
They were the first hackers, learning how to exploit the system by modifying hardware and software to steal long distance phone time. Tech-savvy people known as “phreakers” found a way around paying for long distance calls through a series of codes.


The malicious tie to hacking was first documented in the 1970s when early computerized phones were becoming a target. The exploit kits are upgraded regularly similar to normal software and are available on dark web hacking forums. They are readymade tools criminals can buy online and use against anyone with a computer. Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s computer.
