Ik weet het niet. Het kan een smoes zijn van Piratebay omdat ze ellende verwachten, of een manier om die data de kop in te drukken. Het kan ook een truuk van Lulzsec zijn om de FBI te besmetten.quote:
Het zou wel erg dom zijn om eerst te laten zien hoe kwetsbaar iedereen is om vervolgens zelf kapot te gaan.quote:Op zondag 26 juni 2011 19:15 schreef Yuri_Boyka het volgende:
Ik heb die gister gedownload en er zat inderdaad vage shit in.
Maar iig, wie heeft Lulzsec exposed, ik bedoel je komt niet zomaar even aan alle gegevens.
Jammer. zo'n half bericht.quote:Op maandag 27 juni 2011 13:30 schreef Disana het volgende:
Zelfs de Volkskrant heeft het opgepikt:
http://www.volkskrant.nl/(...)-stoppen-ermee.dhtml
Lulzsec heeft het startschot gegeven en aanhangers gecreëerd voor OpAntisec.quote:Anonymous Claims LulzSec Members, Steps up Attacks
The decision by computer hacking group LulzSec on Saturday to fold operations may be helping another online group, Anonymous, which stepped up attacks over the weekend.
Members of LulzSec appear to have rallied around Anonymous with both the group, and some LulzSec members claiming they were now with Anonymous.
Anonymous claimed over the weekend that it has released information from the website of the Cyberterrorism Defense Initiative, a national counter-cyberterrorism training program funded by the U.S. Department of Homeland Security among others.
It also said it had found a "chest of 40 Terabytes internal data" from an undisclosed company, but was not sure how to put up all the data on the web.
LulzSec said Saturday it had ended its campaign of cyberassaults on government and corporate websites and that it was time for it to "sail into the distance." It did not give a specific reason for its sudden decision.
Anonymous said in a message on Twitter on Sunday that it could confirm that all LulzSec members have reported aboard. A LulzSec member Sabu confirmed on Twitter that its members were now part of Anonymous.
LulzSec and Anonymous came together recently to target government and related agencies in Operation Anti-Security.
There is speculation that the LulzSec, known for its brash comments, had decided to disband after the arrest in the U.K. last week of Ryan Cleary, who is alleged to have been involved with the group.
LulzSec may however have been the victim of attacks from rival hackers it has been squabbling with such as Jester and Web Ninja. A person disclosed over the weekend information on LulzSec and some of its members.
quote:Anonymous - Press Release 4/26/2011 - OPERATION DARKNET #OpDarknet
In contradiction to the best practices of Anonymous, most VPN's, Tor, and recently I2P users have been prevented from accessing certain IRC services that have previously been associated with Anonymous. The only option left is to connect to these US Based (and otherwise FBI/CIA/DHS friendly/controlled) based IRC servers using your own internet connection with little in the way of privacy.
I2P, or the Invisible Internet Project, is a secure, encrypted, tunnel-based darknet used to maintain anonymity while hosting or accessing content within the darknet, or via proxies to external services on the "normal" net. Created anonymously for the sake of the anonymity of others, this is a great alternative to a centralized system.
I2P is an internet within the internet, unmonitorable and uncensorable from outside. By default, anonymous mail, anonymous filesharing (BitTorrent, Gnutella, i-Mule etc), anonymous chat (IRC/Jabber/I2PMessenger) and anonymous web serving are provided with the installation. Treat I2P like your own private internet, free from interference and oversight. Think privacy, not paranoia, empowerment, not suppression. We have users around the world using I2P to evade censorship, not least in Egypt, Tunisia, Iran, China, and other locations where state level interference is routine.
Moreover, with I2P, you can create your own IRC channels and Ops--there is no censorship, and no authority. With the ability to create your own channels and attract anons to your ideas, you will once again, see the beloved agency return to you.
Now is the time.
Learn more here: http://www.i2p2.de/
Download I2P here: http://www.i2p2.de/download
Follow instructions and soon you will be connected through I2P, completely secure and encrypted. Just connect your IRC client to 127.0.0.1:6668 and you're on board
#anoni2p, #opcannabis, #opdarknet, #anonportal and #i2phelp are some channels you may like to visit once you are.
http://pastehtml.com/view/1e7pi9g.html http://pastehtml.com/view/1e6zzoa.html
Installation:
Requirements: Java Runtime Environment (JRE) 1.6 (Oracle's, IcedTea, OpenJRE etc)
Windows/non-Debian Linuxs, BSD etc.
Grab the installer from http://geti2p.net/download and run, either via the conventional double click route, or from a terminal via java -jar i2pinstall.0.x.x.exe -console (It's a java file with an exe wrapper, so should run anywhere java is installed)
Ubuntu/Debian/etc
apt-add-repository ppa:i2p.packages/i2p as root and then refresh your repo (aptitude update etc). More info here: https://launchpad.net/~i2p.packages/+archive/i2p.
OS X
Convenient, pain-free install script here: http://www.megaupload.com/?d=5TGPLLAA or over I2P bittorrent here: http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=12472
Android
Coming soon!
After installation:
- If you're on Windows, and you're not running the portable installation (http://portable-i2p.blogspot.com), you'll want to install the I2P service for best results, and also disable launching the browser at startup, both configurable at http://127.0.0.1:7657/configservice
Then you'll want to head straight for the router console homepage and TAKE TIME to read through the introductory paragraphs. Reading and understanding what's written there will save you time and potential embarassment later, so do it! http://127.0.0.1:7657
CHAT: IRC
Using your favorite IRC Client connect to localhost 6668
for mIRC this would be:
//server -m localhost 6668
WEB PROXY
Open up your browser of choice, set your proxy to localhost:4444 and/or localhost:4445 for HTTPS
Config info here: http://geti2p.net/htproxyports.html
BITTORRENT
http://127.0.0.1:7657/i2psnark for your resident, browser-based I2P BitTorrent client. Active public trackers linked at the top.
