Skip to main content

Wait, what? These ridiculous hacks will make you do a double-take

Hacking is serious business these days: There’s always another attack that might have stolen your online information, another device that may be spying on you, or another vulnerability that you have to watch out for until it gets patched. That’s no fun.

That makes it easy to forget the first hacks were jokes and pranks, invented by coders looking to push a computer to its limit. While most of the world has forgotten that, some still hack with a more lighthearted approach. Here’s what happens when digital attacks get silly.

Recommended Videos

The “Godzilla ATTACK!” road warning

Godzilla Attack
Image used with permission by copyright holder

Sometimes the simplest hacks are the best. Take this 2014 hack of traffic warning signs—which are programmed with basic warnings about serious traffic issues or repair ahead. This hack replaced the warning on a San Francisco sign with, “Godzilla Attack! Turn Back!”

Interestingly, this coincided with other traffic sign attacks on the other side of the country, so we’re guessing someone was passing along an easy way to break traffic software security. State and federal agencies heaved heavy sighs, and put the signs on a long, long list of, “Things way overdue for security upgrades.” But we’re giving this prank extra points, because it was relatively harmless and probably made the drive home more enjoyable. It also spawned a series of amusing copy-cat road sign hacks.

AC/DC’s Thunderstruck, a hacker anthem

Ashley Madison
Image used with permission by copyright holder

Thunderstruck first made digital waves when Iran scientists were apparently hacked in 2012 to play the song from their computers. It’s not certain if the hack did anything else, but the story got out and quickly captured the hearts of hackers everywhere.

Naturally, the song kept on appearing, first in 2013 as an example of how someone could theoretically hack Thunderstruck into a device with the right PowerShell code (and how to prevent stuff like that). Not everyone was paying attention.

Then came the infamous Ashley Madison hack of 2015, when millions of users had their very sensitive illicit hook-up data stolen, and employees found Thunderstruck playing from their computers. At this point, it’s become something of a trademark, and we have no doubt the song will appear in future hacks as well.

The Lizard Squad vs. Lenovo

Lizard Squad
Image used with permission by copyright holder

The Lizard Squad was a hacking group that fulfilled the fantasies of every teen hacker on the planet (well, some of the fantasies) when it made headlines for successfully hacking famed PC manufacturer Lenovo.

Using a basic DNS redirect trick, Lizard Squad caused the Lenovo website to redirect to a slideshow of teen hackers nonchalantly posing in front of their webcams, set to the dulcet tunes of Breaking Free from the High School Musical Movie.

This was extremely embarrassing for Lenovo, especially since this came so soon after the company sold laptops pre-infected with the Superfish malware. At least Lizard Squad didn’t destroy data or infect personal computers (although they did spy on a few emails during the hack).

The Cosbycoin Debacle

Cosbycoin
Image used with permission by copyright holder

When Bitcoin was first making the rounds as the cryptocurrency to revolutionize the world, everyone had an opinion about it. Dozens and dozens of sites sprang up to offer Bitcoin services, advice, and discussion. Naturally, hackers took advantage of the situation and had a little fun.

Don’t worry. No Bitcoins were harmed during the hack. Instead, the popular Bitcointalk.org forums were taken over and replaced with multiple ads and site redirects for something called Cosbycoin. And yes, they did use old images and advertisements featuring Bill Cosby.

Of course, Cosbycoin never existed, although it quickly became a meme among cryptocurrency fans to describe useless or nonexistent “coin” projects. Given Cosby’s current reputation, this 2011 joke is a bit darker in hindsight – but on the plus side, it did raise important questions about internet security and how much people could trust the cryptocurrency trend.

Burger King briefly becomes McDonalds

Burger King Hack
Image used with permission by copyright holder

Twitter hacks happen all the time. Back in 2013, though, Twitter hacks weren’t quite as common, and we hadn’t become desensitized to brands dealing with Twitter snafus. The hack of Burger King’s Twitter was big news – especially when it was turned into McDonald’s.

The hackers, not content with plastering unpleasant tweets all over the Burger King feed, also announced that Burger King was sold to McDonald’s “because the whopper flopped,” and even changed the logo to that of McDonald’s.

It was a prime example of the havoc that hackers could create on social media just by getting the right access information. Today, Twitter feeds like Burger King and Wendy’s are known for being particularly witty, well guarded, and fast-moving.

