First of all, Hush was not a hacker. He belonged to a syndicate.
Secondly,the only thing Hush can teach is social engineering. Take this from me. He is smart, no doubt.
I think you did not read well about Hush and only fed on the information you found in online sources.
Hush and his team were involved in the Business Email Compromise (BEC). His counterparts were the ones doing the hacking.
BEC fraud schemes often involve a computer hacker gaining unauthorized access to a business-email account, blocking or redirecting communications to and/or from that email account, and then using the compromised email account or a separate fraudulent email account (sometimes called a “spoofed” email account) to communicate with personnel from a victim company and to attempt to trick them into making an unauthorized wire transfer. The fraudster will direct the unsuspecting personnel of the victim company to wire funds to the bank account of a third party (sometimes referred to as a “money mule”), which is often a bank account owned, controlled, and/or used by individuals involved in the scheme.
Sir, there is a field in cybersecurity called “FORENSICS AND INVESTIGATIONS” Do you know what that is?
First of all, Hush belonged to a state-sponsored hacking group/syndicate in North Korea called the Lazarus group. He was first identified by the FBI cyber division team in 2018 on the darkweb. The US FBI cyber division team code-named Fox Hunt 2 as the tag for Hush and his team.
The cyber team knew everything about him; violation of 18 S.C. § 1956(h) (Conspiracy to Engage in Money Laundering).
The law that governs the ability of the FBI (Federal Bureau of Investigation) or any law enforcement agency to obtain information from social media companies or other electronic communication service providers is primarily the Electronic Communications Privacy Act (ECPA) of 1986.
Under this law, enforcement agencies like the FBI can obtain certain types of electronic communications records, including content and non-content information, through various legal mechanisms such as subpoenas, court orders, and search warrants, depending on the specific circumstances and the nature of the information sought.
The FBI cyber forensics team was 3 times ahead of him, waiting for the right time to pounce on him and his team: They were busted unaware in their mansion at the right time. The other one was arrested at the airport.
While I agree with you that being a hacker requires high intellect, know that RAMON was not a hacker.