master’s degree programs designed for business professionals like you. 

Whether you’re considering a new path or building on your current one, our flexible, affordable programs can help you take the next step toward your goals. 

Explore our online degree programs and find the right fit for your future. 

Sources: 
https://www.mitnicksecurity.com/about-kevin-mitnick-mitnick-security
https://us.norton.com/blog/emerging-threats/black-white-and-gray-hat-hackers
https://www.cnbc.com/2022/03/25/what-is-anonymous-the-group-went-from-4chan-to-cyberattacks-on-russia.html
https://abcnews.go.com/International/story?id=1945581&page=1
https://www.theguardian.com/world/2012/oct/16/gary-mckinnon-hacker-sparked-storm
https://www.theatlantic.com/technology/archive/2013/02/the-definitive-story-of-steve-wozniak-steve-jobs-and-phone-phreaking/273331/
https://www.wired.com/2010/05/lamo/