ANONYMOUS MAIL
http://127.0.0.1:7657/susimail is your first port of call for anonymous i2p mail with a world reachable return address (you@mail.i2p internally resolves to you@i2pmail.org from the inbound gateway). Create yourself an account at postman's hq (embedded in susimail's login screen), make sure you read the faq and guides regarding acceptable use and being safe online BEFORE you start using your new account.
WEBSERVING ON I2P
You have your own configured-for-i2p webserver ready to go! http://127.0.0.1:7658 for more info.
I2P is Anonymous.
We Are Legion.
We Do Not Forgive.
We Do Not Forget.
Expect US.
quote:Anonymous releases counter-hacking manual
Anonymous has returned to the forefront of the hacker war against authority with the release of a "counter-cyberterrorism" manual, along with data on the FBI.
With Lulz Security now on permanent hiatus, fellow hacker group Anonymous has filled in the gap with the release of a “counter-cyberterrorism” manual from the US Department of Homeland Security.
According to ABC News, which was first to sort through the 650 MB file posted to MegaUpload, the release was originally thought to have come from a certain private security firm whose website went offline soon after Anonymous released the data. It was later found that the information actually comes from the Federal Emergency Management Agency (FEMA), which originally produced the “Counter Terrorism Defense Initiative” training program in 2009.
Accordring to the program’s website (which has since been taken offline), the “SENTINAL” program — short for “Security and Network Training Initiative and National Education Laboratory” — “is a national initiative to educate technical personnel in cyberterrorism response and prevention.” The program was intended for employees of “public safety, law enforcement, state and local government, public utilities, colleges and universities, and health care providers.” And it “focuses on enhancing the prevention, preparedness, and response capabilities of local, state, tribal, and rural public safety jurisdictions.”
It does not appear that the release contains much that wasn’t already publicly available on the Internet. It does, however, provide a list of all the Federal Bureau of Investigation office locations throughout the United States. Other contents of note include stock letters for officially requesting user information from Internet service providers, and various hacking and coutner-hacking tools. In short, there’s really nothing much here that a determined person couldn’t have found without hacking a single thing.
Regardless of the value of the release, the action shows that the hackers are far from finished. This release is part of the “AntiSec” (anti-cybersecurity) campaign launched by Anonymous and LulzSec (before it disbanded). According to @AnonymousIRC, a 100,000-follower strong Twitter feed that reports on the group’s escapades, “all @LulzSec members” are onboard with the #AntiSec campaign.
While LulzSec claims that it planned from the beginning to remain a coherent group for 50 days before splitting up, some believe the hacker sect called it quits after a rival gang of hackers, A-Team, released what it claims are the identities and online properties of all of LulzSec’s members.
quote:Teen accused of attacking SOCA website released on conditional bail
Ryan Cleary's bail conditions mean he is banned from using any device capable of connecting to the internet
The teenager accused of attacking the website of the UK Serious Organised Crime Agency has been released on conditional bail.
Prosecutors were unsuccessful in their appeal against Ryan Cleary's bail in a hastily convened hearing at Southwark Crown Court in London on Monday.
The 19-year-old, who was diagnosed with Aspergers syndrome last week, was arrested last Monday as part of an international investigation into the internet hacking group LulzSec following attacks on the CIA and US Senate.
Cleary's bail conditions mean he is banned from using any device capable of connecting to the internet. The Essex teenager must observe a curfew between 9am and 7pm. He will be electronically tagged and must not leave the house without his mother, Rita Cleary.
She was in court for the short hearing on Monday afternoon. The court reversed an earlier decision to hear Cleary's case tomorrow after an appeal over his "vulnerability" from his legal team.
The student has spent the past week being interrogated by the FBI and UK police over the alleged attacks. He could yet be charged with further offences.
Cleary's computers, iPhone and PS3 have been confiscated by police.
In a statement read outside court, Cleary's lawyers said: "Ryan Cleary is very relieved to be granted bail and to be home to his mum, his cats and his books.
"He has cooperated with police and will continue to do so. Ryan has last week been diagnosed with Aspergers... He will now be provided with the professional support he needs. His obvious intelligence can now be channelled into a worthwhile pursuit.
"One thing not so positive from this case is that the British police are investigating and appear to be accepting jurisdiction [unlike the Gary McKinnock case]. Ryan will not be making further statement for the time being."
The case is due back at Southwark crown court for a case management hearing on 30 August.
quote:Security outfit thanks lulzSec for the Lulz
Governments are blasé, blasts bloke
Read more: http://www.thinq.co.uk/20(...)-lulz/#ixzz1QZAlGeQd
Internet security expert Andy Kemshall from SecurEnvoy reckons LulzSec should be applauded for its campaign of online mayhem, as it exposed government complacency and business naivety.
“I firmly believe that the media attention LulzSec’s DDoS attack has recently received is deserving," he burbled. "It’s thanks to these guys, who’re exposing the blasé attitudes of government and businesses without any personal financial gain, that will make a difference in the long term to the security being put in place to protect our own personal data!”
Kemshall continues: "At the end of the day, it comes down to a fundamental failing on the part of the organisation that allows these criminals in. If they didn’t leave their networks unlocked there wouldn’t be a problem.
"Hackers are exposing the holes and bringing the issue out into the open. RSA unbelievably took three months to come clean about their breach and if hackers hadn’t exposed them, through the Lockheed Martin story, would they have come clean at all? The cynic in me thinks not.”
Kemshall discusses an unnamed a local authority which is waiting for its SecurID tokens to be replaced by RSA. "We were astounded to find that the organisation was actually pretty blasé and said they didn’t feel there was a huge risk. This is naïve as, not only is there proof that the tokens are insecure as another organisation has been hacked, but why else would RSA go to the expense of replacing them if there wasn’t a problem?”
Talking of LulzSec and Anonymous, Kemshall said there was "much to be learnt from their expertise and raw talent."
He added: “These techies are up to speed and are useful to the industry – we need them! What people choose to ignore is many of today’s experts are ex-hackers themselves so Anonymous and LulzSec are actually tomorrow’s authority. They offer fresh ideas and they’re exposing new vulnerabilities that the ‘good guys’ may not yet have seen or even considered.
Click here to find out more!