‘Half Life 3’ is finally confirmed

Gaming Reddit Hack
Image used with permission by copyright holder

The r/gaming subreddit is one of the most popular of all Reddit forums, collecting all the news and memes that gaming can produce. Back in 2014, r/gaming moderators woke to find that the subreddit had been hacked by the Nigerian Electronic Army, an outfit known in those days for creating chaos on Reddit and hacking game-related sites.

The r/gaming hack was the NEA’s greatest triumph, and they didn’t waste it. They removed the ability to submit content and replaced everything with a black background and single line of text stating “Half Life 3 is confirmed.” Fans have been expecting an announcement regarding Half-Life 3 for over a decade, but one has yet to materialize.

Of course, if any gamers were hopeful enough to click on the announcement, it just took them to the NEA website. Low blow, guys.

The infamous, and still unsolved, Max Headroom hack

Max Headroom WTTW Pirating Incident - 11/22/87 (Subtitled)

This is an oldie, but easily one of the most famous hacks in history, and definitely among the strangest.

Invented in the 1980s, Max Headroom was a sentient yellow AI introduced first in a cyberpunk movie called Max Headroom: 20 Minutes Into The FutureHis unique appearance and unusual electronic voice made him a cult icon, and the character became a pop culture icon for several years. He was even the spokesperson for New Coke.

On November 22, 1987, a man in a Max Headroom mask started taking over TV channels. He interrupted broadcasts, made fun of Dr. Who, insulted sportscasters, and — oh yeah — had his bare butt slapped with a flyswatter. The whole thing lasted several minutes in all, and it became apparent that someone had hacked broadcast signals, just like they do in the movies.

It was a remarkable joke, but even more remarkable, no one knows who did it or how it was accomplished. Even after multiple investigations, the whole thing remains a mystery. At this point, its likely the pranksters responsible will never been identified, and the exact method of attack will never be known.

Mr. Bean, the Spanish politician

Zapatero Hack
Image used with permission by copyright holder

Back in 2010, Spain was in the middle of a particularly rough time. Its Socialist Prime Minister Zapatero was not a popular man, an economic crisis had led to mass protests, and parts of the country were again murmuring about independence (a trend that, as you might recall, continued in recent years).

So it wasn’t entirely surprising that a hacker used cross-site scripting to replace Zapatero on the EU presidency site with one Mr. Bean. It was a simple hack, but hilarious — and spot on, since Zapatero had already been compared to the beloved, bumbling television character for many years. The hack, while ridiculous, was also a reminder about how these sorts of attacks are so often inspired by the politics of the moment.

Vogue velociraptors

Vogue Dinosaurs
Image used with permission by copyright holder

This is one of our favorite hacks — and whether or not it’s a hack depends on whom you ask. Certainly the UK Vogue company leaders weren’t entirely happy about it, but it wasn’t an illegal exploit, either.

In 2013, enterprising computer geeks found that some other enterprising computer geek in charge of the Vogue website and several other UK business sites had included a secret command. If you input the Konami code (the famous secret video code up, up, down, down, left, right, left, right, B, A) then a velociraptor appeared on screen. If you did it again, another dinosaur would pop up.

People quickly found they could input the code over and over to create a whole team of velociraptors posing for the Vogue site. Not only that, but the raptors had a variety of stylish hats and bows they could appear with, making them even more at home.

As the news spread, more and more online users had fun summoning infinite dinosaurs (who wouldn’t?), while others tried to figure out just where the hack had come from. As it turned out, the trick had been authorized as an easter egg — which was then forgotten by the people who developed it.

Operation Cupcake replaced bombs with sweets

Smart Planet Hostess Mini Cupcake Maker
Image used with permission by copyright holder

Let’s shift to the more serious field of counterterrorism — and cupcakes.

Back in the early 2010s, the British intelligence organization MI6 reported successful cyber-warfare on the remnants of Al-Qaeda. The terrorist organization had been trying to publish a new online magazine filled with colorful, detailed instructions on how to make bombs in your kitchen and other, very-not-cool advice.

British agents, however, had managed to infiltrate the download and insert its own code into the instructions. When wannabe terrorists tried to download the zine, instead of bomb instructions they got a bunch of nonsense about cupcake recipes. It was, in fact, content from “The Best Cupcakes in America,” a segment that had aired on the Ellen DeGeneres show. The content included such gems as “self-contained and satisfying, it summons memories of childhood even as it’s updated for today’s sweet-toothed hipsters.”

Hopefully, at least a few people actually tried the recipes instead of making bombs.

