Hacker Reveals What He’s Learned

Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and

government officials, including Michelle Obama, former CIA director

John Brennan, Kim Kardashian and Tiger Woods.

The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the Internet, among other charges.

Now, Taylor is trying to help companies and recently started working for a cybersecurity start-up. Taylor's life as a hacker began when he was just 12 years old and playing video games at home.

"Just imagine being 12 and having the power just to take anybody off your video game. So I felt a lot of power. And then I started learning other things and I moved on to joining a hacking group," Taylor told CNBC.

The hacking group he joined was able to crash websites, including taking Twitter offline for about an hour in 2012, according to Taylor. Twitter did not respond to CNBC's request for comment. According to Taylor, he also accessed customer account data at major corporations like Amazon, Apple, AT&T and Netflix, sometimes gaining access to customers' personal information. The companies did not acknowledge this access.

"The security of Amazon customer accounts is one of our highest priorities," said an Amazon spokesman.
Taylor then moved on what he is most famous for – targeting celebrities and politicians and sharing their personal information.

"It was pretty hard. I actually had to go after Russian hackers that owned a website … where they sold your Social Security number, your credit reports, your address and date of birth," he said. 

"I hacked into their website and then blackmailed them with their information, and they just made me a part of the site somewhat…They gave me free credentials to buy Social Security numbers."

Every day, Taylor would post Social Security numbers, home addresses and sometimes even full credit reports on the Internet for all to see.

Sometimes Taylor and his hacking group took things even further, by participating in what is known as swatting -- prank-calling the police to report an urgent or violent crime, to get them to arrive at a location, usually someone's home.

"People that were in my group would do swatting attacks on them [people whose information was posted]. And we had a TMZ reporter that I knew personally that we tell before we did a swatting," Taylor said. Unlike many cyber gangs, Taylor says his group was not motivated by money.

"I was never financially motivated because I was just in it for the thrill and politically motivated," he said.
His message was that nobody is safe online.

"I went after people that in my mind at the time thought deserved it. But now that I reflect on it, nobody deserves to get their information stolen because it's an invasion of privacy," Taylor said.

Taylor made the website with the leaked information look like it came from Russia, but the government figured out who was really behind the postings.

"First, it was the FBI SWAT they sent in, I guess because they thought I could be armed and dangerous. And then after FBI SWAT cleared the house, they sent in the agents from Secret Service and FBI," he said explaining his fourth and final arrest.

Taylor now says he regrets posting the information. He was sentenced to probation that recently ended. Now 21 years old, Taylor says he's turned his life around.

"There is no way I could go back to hacking's dark side after all the things that I went through to just be free and be here right now," he said.

Taylor recently became an advisor to cyber-security start-up Path which helps companies make sure their websites are properly loading around the globe.

"We want to rent your computer to send network requests to various websites on the internet so that we can tell our customers how long it takes for their website to load in different areas," said Marshal Webb, Path's Chief Technology Officer.
Interestingly, Webb was once also a hacker and part of Lulz Security, which made headlines for hacking websites in 2011.

"It was a challenging thing you know? Computer systems are designed to keep you out, right?" Webb said. "It's like the most complicated game of chess you can imagine."

Taylor and Webb say their background have not scared any potential customers away.

"That's what people are looking for nowadays. They're looking for people that were experienced and had action in the front lines of hacking in the past. But are doing good now," Taylor said.

CNBC

You Might Also Read: 

Police Arrest Bank Hacker Who Stole $1B:

US Air Force Hacked By Teenager:
 

 

« Australia Points The Finger At Russia For Cyberattacks
Iran Likely To Retaliate With Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Go Grow

Go Grow

Go Grow is a business oriented accelerator program at Copenhagen School of Entrepreneurship. Targeted technologies include IoT, AI and Cybersecurity.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Etisalat

Etisalat

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.