Share this
The Hacking Groups That Shaped the Security Industry
by Reflare Research Team on Mar 9, 2026 2:09:45 PM
Before security became an industry, it was a scene. In the half-lit margins of the early internet, a handful of names kept appearing wherever things broke in interesting ways, and these were the ones who defined what was to come.
.jpg?width=1200&height=800&name=The%20Hacking%20Groups%20That%20Shaped%20the%20Security%20Industry%20(1200).jpg)
Remembering the Pioneers of Security Research
Respect
Fabled security researcher Felix “FX” Linder passed away last week. To many in the industry and on our team, he was a hero and an inspiration.
If you were around the security scene in the late 1990s and early 2000s, you would know who he was and what PHENOELIT meant. If you weren't, this is a good time to learn. That era produced some of the most important security research ever published, mostly by people with no job titles, no corporate backing, and no formal mandate to do so. They were just people who were very good at finding things that were broken, and they found plenty.
L0pht Heavy Industries
L0pht was a Boston-based group named after the loft space where its members worked. The core roster included Mudge (Peiter Zatko), Weld Pond, Kingpin, Dildog, Space Rogue, Brian Oblivion, and Silicosis.
Their password auditing tool L0phtCrack caused significant disruption when it was released. It cracked Windows NT passwords by exploiting weaknesses in Microsoft's LAN Manager hash quickly enough that the scale of the problem became impossible to ignore.
The group's most notable public moment came when seven members testified before the United States Senate Committee on Governmental Affairs, speaking under their hacker handles. Mudge told Senator Fred Thompson that they could take down the entire internet within thirty minutes. It was one of the first times Congress had engaged directly with the hacking community on security issues.
L0pht later merged into the security firm @stake. Mudge went on to work at DARPA and became Twitter's head of security, eventually filing a whistleblower complaint about the company's security practices. Dildog was a member of both L0pht and cDc, and went on to work on Back Orifice 2000 as part of the cDc project. Kingpin moved into hardware security research.
TESO
TESO was a German and Austrian group active in the late 1990s and early 2000s. Their members included Scut, Skyper, and Halvar Flake, and they produced some of the more technically rigorous research of that era.
Scut wrote "Exploiting Format String Vulnerabilities," which became a widely referenced document in the security field. Before that paper, format string bugs were poorly understood. It established them as a defined vulnerability class and influenced how auditors approached code review going forward.
Halvar Flake, whose real name is Thomas Dullien, focused on binary analysis and developed BinDiff, a tool for comparing compiled binaries that became widely used for patch diffing. The idea is to compare a patched binary against the unpatched version to identify exactly what changed and work out what the underlying vulnerability was. BinDiff is still used by security researchers and has since been open-sourced by Google.
TESO also published research on SSH at a time when SSH was increasingly trusted as a secure protocol. Their work included research into the crc32 compensation attack detector vulnerability in sshd, which was a significant remote exploitation issue. Their advisories were often released without prior vendor coordination, which was common practice in parts of the underground at the time.
THC
The Hacker's Choice, is a German group that remained active long after most groups from the same era had disbanded. Van Hauser was their most consistent public-facing member over the years.
THC-Hydra is the tool most associated with the group. It is a network login brute-forcer supporting a large number of protocols including FTP, HTTP, HTTPS, SMB, LDAP, and Cisco authentication. It became a standard tool in penetration testing and still ships with Kali Linux.
The group also published research on VoIP security when SIP adoption was growing rapidly, and released THC-SSL-DOS, which demonstrated a denial of service condition in SSL/TLS renegotiation. Fixing that issue required coordinated patches across browser vendors and server software.
PHENOELIT
PHENOELIT was a German group best known through their member FX, who did substantial research into Cisco IOS vulnerabilities. Cisco routers were running critical infrastructure and corporate networks globally, and PHENOELIT published vulnerabilities in IOS covering remote code execution and denial of service. FX presented this work at DEF CON, Black Hat, and the Chaos Communication Congress.
The group also published research on HP JetDirect, SAP, and RIM BlackBerry, demonstrating that networked printers, enterprise software, and mobile devices were viable attack targets that most people had not been paying attention to. FX ran Recurity Labs, a Berlin-based security consulting firm, until his death.
LSD
Last Stage of Delirium was a Polish research group active through the late 1990s and early 2000s. Their output covered a lot of ground. They published shellcode development techniques for a wide range of processor architectures including MIPS, PA-RISC, PowerPC, and SPARC at a time when that kind of cross-platform exploit knowledge was rare and genuinely useful.
They won the Argus Hacking Challenge, a well-known competition involving a military-grade security system called Argus Pitbull, using kernel-level exploits. The writeup they published on how they did it was presented at Black Hat and became a reference document for anyone interested in kernel exploitation.
They also did substantial research into Java and JVM security vulnerabilities, presented at Black Hat Asia, covering exploitation techniques that most people in the security community had not seriously considered at the time. Later they published research on Microsoft Windows RPC vulnerabilities, which had a broad impact given how widely Windows was deployed across enterprise networks.
The group kept a low profile but produced consistently serious work across multiple areas over the course of nearly a decade.
