< PRIME NETWORK

HACKER HISTORY

A TIMELINE OF DIGITAL REBELLION

From phone phreaking to nation-state cyber weapons — six decades of hackers, outlaws, and the curious minds who shaped the digital world.

// 1960s
1963
MIT Hackers & Spacewar!
MIT students hack the PDP-1 minicomputer and create Spacewar!, widely considered the first interactive video game. The word "hacker" is born at MIT's Tech Model Railroad Club — meaning someone who creates elegant solutions.
CULTURE
1969
ARPANET Goes Live
The first message sent over ARPANET between UCLA and Stanford crashes after transmitting just two letters: "LO" (meant to be "LOGIN"). The internet is born with a bug.
CULTURE
// 1970s
1971
Captain Crunch & Phone Phreaking
John Draper discovers that a toy whistle from Cap'n Crunch cereal produces a perfect 2600Hz tone, granting free long-distance calls by exploiting AT&T's signaling system. Phone phreaking becomes a subculture.
HACK
1975
Homebrew Computer Club
The Homebrew Computer Club is founded in a Menlo Park garage. Steve Wozniak and Steve Jobs attend. Wozniak demos the Apple I prototype. The personal computer revolution ignites from a gathering of hobbyists and tinkerers.
CULTURE
1979
Kevin Mitnick's First Hack
16-year-old Kevin Mitnick socially engineers his way into Digital Equipment Corporation's network. He copies their software but doesn't sell it — he just wanted to see if he could. It won't be his last hack.
HACK
// 1980s
1981
Chaos Computer Club Founded
The Chaos Computer Club (CCC) is founded in Berlin, Germany. It becomes Europe's largest hacker association and a powerful voice for digital rights, transparency, and privacy. Still active today.
CULTURE
1982
The 414s Arrested
A group of teenage hackers from Milwaukee, known as "The 414s," break into 60 computer systems including Los Alamos National Laboratory and Sloan-Kettering Cancer Center. The FBI investigates teenagers for the first time.
LAW
1983
WarGames Changes Everything
The movie WarGames depicts a teenager nearly starting World War III by hacking into NORAD. It terrifies the public and Congress alike. President Reagan asks his Joint Chiefs: "Could something like this really happen?" They say yes. The Computer Fraud and Abuse Act follows.
CULTURE
1984
2600 Magazine & Cult of the Dead Cow
2600: The Hacker Quarterly begins publication, named after the 2600Hz phreaking frequency. The same year, Cult of the Dead Cow (cDc) is founded in a slaughterhouse in Lubbock, Texas. Hacker culture gets its literature.
CULTURE
1985
Phrack Magazine Issue #1
Phrack, the legendary underground e-zine, publishes its first issue. It becomes the definitive publication for hackers, phreakers, and the digitally curious. Distributed freely via BBS networks.
CULTURE
1986
The Hacker Manifesto
"The Mentor" (Loyd Blankenship) publishes "The Conscience of a Hacker" in Phrack after his arrest. "My crime is that of curiosity... I am a hacker, and this is my manifesto." It becomes the philosophical foundation of hacker culture.
CULTURE
1988
The Morris Worm
Robert Tappan Morris, a Cornell grad student, releases the first major internet worm. It crashes roughly 10% of the internet (about 6,000 machines). Morris claims it was an experiment gone wrong. He becomes the first person convicted under the Computer Fraud and Abuse Act.
MALWARE
1989
The Cuckoo's Egg
Cliff Stoll publishes "The Cuckoo's Egg," documenting how he tracked a 75-cent accounting discrepancy to a KGB-sponsored hacker named Markus Hess. It becomes the original cyber-espionage thriller — and it's all true.
CULTURE
// 1990s
1990
Operation Sundevil
The US Secret Service launches Operation Sundevil — coordinated raids across 14 cities targeting BBS operators and hackers. 42 computers and 23,000 floppy disks seized. The crackdown sends shockwaves through the hacker underground and leads to the founding of the EFF.
LAW
1993
DEF CON 1
Jeff Moss (Dark Tangent) organizes the first DEF CON in Las Vegas. It was supposed to be a one-time goodbye party for BBS culture. Instead, it becomes the world's largest and most infamous hacker convention, still running today.
CULTURE
1994
Mitnick on the Run
Kevin Mitnick goes on the run from the FBI after a federal warrant is issued. He becomes the most wanted computer criminal in America, hacking into dozens of networks while evading law enforcement for over two years.
HACK
1995
Mitnick Captured & DVD Jon
Kevin Mitnick is finally arrested with help from security researcher Tsutomu Shimomura. Meanwhile, 15-year-old Jon Lech Johansen ("DVD Jon") reverse-engineers CSS encryption on DVDs, sparking a landmark fight over digital rights and reverse engineering.
LAW
1996
The Crypto Wars
The US government classifies strong encryption as a munition, banning its export. Cypherpunks fight back. Phil Zimmermann's PGP is investigated as illegal arms dealing. People print encryption source code on t-shirts in protest.
CULTURE
1998
Back Orifice at DEF CON
Cult of the Dead Cow releases Back Orifice at DEF CON 6 — a remote administration tool (or trojan, depending on who you ask) for Windows. It exposes Microsoft's terrible security and becomes one of the most notorious hacking tools of the era.
HACK
1999
Napster Breaks Everything
