Top Five Greatest Hacks In History

Marian Rejewski, a Polish mathematician and cryptologist, reconstructed the Nazi German military Enigma cipher machine sight-unseen in 1932 and may have won the war for the Allies. (Uncredited photo/Wikipedia)
  1. Original reference implementation of a distributed blockchain database coupled with its first killer app: Bitcoin
    (Version 0.1 released anonymously by “Satoshi Nakamoto” in 2009)
    Barring any technical walls that cannot be scaled (a sucker’s bet in 2017) this single open source project elegantly wraps a distributed database with a protocol for the exchange of scarcity in a digital world, and could be the end of capitalism.
  2. The Onion Routing project
    (Tor alpha launched by Syverson, Dingledine and Mathewson, DARPA, 2002)
    In the mid-1990s the US Naval Research Lab developed the core principal of onion routing which combines asymmetric key cryptography with a data structure wrapped in successive layers of encryption. The Tor project was unleashed on the public in 2002 by DARPA math and computer science geeks who were able to implement a cipher wrapped in an enigma, smothered in secret sauce. This clever hack of network protocols enables drug dealers on the darknet, Syrian rebels and anonymous leaks of proprietary and classified information.
  3. Stuxnet
    (“The Equation Group” & U.S./Israeli intelligence services, 2005–2010)
    Stuxnet, a malicious self-propagating computer program known as a “worm”, reportedly ruined almost one fifth of Iran’s nuclear centrifuges. Stuxnet is important for being the first known cyber weapon deployed by a nation state and specifically targeted programmable logic controllers (PLCs) used to control machinery on factory assembly lines. Stuxnet reportedly compromised Iranian PLCs causing the fast-spinning centrifuges to tear themselves apart. Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern supervisory control and data acquisition (SCADA) and PLC systems in factory assembly lines or power plants across the U.S., Europe and Japan.
  4. The Morris Internet Worm
    (Robert Morris, November 1988)
    The first internet worm was created not to destroy, but to measure the size of a new but rapidly growing network of computers. Robert Morris created the software to exploit bugs in sendmail and fingerd services while a graduate student at Cornell, but released it on MIT’s network to muddy his trail. Morris went on to receive tenure from MIT in 2006 but only after earning the first felony conviction in the US under the Computer Fraud and Abuse Act. As a result of the Morris Worm the internet was partitioned for days as regional networks disconnected from the backbone to prevent recontamination and the incident prompted DARPA to create the CERT Coordination Center for coordinating responses to network emergencies.

Honorable Mentions

Operation Aurora & Shady RAT Advanced Persistent Threats (APTs)
(PLA Unit 61398 et al., People’s Republic of China, ~2011 to present)
For nearly a decade a shifting collective of government sponsored hackers in China has been stealing trade secrets and other confidential information from shipping, aeronautics, arms, energy, manufacturing, engineering, electronics, financial, and software sectors. The “Shady RAT” operation alone targeted United Nations, government agencies in the United States, Canada, South Korea, Taiwan and Vietnam. Operations are ongoing and recently included data breaches in U.S. veterans and federal employee registries.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store