CdC
The Cult of the Dead Cow, founded in Lubbock, Texas, is one of the longest-running hacking groups around. By the late 1990s the group had built a reputation for combining technical work with a distinctly political perspective on hacking.
Their best-known release is Back Orifice, a Windows 98 remote administration tool presented at DEFCON by member Sir Dystic. It gave an attacker full control over a compromised machine, including file access, keylogging, and process manipulation. Microsoft labeled it malware, though the security community generally viewed it as a demonstration of how poorly Windows had been designed with security in mind.
The follow-up, Back Orifice 2000, was developed by cDc with Dildog, who was a member of both cDc and L0pht, and extended the same functionality to Windows NT and 2000. It was released as open source. Oxblood Ruffin led Hacktivismo, a cDc subproject that built tools designed to bypass censorship systems in authoritarian countries.
W00w00
w00w00 was an online security group active in the late 1990s that operated differently from most underground crews. Rather than being geographically concentrated, it was a distributed network of members who communicated remotely. It attracted a number of people who went on to significant careers in technology, the most well-known being Jan Koum, who co-founded WhatsApp.
The group focused on finding vulnerabilities in widely deployed software and published advisories on weaknesses in things like wu-ftpd and other common Unix services. They were not as prolific as some contemporaries but were well-regarded in the community and connected to serious researchers across the scene.
ADM
ADM, sometimes expanded as the "ADM crew," was active in the late 1990s and released a significant volume of exploit code targeting core internet infrastructure. Their releases covered vulnerabilities in BIND, the DNS server running the majority of internet name resolution at the time, as well as sendmail, wu-ftpd, and other widely deployed Unix services.
Their output was raw and often dropped without much documentation, but the targets they chose were consequential. Vulnerabilities in BIND in particular had a broad impact given how much of the internet depended on it. ADM did not have the public presence of groups like L0pht or cDc but their releases were taken seriously by administrators and vendors who had to respond to them.
XFocus
XFocus was a Chinese security group that emerged from the broader patriotic hacker scene of the late 1990s and early 2000s. One of their notable members was Glacier, whose real name is Huang Xin, who released one of the first Chinese-developed remote access trojans and co-created X-Scan, a network vulnerability scanner that became widely used in China and beyond.
The group has also been linked to the Blaster worm. XFocus published proof-of-concept code after reverse-engineering a Microsoft Windows patch, which was later used in the Blaster chain. Court documents from the prosecution of a US teenager who created a Blaster variant named XFocus in connection with the original reverse engineering work.
XFocus also ran XCon, one of China's first serious technical security conferences, which brought together researchers from across China and internationally. Several members went on to careers in China's cybersecurity industry, and outside reporting has noted overlaps between XFocus alumni and firms such as VenusTech.
What They Left Behind
Most of these groups no longer exist in their original form. The security industry that replaced the underground has bug bounty programs, disclosure policies, and corporate research teams, many of them staffed by people who came up through the same scene.
THC-Hydra is still in active use. L0phtCrack eventually went open source. Research from LSD and TESO is still cited in vulnerability work. The techniques these groups developed and documented became standard knowledge for the generations of security professionals that followed.
Share this
- February 2026 (1)
- January 2026 (1)
- December 2025 (1)
- November 2025 (1)
- October 2025 (1)
- September 2025 (1)
- August 2025 (1)
- July 2025 (1)
- June 2025 (1)
- May 2025 (1)
- April 2025 (1)
- March 2025 (1)
- February 2025 (1)
- January 2025 (1)
- December 2024 (1)
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- June 2024 (1)
- April 2024 (2)
- February 2024 (1)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- June 2023 (2)
- May 2023 (2)
- April 2023 (3)
- March 2023 (4)
- February 2023 (3)
- January 2023 (5)
- December 2022 (1)
- November 2022 (2)
- October 2022 (1)
- September 2022 (11)
- August 2022 (5)
- July 2022 (1)
- May 2022 (3)
- April 2022 (1)
- February 2022 (4)
- January 2022 (3)
- December 2021 (2)
- November 2021 (3)
- October 2021 (2)
- September 2021 (1)
- August 2021 (1)
- June 2021 (1)
- May 2021 (14)
- February 2021 (1)
- October 2020 (1)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
- December 2019 (1)
- November 2019 (2)
- October 2019 (3)
- September 2019 (5)
- August 2019 (2)
- July 2019 (3)
- June 2019 (3)
- May 2019 (2)
- April 2019 (3)
- March 2019 (2)
- February 2019 (3)
- January 2019 (1)
- December 2018 (3)
- November 2018 (5)
- October 2018 (4)
- September 2018 (3)
- August 2018 (3)
- July 2018 (4)
- June 2018 (4)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (3)
- January 2018 (3)
- December 2017 (2)
- November 2017 (4)
- October 2017 (3)
- September 2017 (5)
- August 2017 (3)
- July 2017 (3)
- June 2017 (4)
- May 2017 (4)
- April 2017 (2)
- March 2017 (4)
- February 2017 (2)
- January 2017 (1)
- December 2016 (1)
- November 2016 (4)
- October 2016 (2)
- September 2016 (4)
- August 2016 (5)
- July 2016 (3)
- June 2016 (5)
- May 2016 (3)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)