The Japanese squid virus did what it said on the tin

Ika-tako
Image used with permission by copyright holder

Any security expert will be quick to tell you that real hacking doesn’t follow any of the movie tropes, like replacing everyone’s screen with a dancing cartoon. It’s far more lucrative for a hacker to write ransomware instead so they could make money off the crime instead of inserting random animations. Yet some hackers just like to cause chaos, and they are often inspired by old Hollywood ideas. Such a man was Masato Nakatsuji, who in 2010 created an infamous Ika-tako (squid-octopus) virus via the Winny filesharing network.

The malware looked like a common music file, but once it started up it took over any connected hard drives. Instead of sealing away files for money like ransomware, the virus simply replaced them with pictures of squid, octopuses, and sea urchins.

When caught, Nakatsuji claimed he wanted to see if his computer skills had improved since the last time he was arrested for hacking — which, to be fair, is a perfect one-liner.

What a Titstorm

Titstorm
Image used with permission by copyright holder

The year was 2009, and the rebel-with-every-cause internet group Anonymous was enjoying the power to hack unprepared governments and organizations around the world. This coincided with Australia’s government trying to do something about porn. The censorship plans the government created, while born from good intentions, proved ill-conceived and surprisingly ignorant about how both porn and the internet work (find out more details if you really want to know). Naturally, some people got upset.

Anonymous stepped in with Operation Didgeridie and, a year later, Operation Titstorm, two hacking projects that were just as ridiculous as they sounded.

The first was a DDoS attack on the Prime Minister’s website that only took it down for about an hour. The second was a more widespread attack that shut down the Australian Parliament House website and caused problems for the Department of Communication. Both included extravagant demands and, naturally, focused on assailing the Australian government with as much porn as possible.

Tyler Lacoma
Former Digital Trends Contributor
If it can be streamed, voice-activated, made better with an app, or beaten by mashing buttons, Tyler's into it. When he's not…
No, you didn’t miss it: Dell’s biggest sale of the year is live now
Woman on laptop bought during Dell Canada Black Friday deals event edited

While the big holiday sales events might seem to be over, there's still one picking up steam. That's Dell's biggest sale of the year on AI-ready PCs, business laptops, and more. Now's an excellent time to save big on Dell gear from laptops and desktops to monitors and beyond. For select items, Dell has even taken as much as $845 off, which I probably don't need to say -- but still will -- amounts to huge savings. Inspiron, Latitude, Precision, XPS, you know and recognize the names, and they're all part of the big sale. If you didn't end up grabbing a laptop or new system in the Black Friday and Cyber Monday sales, now's a great time to take the leap.

 
What to shop in Dell's biggest sale of the year
If you're looking for business laptops, there's . If you're looking for AI-ready PCs, there's , too. In fact, across both events, there are a lot of different options to shop, all from Dell's best selections. Both of these sales will be available until December 9, so now's your time to cram in some last-minute shopping, especially for anyone who needs a new laptop or computer.

Read more
Don’t bother with GPU deals during Cyber Week. Do this instead
A hand grabbing a graphics card.

You've probably been patiently waiting to score a deal on one of the best graphics cards this Cyber Week, and I don't blame you. We're not in a GPU shortage, but GPU prices aren't where they should be. Add on top of that signs that RTX 50-series and RDNA 4 GPUs are right around the corner, and now looks like the best time to score a deal.

I just don't see any good deals.

Read more
This Dell XPS Desktop with an RTX 4070 is $600 off during Cyber Week
The Dell XPS Desktop on a desk next to a monitor.

For one of the best remaining Cyber Week computer deals, head to Dell right now. Currently, you can buy the a Dell XPS Desktop with GeForce RTX 4070 graphics card for $600 off. Normally $2,345, it’s down to $1,745, which is a great price for a desktop PC that is fairly well suited for gaming. All you need is to add one of the best monitor deals and you’re all set. Here’s what this desktop has to offer.

Why you should buy the Dell XPS Desktop
Well suited for gaming as well as working effectively from home, this Dell XPS Desktop is packed with great hardware. It has a 14th generation Intel Core i9-14900K CPU, which is the CPU that I personally considered kitting out my new gaming PC with. It also has 32GB of memory and 1TB of SSD storage. Best of all is its Nvidia GeForce RTX 4070 GPU with 12GB of dedicated VRAM. That all makes for a PC that is perfect for gaming even if it doesn’t look like a gaming PC. This is easily one of the best desktop PCs around. The only consideration I’d make for gaming is wishing there was more storage space, but that’s easily added at a later date.

Read more