"The simple truth is that we’re going to need their expertise if we’re to defend ourselves against other countries and those malicious hackers who are out for financial gain. Instead of persecuting them, we need to recognise their talent, embrace their expertise and encourage them across from the dark side to turn their expertise into something constructive rather than destructive.”
Read more: http://www.thinq.co.uk/20(...)-lulz/#ixzz1QZAetA6i
quote:Operation Anti-Security: Anonymous release the identities of 2800 Columbian Black Eagles Special Police Unit members
Hacktivist group Anonymous today posted the names of 2800 of the right-wing Columbian Black Eagles Special Police Unit's members online, the published data has been credited as part of it and LulzSec's ongoing Operation Anti-Security.
The data was revealed earlier today via Anonymous Twitter feed. The tweet read, "#AntiSec Results: http://bit.ly/mw48D5 | List of ~2800 officers from the Peruvian Águilas Negras (Black Eagles Special Police Unit)".
The Black Eagles, or Aguilas Negras as the group is known in its native Columbia, are collection of fragmented right wing, counter-revolutionary, paramilitary cells, thought to have been born from the paramilitary Self-Defense Units of Colombia (AUC).
The AUC faction the group originated from was an umbrella organisation of death squads designed to combat the Columbia's leftist guerrilla fighters and generate income through drug trafficking.
The group is commonly thought to have no centralised authority and is fragmented into different cells each with its own chain of command.
The Black Eagles group is infamous for its involvement in numerous massacres and mass displacements across Columbia. As well as drug trafficking, certain cells have been linked to kidnapping, extortion and racketeering.
The release was credited as being a part of it and LulzSec's ongoing Operation Anti-Security. The operation is a new cyber campaign led by the two hacking collectives designed to protest and combat any and all institutions or governments attempts to censor or moderate the internet.
Already its brother-in-arms LulzSec has taken credit for attacks and hacks on Arizona law enforcement, the U.K.'s Serious Organised Crime Agency and two Brazilian Government owned websites.
Anonymous is yet to release a formal statement outlining its reasons for the hack.
quote:http://www.bronkerk.nl/page/page.php?ID=1
De site van de Bronkerk te Ugchelen is helaas niet bereikbaar. Dit komt door hackerspraktijken. Wij hopen dat wij zo snel mogelijk contact krijgen met deze hacker.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.quote:https://thepiratebay.org/torrent/6502765/antisec01
---- #ANTISEC ---- #ANONYMOUS ---- #HELLOCLOWNS ----
This is the first official #antisec release and within this archive you will find:
* ) Zimbabwean government dumps
* ) Mosman Municipal Council (mosman.nsw.gov.au) dump
* ) Universal Music Group Partners dump 1 & 2 containing umusic.com's user:passwords
and other data
* ) Viacom dump containing internal mapping of Viacom and its servers
* ) Assorted Brazillian Government dumps and passwords
Greetings fellow Anons, Swashbuckers and Lizards.
It has been a week since the LulzBoat lowered the LulzSec flag, she now proudly flies under the #AntiSec colors. Since this day, the movement is organized by a flotilla of independent but allied vessels.
In this short time, the friendly vessels were able to capture copious amounts of booty, all claimed in the name of #AntiSec. Make no mistake: While the LulzBoat is still sailing with us (albeit not with the LulzSec flag), the objective of #AntiSec is different. Despite being still driven by Lulz and therefore also providing them, the mission has become larger than us. #AntiSec is more than Lulz and more than even Anonymous: It is our true belief that this movement has the capability to change the world. And should that fail, we will at least rock the world.
Thus, the introductory #AntiSec release (dubbed AntiSec-001) does not contain the type of data that a typical Lulz Lizard can just abuse mindlessly. Instead, we provide material that is primarily against corrupt Governments (in our world this is all Governments) and corrupt companies. And keep in mind: #AntiSec vessels have a very large cache of valuable goods aboard; the crews are currently working hard to sort the loot in a way that even the lousy media sailboats are able to just grab it and sail away for the horizon. You will hear from us very soon.
And always remember: Let it flow and it will flow back to you.
#AntiSec
irc.anonops.li
[ Bericht 4% gewijzigd door Papierversnipperaar op 29-06-2011 15:59:34 ]Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
and more, and more.quote:AntiSec Slams Arizona Cops (Again) with Super Personal Data Spill
Looks like last week's "Chinga La Migra" strike against the Arizona Border Police was only part one—the sequel's landed today, and this time it's personal. Like, really personal: Anonymous is claiming social security numbers, girlfriend pics, and more. [...]
quote:In this second bulletin, we're dumping booty pirated from a dozen Arizona police officer's personal email accounts looking specifically for humiliating dirt. This leak has names, addresses, phone numbers, passwords, social security numbers, online dating account info, voicemails, chat logs, and seductive girlfriend pictures belonging to a dozen Arizona police officers. We found more internal police reports, cops forwarding racist chain emails, k9 drug unit cops who use percocets, and a convicted sex offender who was part of FOP Maricopa Lodge Five.
We also hit the AZDPS spokesperson Stephen Harrison who been bragging to the news about how they are upgrading their security and how they will catch the evil hackers who exposed them. Clearly not secure enough, because we owned his personal hotmail, facebook and match.com accounts and dumped all his personal details for the world to see. The same fate will meet anyone else who tries to paint us as terrorists in an Orwellian attempt to pass more pro-censorship or racial-profiling police state laws.
quote:Security researchers discover 'indestructible' botnet
More than four million PCs have been enrolled in a botnet security experts say is almost "indestructible".
The botnet, known as TDL, targets Windows PCs and is difficult to detect and shut down.
Code that hijacks a PC hides in places security software rarely looks and the botnet is controlled using custom-made encryption.
Security researchers said recent botnet shutdowns had made TDL's controllers harden it against investigation.
The 4.5 million PCs have become victims over the last three months following the appearance of the fourth version of the TDL virus.
The changes introduced in TDL-4 made it the "most sophisticated threat today," wrote Kaspersky Labs security researchers Sergey Golovanov and Igor Soumenkov in a detailed analysis of the virus.