Shawn Fanning launches Napster from his Northeastern dorm room. Peer-to-peer file sharing explodes. The music industry panics. 80 million users sign up. It permanently changes how the world thinks about digital distribution, ownership, and piracy.
CULTURE
// 2000s
2000
ILOVEYOU Worm
A love letter from the Philippines infects 45 million computers worldwide. The ILOVEYOU worm spreads via email with the subject "I Love You" and an attachment called LOVE-LETTER-FOR-YOU.txt.vbs. It causes an estimated $10 billion in damage.
MALWARE
2001
Code Red & Nimda
Code Red worm exploits a buffer overflow in Microsoft IIS, infecting 359,000 hosts in 14 hours. Weeks later, Nimda spreads via email, network shares, and web servers simultaneously. The internet learns that worms can be devastatingly fast.
MALWARE
2003
Anonymous Emerges
Anonymous coalesces from the chaos of 4chan's /b/ board. What starts as trolling and pranks evolves into a decentralized hacktivist collective. "We are Anonymous. We are Legion. We do not forgive. We do not forget."
CULTURE
2005
Albert Gonzalez & TJX Breach
Albert Gonzalez masterminds the theft of 170 million credit card numbers from TJX, Heartland Payment Systems, and others — the largest identity theft in American history at the time. He's eventually sentenced to 20 years.
HACK
2007
Estonia Cyber Attack
Estonia suffers the first-ever coordinated cyber attack against an entire nation. DDoS attacks cripple banks, media, and government websites for weeks. It's widely attributed to Russia, though never officially proven. NATO takes notice.
HACK
// 2010s
2010
Stuxnet — The First Cyber Weapon
Stuxnet is discovered — a sophisticated worm that physically damages Iran's nuclear centrifuges by silently altering their spin speeds. Widely attributed to the US and Israel. The world realizes malware can destroy physical infrastructure. Cyber warfare becomes real.
MALWARE
2011
LulzSec's 50-Day Rampage
LulzSec, a splinter group from Anonymous, goes on a 50-day hacking spree. Sony, PBS, the CIA, the US Senate, FBI affiliates — all breached "for the lulz." They release data, deface websites, and mock their targets publicly before disbanding.
HACK
2013
Snowden Reveals Everything
Edward Snowden, an NSA contractor, leaks classified documents revealing the scope of global surveillance programs — PRISM, XKeyscore, mass phone metadata collection. The world learns that governments are watching everything. The privacy debate is permanently changed.
LEAK
2014
Sony Pictures Hacked
North Korea's Lazarus Group breaches Sony Pictures in retaliation for "The Interview." They leak unreleased films, executive emails, salary data, and Social Security numbers. It's the most destructive corporate hack ever — a nation-state attacking a movie studio.
HACK
2016
Mirai Botnet
The Mirai botnet enslaves hundreds of thousands of IoT devices — cameras, routers, DVRs — and launches a massive DDoS attack against DNS provider Dyn. Twitter, Netflix, Reddit, and GitHub go down. Half the internet breaks because of insecure baby monitors.
MALWARE
2017
WannaCry Ransomware
WannaCry ransomware exploits an NSA-developed exploit (EternalBlue) leaked by the Shadow Brokers. It hits 200,000+ computers across 150 countries. Hospitals, factories, and government systems are paralyzed. A 22-year-old named Marcus Hutchins accidentally finds the kill switch.
MALWARE
2017
NotPetya — $10 Billion in Damage
NotPetya masquerades as ransomware but is actually a Russian cyber weapon targeting Ukraine. It escapes containment and causes over $10 billion in global damage. Maersk loses 45,000 PCs. FedEx loses $400 million. It's the most destructive cyber attack in history.
MALWARE
// 2020s
2020
SolarWinds Supply Chain Attack
Russian intelligence compromises SolarWinds' Orion software update, gaining access to 18,000 organizations including the US Treasury, Department of Homeland Security, and Microsoft. The attack goes undetected for 9 months. Supply chain security will never be the same.
HACK
2021
Colonial Pipeline Shutdown
DarkSide ransomware group shuts down the Colonial Pipeline, which supplies 45% of the US East Coast's fuel. Gas stations run dry. The company pays $4.4 million in Bitcoin ransom. Critical infrastructure security becomes a national priority.
MALWARE
2021
Log4Shell (CVE-2021-44228)
A critical vulnerability in Apache Log4j, a ubiquitous Java logging library, allows remote code execution with a single crafted string. Hundreds of millions of devices are vulnerable. Security teams worldwide spend Christmas patching. It's called "the single biggest, most critical vulnerability of the last decade."
HACK
2024
AI-Powered Security Goes Mainstream
AI-powered security tools become mainstream on both sides. Defenders use LLMs for threat detection, code auditing, and incident response. Attackers use them for polymorphic malware, social engineering at scale, and vulnerability discovery. The arms race enters a new dimension.
HACK
2024
XZ Utils Backdoor
A sophisticated supply chain attack is discovered in XZ Utils, a compression library used by nearly every Linux distribution. A maintainer named "Jia Tan" spent two years gaining trust before inserting a backdoor targeting SSH authentication. Caught by a Microsoft engineer who noticed a 500ms delay.
HACK