Hacker Reveals What He’s Learned

Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and

government officials, including Michelle Obama, former CIA director

John Brennan, Kim Kardashian and Tiger Woods.

The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the Internet, among other charges.

Now, Taylor is trying to help companies and recently started working for a cybersecurity start-up. Taylor's life as a hacker began when he was just 12 years old and playing video games at home.

"Just imagine being 12 and having the power just to take anybody off your video game. So I felt a lot of power. And then I started learning other things and I moved on to joining a hacking group," Taylor told CNBC.

The hacking group he joined was able to crash websites, including taking Twitter offline for about an hour in 2012, according to Taylor. Twitter did not respond to CNBC's request for comment. According to Taylor, he also accessed customer account data at major corporations like Amazon, Apple, AT&T and Netflix, sometimes gaining access to customers' personal information. The companies did not acknowledge this access.

"The security of Amazon customer accounts is one of our highest priorities," said an Amazon spokesman.
Taylor then moved on what he is most famous for – targeting celebrities and politicians and sharing their personal information.

"It was pretty hard. I actually had to go after Russian hackers that owned a website … where they sold your Social Security number, your credit reports, your address and date of birth," he said. 

"I hacked into their website and then blackmailed them with their information, and they just made me a part of the site somewhat…They gave me free credentials to buy Social Security numbers."

Every day, Taylor would post Social Security numbers, home addresses and sometimes even full credit reports on the Internet for all to see.

Sometimes Taylor and his hacking group took things even further, by participating in what is known as swatting -- prank-calling the police to report an urgent or violent crime, to get them to arrive at a location, usually someone's home.

"People that were in my group would do swatting attacks on them [people whose information was posted]. And we had a TMZ reporter that I knew personally that we tell before we did a swatting," Taylor said. Unlike many cyber gangs, Taylor says his group was not motivated by money.

"I was never financially motivated because I was just in it for the thrill and politically motivated," he said.
His message was that nobody is safe online.

"I went after people that in my mind at the time thought deserved it. But now that I reflect on it, nobody deserves to get their information stolen because it's an invasion of privacy," Taylor said.

Taylor made the website with the leaked information look like it came from Russia, but the government figured out who was really behind the postings.

"First, it was the FBI SWAT they sent in, I guess because they thought I could be armed and dangerous. And then after FBI SWAT cleared the house, they sent in the agents from Secret Service and FBI," he said explaining his fourth and final arrest.

Taylor now says he regrets posting the information. He was sentenced to probation that recently ended. Now 21 years old, Taylor says he's turned his life around.

"There is no way I could go back to hacking's dark side after all the things that I went through to just be free and be here right now," he said.

Taylor recently became an advisor to cyber-security start-up Path which helps companies make sure their websites are properly loading around the globe.

"We want to rent your computer to send network requests to various websites on the internet so that we can tell our customers how long it takes for their website to load in different areas," said Marshal Webb, Path's Chief Technology Officer.
Interestingly, Webb was once also a hacker and part of Lulz Security, which made headlines for hacking websites in 2011.

"It was a challenging thing you know? Computer systems are designed to keep you out, right?" Webb said. "It's like the most complicated game of chess you can imagine."

Taylor and Webb say their background have not scared any potential customers away.

"That's what people are looking for nowadays. They're looking for people that were experienced and had action in the front lines of hacking in the past. But are doing good now," Taylor said.

CNBC

You Might Also Read: 

Police Arrest Bank Hacker Who Stole $1B:

US Air Force Hacked By Teenager:
 

 

« Australia Points The Finger At Russia For Cyberattacks
Iran Likely To Retaliate With Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.