"The owners of TDL are essentially trying to create an 'indestructible' botnet that is protected against attacks, competitors, and anti-virus companies," wrote the researchers.
Recent successes by security companies and law enforcement against botnets have led to spam levels dropping to about 75% of all e-mail sent, shows analysis by Symantec.
A botnet is a network of home computers that have been infected by a virus that allows a hi-tech criminal to use them remotely. Often botnet controllers steal data from victims' PCs or use the machines to send out spam or carry out other attacks.
The TDL virus spreads via booby-trapped websites and infects a machine by exploiting unpatched vulnerabilities. The virus has been found lurking on sites offering porn and pirated movies as well as those that let people store video and image files.
Continue reading the main story
“Start Quote
It's definitely one of the most sophisticated botnets out there”
Joe Stewart
The virus installs itself in a Windows system file known as the master boot record. This file holds the list of instructions to get a computer started and is a good place to hide because it is rarely scanned by standard anti-virus programs.
The majority of victims, 28%, are in the US but significant numbers are in India (7%) and the UK (5%). Smaller numbers, 3%, are found in France, Germany and Canada.
However, wrote the researchers, it is the way the botnet operates that makes it so hard to tackle and shut down.
The makers of TDL-4 have cooked up their own encryption system to protect communication between those controlling the botnet. This makes it hard to do any significant analysis of traffic between hijacked PCs and the botnet's controllers.
In addition, TDL-4 sends out instructions to infected machines using a public peer-to-peer network rather than centralised command systems. This foils analysis because it removes the need for command servers that regularly communicate with infected machines.
"For all intents and purposes, [TDL-4] is very tough to remove," said Joe Stewart, director of malware research at Dell SecureWorks to Computerworld. "It's definitely one of the most sophisticated botnets out there."
However, the sophistication of TDL-4 might aid in its downfall, said the Kaspersky researchers who found bugs in the complex code. This let them pry on databases logging how many infections TDL-4 had racked up and was aiding their investigation into its creators.
quote:Anonymous Launches A WikiLeaks For Hackers: HackerLeaks
Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.
Earlier this week members of the hacker collective, and specifically a sub-group known as the People’s Liberation Front, (PLF) launched two new leaking sites, LocalLeaks.tk (not to be confused with the similarly named Localeaks.com) and HackerLeaks.tk. Both hope to receive documents through anonymous submission channel, analyze them, and then distribute them to the press to get “maximum exposure and political impact.”
But while LocalLeaks aims to use WikiLeaks’ model of insider sources to expose corruption on the local scale, HackerLeaks openly invites data thieves to upload documents through its submission system, so that they can be analyzed and publicized. “You download it, we’ll disclose it for you,” the site’s homepage reads, listing potential booty such as “databases, exploits, security flaws, documents, and email spools.”
On Tuesday, according to one of the hackers involved who goes by the name Commander X, the leaking site got its first submission: a list of the personal details of Orlando officials including addresses, home values, incomes and other data. That “leak,” which Commander X says was submitted anonymously to HackerLeaks but posted, confusingly, on LocalLeaks, comes as Anonymous has been in the middle of what it calls “Operation Orlando.” Since early Tuesday hackers have been launching attacks on Orlando-based targets including OrlandoFloridaGuide.com and the websites of the Orlando Chamber of Commerce and Universal Studios in retaliation for arrests of Orlando workers for the non-profit Food Not Bombs who lacked permits.
“These are the folks that wrote and are enforcing a very brutal law against very poor people,” Commander X, who says he is serving as the current “editor in chief” of the two sites, wrote to me over instant message. ”They themselves appear to be very very rich, so we thought we would point that out.”
And why is a leaking site necessary for hackers, who have lately used sites like Pastebin to publish information on their own? Commander X argues that Anonymous and the PLF already have connections to press that can help better expose important data, and that they hope to also provide “unique and enlightening analysis.”
“We just wanted to make our own offering, compete in the disclosure marketplace and maybe fill a unique role if we can,” writes Commander X. He argues that part of that unique role is that HackerLeaks will be legal, despite publishing hacked materials. “We don’t obtain this material. We merely publish it. This violates no sane law anywhere.”
That’s an argument that sound much like the one used by WikiLeaks, which has also published hacked data including Sarah Palin’s emails and East Anglia University’s stolen emails related to climate change.
But that legal stance may be a tough sell for Commander X of all people. Although he refused to comment on whether he had engaged directly in illegal hacking, he describes himself as “field commander of a global cyber militia” and says that he has had some part in Anonymous operations that have involved attacks on Visa, MasterCard, and PayPal in retaliation for their severing ties with WikiLeaks, as well as attacks on the governments of Tunisia, Iran, and Egypt.
Commander X was also named by HBGary Federal chief executive Aaron Barr in a planned presentation to out Anonymous’ leaders. But Barr misidentified Commander X, who tells me is a “50ish” American hacker, as Ben De Vries, the founder of a Facebook group called Global Strike 2011. Barr’s digging incited Anonymous to attack HBGary Federal, dumping thousands of its emails in February on a site called AnonLeaks, Anonymous’ first experimentation with a WikiLeaks-like interface. Barr resigned later that month. Commander X says he wasn’t involved in the HBGary hack.
Commander X’s subgroup of Anonymous isn’t the only one that’s getting into the leaking game. The last release from the hacker group LulzSec included half a gigabyte of data from AT&T that has been reported to have come from an insider source at the company.
As part of its ongoing campaign known as AntiSec, aimed at exposing corporate and government data and humiliating security firms, one Anonymous twitter feed suggested earlier this week that leakers contact the group over IRC to spill insider secrets: “If you are working for a corrupt government/company: Leak the data.”
quote:Report: FBI Raids Home of Woman With LulzSec, Anonymous Ties
When LulzSec closed up shop over the weekend, there were questions as to whether they were running from the authorities. Though no LulzSec-specific arrests have been made, it appears that U.S. authorities are actively pursuing those carrying out these types of hacks.
In an interview with Gawker, 29-year-old Laurelai Bailey said her Iowa home was raided last week by FBI agents looking for dirt on hackers with whom Bailey had been associating. The agents were reportedly looking into the February cyber attack on HBGary Federal carried out by Anonymous.
Bailey said the FBI was there for five hours, and took hard drives, a camera, and other equipment. The agents also asked her if she could infiltrate the hacking community, indicating a particular interest in a hacker known as "Kayla." As far as LulzSec goes, however, Bailey is not exactly their favorite person because she leaked the IRC logs detailing the HBGary Federal attack.
The reported Twitter account for "Kayla" includes a message that says users reaching the feed via Gawker "just got trolled." The LulzSec Exposed blog also claims the raid never happened.
Bailey denied being involved in any illegal hacking activity.
Among one of LulzSec's final targets, meanwhile, was the Arizona Department of Public Safety. In a Monday statement, the agency said LulzSec's demise does not mean it will stop its investigation.
"While the department noted that LulzSec has decided to disband, it does not diminish the intrusion into the privacy of our officers and the release of sensitive information. Nor does this relieve them of their criminal responsibility which may include both federal and state charges," the department said.
The department's email system was compromised during the week of June 20, and data from that system was posted online. "There is no evidence the attack has breached the servers or computer systems of DPS, nor the larger state network. Likewise, there is no evidence that DPS records related to ongoing investigations or other sensitive matters have been compromised," officials said.
At this point, remote access to DPS email remains frozen and the agency now has 24-7 monitoring of its Internet gateway.
For more, see PCMag's Guide to Knowing Your Hackers, as well as 50 Days of Mayhem: How LulzSec Changed Hacktivism Forever, and Did LulzSec Change the Hacking Game, or Just Get Lucky?
Update: The Anonymous collective on Wednesday released a new batch of data stolen from the Arizona Department of Public Safety, which includes everything from Social Security numbers to voicemails.
For more from Chloe, follow her on Twitter @ChloeAlbanesius.
Het artikel gaat verder.quote:Google is Your Friend - If You're a Lulzer
While the digital paparazzi were lined up waiting to snap photos of the Lulzboat crew getting vanned, some of us focused on how this collection of low tech script kiddies were able to knock over SONY, AT&T, the CIA, Arizona's DPS and numerous other sites and make off with highly confidential contents again and again.
It turns out that they had an accomplice, Google. Now before the good townspeople grab their torches and pitchforks and beat a hasty path to Mountain View, let it be known that Google's part in these massive hacks isn't actually Google's fault.
Or perhaps it can be if the public still wants to blame them anyway and question why this information is there on Google for the taking in the first place. But that's not really the issue at all.
The blame in my opinion lies once again with the administrators of the sites which were attacked. Google merely indexed the available booty for the lulzers and others and left the cardboard box on the curb where it could be picked up by anyone who drove by.
After all, page crawls weren't considered privileged information - they're all part of the "public internet" available to anyone who drops by.
How could this be? How could Google allow these kids to troll the internet and easily locate SQLi vulnerabilities or remote logins, passwords or even entire databases for the taking without any real effort at all? Simple.
A little thing known as SEO, sitemaps and the little spiders that go bump in the night. Let's look at the problem, along with a few specifics since the bad guys have been doing this for years and years and it's not a secret at all. Then I will explain what site admins can do to see to it that this information is not left at the curb any longer.
The problem:
Copy and paste the following into a Google searches in a new window. I'll wait:
filetype:sql hotmail gmail password
or
inurl:"login.(asp|php) inurl:"id=1"
You can try the above and substitute any of these too:
* userid=
* index=
* form=
* username=
You might even see some major security companies and governments turn up in there. For extra credit, use the "site:your website url here" and see what comes up on yours!
THIS is what the script kiddies do when they do their Google drive-bys. The victims of lulzsec and others fell because of such simple Google searches, and they're made even easier when you have a target URL in mind to play "anybody home?"
As long as Google has it in their indexes, and you know the keywords to search for sites, then it certainly isn't "nuclear brain science" when an injectable site is found.
There's plenty of tools to automate the attacks on the database behind the site once you know how to POST or GET to it. I've seen apologists claim "we don't use MYSQL."
Rest assured that there are exploit GUI's readily available for PostgreSQL, MSSQL and Oracle as well as lesser and older databases. If it's there, and they can find it, and they can talk to it, and you're not properly filtering what can get to it, your site could very well be the next breaking news story.
Er was inderdaad een virusmelding... alleen kwam dat door een gecrackte WinRAR die er op de bijgesloten AT&T bootable ISO zat (die dus blijkbaar door AT&T techs werd gebruikt)....quote:
Public paste! Anonymous Communique - Operation Orlandoquote:Anonymous, Food Not Bombs to test Orlando police Monday by feeding homeless
Hacker activists with the protest group "Anonymous" have in recent weeks taken down over a half-dozen major Orlando, Florida-based websites and spammed tens of thousands of unsolicited faxes all over the city as a response to an ordinance that prohibits feeding homeless people in public parks.
In a release Friday on the progress of what they called "Operation Orlando," the group insisted that its efforts were in no way connected to the activists with Food Not Bombs (FNB), who've been arrested for feeding the homeless in a city park.
Keith McHenry, who helped found the group 30 years ago, was arrested last week and is still imprisoned. McHenry's view is that food is a right, not a privilege, so he and the group refused to abide by the law.
In response to the arrests, Anonymous toppled the websites of the Orlando Chamber of Commerce, the Orlando International Airport, Orlando's fraternal Order of Police, the mayor's reelection site and two popular tourist and events websites featuring the city's attractions.
They have also sent an image (pictured) of Walt Disney mascot Mickey Mouse, face covered by a Guy Fawkes mask, to tens of thousands of fax machines and Orlando-based email addresses, in an effort to drum up support for feeding the homeless.
"[The] Mayor has called us criminals and terrorists," the hackers wrote, in an advisory. "We'll own the criminal label. All revolutionaries are by definition criminals."
They added that they hoped to "follow in the footsteps" of Dr. Martin Luther King, Jr. by creating "a way to wage war peacefully," which they believe to have accomplished. They also demanded that McHenry be released and the city's ordinance be repealed, or they would continue their hacking campaign.
Anonymous's release also noted that FNB plans to be out in Orlando at 9 a.m. on Monday, July 4, to continue their work by feeding homeless people in the park -- publicly flouting the city's law, which could cause officers to swoop in and make arrests.
"Come to protest, or to serve food with FNB," Anonymous urged. "Or bring your own tables and food and serve beside them. [We] call upon all our brother and sister Anons in Florida to don your masks and do the same."
quote:http://paste2.org/p/1499524
So, this is a little ironic. Here is inside details of florida voting systems. Now.. who still believes voting isn't rigged? If the United States Government can't even keep their ballot systems secure, why trust them at all? FAIL!
quote:Florida voting database leaked, can they keep anything safe?
Florida has seen its 2nd leak today, 1st being here with both leaks being done by @Abhaxas via twitter.
This one is from the voting system and consist of candidates , races , poll worker users details, voter stats and is dated upto 2010. Although it may not be totally vital now, it gives an insight to the operations that go on behind the scenes and the people involved.
This just goes to show how unsecure so many government office’s are and they need to learn a big lesson and start protecting the clients information and data about the companys and its business actions.
Orginal post here:
http://pastebin.com/CCN3u7CV
or
http://paste2.org/followup/1499524
quote:#OPesr; Anonymous files Lawsuit against the FED
This is a message from Anonymous to you.
We cordially invite any and all, Anonymous and non-anons, to join OpESR in demanding Federal Reserve accountability.
We are crafting a class action lawsuit against the Fed.
Can you provide legal and research support?
Please respond by submitting a http://typewith.me pad to one of our *connectors in Anonymous.
If you can help us, get in contact with one of our *connectors by logging into our public chat area at: http://A99.FSS34.COM
This is a class action lawsuit against the private Federal Reserve Bank and it's shareholders.
It falls under the Racketeer Influenced and Corrupt Organizations (RICO) Act of 1970 for criminal acts of Fraud, Usury, Conspiracy to commit Grand Larceny and Theft by Deception, and for systematically looting the Treasury of The United States of America for a total that has yet to be determined.
For nearly 100 years, The Federal Reserve Bank has debased and debauched our currency by illegally authorizing an ODIOUS DEBT to be encumbered by our citizens without their knowledge, or in any way for their collective benefit.
The Fed, allowed Banks to defraud the American public, so as to leave them living like refugees in their own land. This ruthless cabal now has the temerity to pass off this ODIOUS DEBT to the American people, thereby destroying not only our future, but Americas' ability to be a free, sovereign nation.
The US Constitution says we have to go against domestic enemies.
The Fed, allowed this crisis to happen, they allowed banks to kick you out of your homes to pay their bills.
The Fed, allowed people to live on the streets, hungry.
And the Fed, got paid for it.
Something is very wrong, don't you think.
So, are you going to stay seated in front of your TV, PC or whatever and let them do whatever they want?
COME ON! WAKE UP AMERICA!!!
DO SOMETHING, NOT JUST FOR YOU, BUT FOR YOUR SOCIETY!
For your children, for your children's children!
Or they are destined to be enslaved by a fraudulent national debt created by the greed of the 1.
So, Anonymous or not, it doesn't matter.
What we ask is that you spread the Truth and take ACTION!
WE ARE ANONYMOUS.
WE DO NOT FORGIVE.
WE DO NOT FORGET.
EXPECT US."
Desinformation is a wonderfull thing.quote:On More Effective Doxing
N.B. This is largely in response to LulzSec Exposed (Team Web Ninjas) post about Gawker’s Adrian Chen getting information wrong.
I dislike writing tl;dr sorts of things, but I felt that it was necessary to say something. I realize that there are many people out there who are currently engaged in the hunt for LulzSec/#antisec/Anonymous and are publishing various dox in the hopes of outing members so that they will stop their activities and/or are arrested. However, there has been a plethora of both misinformation and disinformation spread regarding the identities of these people. While I understand the desire to uncover some truly useful information and reveal it in the showiest way possible, there is an important consideration to be made: whether or not those dox are actually correct. There are a number of people who have, for whatever reason, been incorrectly doxed as members of LulzSec/Anonymous/whatever else and have been harassed as a consequence. I believe that the continued spread of incorrect dox will only contribute to additional collateral damage. There are some simple things that any researcher can do to help stem the flow of misinformation and make the doxing process more effective for everyone.
quote:AnonymousIRC AnonymousIRC
We've been sitting on pepper.nl database for a while. Didn't want to abuse it but if we have it, someone worse has, too. Better tell you.
Nu zal er vast een zeker een onderzoek komen naar wie de hackers zijn etc etc. Maar zullen ze nu ook onderzoek gaan doen naar pepper.nl die gewoon zeer slecht zijn omgegaan met de persoonlijke gegevens van hun users?quote:AMSTERDAM - Hackersgroep AnonymousIRC, ook wel gezien als de opvolgers van LulzSec, hebben datingsite Pepper.nl gehackt. De site is onderdeel van RTL.
De gegevens van ruim 53.500 personen zijn openbaar gemaakt, meldt Webwereld. Op internet is een lijst geplaatst met gebruikersnamen, e-mailadressen en gecodeerde wachtwoorden.
AnonymousIRC zegt op Twitter dat ze Pepper.nl al een tijdje in de gaten hielden. "Als wij de gegevens hebben, dan zal een slechter persoon ze zeker ook hebben."
Op de website van Pepper.nl worden gebruikers geadviseerd hun wachtwoorden te wijzigen, ondanks dat de gehackte inloggegevens onbruikbaar zouden zijn voor buitenstaanders.
De datingsite is een betaalde service van RTL die gericht is op contacten met foto's. Uniek is dat gebruikers zelf mee hebben gebouwd aan de site.
Inperken schade
RTL reageert tegenover Webwereld dat de hack zondagochtend is ontdekt en dat men op zoek is naar de oorzaak. "We zijn nu vooral bezig met het inperken van de schade. De eerste prioriteit ligt bij onze klanten," aldus een zegsvrouw.
Naast de boodschap op de site krijgen klanten een e-mail met uitleg. Het Openbaar Ministerie is inmiddels een onderzoek gestart.
Is dat een misdrijf dan? Dan mogen ze Google, Microsoft, alle overheden en veiligheidsdiensten, Bank of America ook onderzoeken.quote:Op zondag 3 juli 2011 15:59 schreef YazooW het volgende:
[..]
Nu zal er vast een zeker een onderzoek komen naar wie de hackers zijn etc etc. Maar zullen ze nu ook onderzoek gaan doen naar pepper.nl die gewoon zeer slecht zijn omgegaan met de persoonlijke gegevens van hun users?
quote:http://webwereld.nl/nieuw(...)te-rtl---update.html
De wachtwoorden zijn wel gehashed, maar volgens kenners zijn de wachtwoorden redelijk eenvoudig te achterhalen. Wie kan inloggen, kan vervolgens de zeer privacygevoelige en persoonlijke berichten van de gebruikers lezen.
Ik weet niet of dat officieel een misdrijf is, maar ik zelf persoonlijk vind van wel. Als ik mezelf ergens aanmeld met mijn persoonlijke gegevens moet men er gewoon voor zorgen dat mijn gegevens niet gestolen kunnen worden. Een website is overigens nooit 100% veilig, maar bij pepper.nl schijnt het dat ze al langer die database hebben kunnen leegtrekken, het komt alleen nu pas naar buiten...quote:Op zondag 3 juli 2011 16:12 schreef Papierversnipperaar het volgende:
[..]
Is dat een misdrijf dan? Dan mogen ze Google, Microsoft, alle overheden en veiligheidsdiensten, Bank of America ook onderzoeken.
Wat me geen slecht idee lijkt overigens, maar symptoombestrijding is goedkoper natuurlijk.
1000+ sites gehacked.quote:RedHack Press Release 03/07/11
Our people from all nationalities and Revolutionary,
Democrat, Patriotic and Opposition Comrades,
Since 1997 our objective is, to be the “common voice” of revolutionaries in digital arena and have carried out our actions according to this strategy. On the anniversary of Sivas Massacre which took place on 2nd July 1993 and resulted in death of thirty-five intellectuals, singer, authors and poets; we have hacked hundreds of websites belongs to Adnan Oktar also known as Harun Yahya bigot and collaborating fascist websites in order to announce that we have not forgotten this massacre and will not let it be forgotten. We have also taken opportunity to highlight the censorship laws due to take effect in Turkey and strongly protest this. We deface 1000+ domain for anti-censorship
Adnan Oktar is responsible of forced shutdown of lots of sites in Turkey. He has send a police to the addresses of online dictionary writers and got them arrested just because they have criticised him. While we are engaged in the activities of AntiSec, it has been our honour to show our reaction in the name of our people, to stop this vile bigoted man who uses his estate and his money for his paranoid and fascist ideas. (WordPress.com has been blocked by Turkey 2007.) It has been our honour to show our reaction in the name of our people, to stop this vile bigoted man who uses his estate and his money for his paranoid and fascist ideas, while we are engaged in the activities of AntiSec.
These attacks have taken place to send a clear message to the authorities and the canines of the system that we are still strong and will do everything in our power to raise our voice against the censorship laws which are an attack to our human rights. We will act together with AntiSec and Anons to continue our fight against the hands that are reaching to silence our internet.
We will also announce the server data and the details of this hacking operation in the future.
Acronym of the defacement (hacking) text:
The Perpetrators of the Sivas Massacre are still amongst us!
We have not forgotten! We will ask for the account of this massacre!
It’s been 16 years since this massacre took place and the perpetrators are not far away from us, they are the ones who governs us.
Who are the murderers?
The President of Turkey Abdullah Gul; defender of 6th Navy Fleet of USA while they were poured out to the sea in 1969 by the revolutionaries.
Prime Minister of Turkey Recep Tayyip Erdogan, the servant of USA under oath, the loyal guard of Imperialism, the enemy of the working class of Turkey, ruler of Greater Middle East Initiative.
The murderers are the defenders of military coups, spokesperson of USA’s Moderate Islam project such as Feytullah Gulen and Adnan Oktar whose brains are full of pornography.
(Addressed to Adnan Oktar)
You believe you are a man by operating hundreds of websites that spreads groundless articles and claim that they are an “opinion” through stealing from ordinary people by using the religion. You act instantly to shut down the sites which are opposing you. We heard that you were so proud that your sites never been hacked. You have chosen a duty of silencing the opposition by hiding behind those in power and even send the security forces to addresses that criticise you. We have a duty to be against this and used our legitimate right of defence. You attack the common values of intellectuals by swearing at Darwin theory and Che Guevera, do you know who they are? Answer is clear, no you don’t you bigoted man. Put this in your mind Adnan Oktar, you have gone a step too far. The internet and this world are not unclaimed. Neither your people in power nor any of your forces are capable of stopping us. It is legitimate to resist against oppression and censorship.
quote:Anonymous OperationGreenRights Pressrelease: Bayer
To The Bayer AG Corporation:
Anonymous sees your crimes and will not let them go unpunished. You have won our attention after decades of greedy abuses of humanity and nature. Bayer‐ we see you profiting off of death and destruction! We see you escape unscathed from justice! Bayer AG pharmaceutical (formerly known as IG Farben) has been involved in countless corporate abuses, which have resulted in the death of thousands in the last century. These abuses have been consistently ignored, and cannot be ignored further. Bayer’s victims are diverse and widespread, however all these deaths have been as a direct result of Bayer’s exploitive nature. These abuses include: disregard to proper and thorough investigation of chemicals, vaccines and substances; the employment of Nazi war criminals; the destruction of the environment,
and much more. Anonymous places the following crimes and accusations at the feet of Bayer. We at Anonymous are here to make you more famous, Bayer; We want your name on the lips of lads and Lords.
The grim history of Bayer:
Wat wordt er bedoeld met 'disregard to proper and thorough investigation of chemicals, vaccines and substances'? Lekker vaag en zijn er niet veel meer bedrijven die dat doet?quote:These abuses include: disregard to proper and thorough investigation of chemicals, vaccines and substances; the employment of Nazi war criminals; the destruction of the environment, and much more
quote:Music Rights Groups Raided By Police, Bosses Arrested For Fraud
In a massive operation, Spanish music rights and anti-piracy groups SGAE and SDAE have been raided by more than 50 police officers and tax officials. Operation Saga is the culmination of a two-year investigation into embezzlement, fraud, and misappropriation of funds, the latter connected to SGAE and SDAE collecting money on behalf of artists and spending it with companies they have interests in. The president of SGAE was among 9 people arrested.
quote:Fox News's hacked Twitter feed declares Obama dead
Rogue 4 July tweets on TV news channel's politics service go viral but Fox News is apparently back in control
Fox News has apparently fallen victim to hacking, with its politics Twitter feed repeatedly announcing President Barack Obama had been shot dead.
@foxnewspolitics began tweeting the information to its 33,000 followers at about 2am local time, with the posts rapidly being shared around the internet.
The rogue tweets appeared to begin after the account sent a message saying Fox had just "regained full access to our Twitter account".
The following tweets all related to the supposed death of Obama, with some posts being very specific about the president's injuries.
"@BarackObama has just passed. The President is dead. A sad 4th of July, indeed. President Barack Obama is dead," came the first tweet. The string of messages continued:
"@BarackObama has just passed. Nearly 45 minutes ago, he was shot twice in the lower pelvic area and in the neck; shooter unknown. Bled out", and then: "@BarackObama shot twice at a Ross' restaurant in Iowa while campaigning. RIP Obama, best regards to the Obama family."
Whatever the hoaxer's identity, they do not appear to have been entirely web-savvy. The first three posts revealing the president's death were directed to the @BarackObama Twitter feed, meaning only those following both accounts would have seen the messages.
The unknown tweeter appeared to realise the error of their ways, switching tack to post three more tweets that would have been seen by all followers:
"#ObamaDead, it's a sad 4th of July. RT to support the late president's family, and RIP. The shooter will be found;
"BREAKING NEWS: President @BarackObama assassinated, 2 gunshot wounds have proved too much. It's a sad 4th for #america. #obamadead RIP;
"We wish @joebiden the best of luck as our new President of the United States. In such a time of madness, there's light at the end of tunnel."
Fox News was not immediately available for comment.
Ik vind het kwalijkste eigenlijk dat die hackers die e-mailadressen gewoon online hebben gegooid.quote:Op zondag 3 juli 2011 15:59 schreef YazooW het volgende:
[..]
Nu zal er vast een zeker een onderzoek komen naar wie de hackers zijn etc etc. Maar zullen ze nu ook onderzoek gaan doen naar pepper.nl die gewoon zeer slecht zijn omgegaan met de persoonlijke gegevens van hun users?
Dan is het idd geen hacking meer....quote:Op maandag 4 juli 2011 10:51 schreef remlof het volgende:
[..]
Ik vind het kwalijkste eigenlijk dat die hackers die e-mailadressen gewoon online hebben gegooid.
Unethic hacking is zo not done.
Ik ben bang dat de cyber-oorlog die is losgebarsten, net als conventionele oorlogen, gepaard gaat met schendingen van het oorlogs-recht.quote:Op maandag 4 juli 2011 10:51 schreef remlof het volgende:
[..]
Ik vind het kwalijkste eigenlijk dat die hackers die e-mailadressen gewoon online hebben gegooid.
Unethic hacking is zo not done.
Normaal worden je gegevens gestolen en kom je er zelf waarschijnlijk nooit achter dat iemand anders jou gegevens heeft. Dankzij deze kids die de laatste alles hacken wat maar te hacken valt, en vervolgens alle gestolen data gewoon online zetten ziet de grote massa wel dat het slecht gesteld is met de beveiliging van de gemiddelde internetsite.quote:Op maandag 4 juli 2011 10:51 schreef remlof het volgende:
[..]
Ik vind het kwalijkste eigenlijk dat die hackers die e-mailadressen gewoon online hebben gegooid.
Unethic hacking is zo not done.
Als ik de berichten mag geloven over wat ze eigenlijk doen, zie deze post, kan iedereen het en is er op veel sites eigenlijk geen beveiliging.quote:Op maandag 4 juli 2011 14:11 schreef YazooW het volgende:
[..]
Normaal worden je gegevens gestolen en kom je er zelf waarschijnlijk nooit achter dat iemand anders jou gegevens heeft. Dankzij deze kids die de laatste alles hacken wat maar te hacken valt, en vervolgens alle gestolen data gewoon online zetten ziet de grote massa wel dat het slecht gesteld is met de beveiliging van de gemiddelde internetsite.
Dit alles zal denk ik alleen maar positieve invloed hebben op de beveiliging van internet sites, het is natuurlijk zeer slechte reclame voor je site als je database leeg getrokken wordt en vervolgens online wordt gezet. Verder zal de gemiddelde gebruiker ook wel even beter nadenken wat voor persoonlijke gegevens hij plaatst op welke sites.
Havij in combinatie met de google zoekterm: &id=1 (of elk ander willekeurig nummer achter het = teken) en je kan in een paar uurtjes tijd zo een paar databases "hacken".quote:Op maandag 4 juli 2011 14:41 schreef Papierversnipperaar het volgende:
[..]
Als ik de berichten mag geloven over wat ze eigenlijk doen, zie deze post, kan iedereen het en is er op veel sites eigenlijk geen beveiliging.
Ja, en het probleem is dus dat dat zo makkelijk is, omdat veel sites totaal geen beveiliging hebbenquote:Op maandag 4 juli 2011 14:51 schreef YazooW het volgende:
[..]
Havij in combinatie met de google zoekterm: &id=1 (of elk ander willekeurig nummer achter het = teken) en je kan in een paar uurtjes tijd zo een paar databases "hacken".
quote:Ook jij staat in superdatabase van Brits bedrijf
Het Britse conglomeraat WPP heeft een database gemaakt met daarin de profielen van 500 miljoen internetters. De superdatabase, naar eigen zeggen de grootste ter wereld, heeft een dekking van bijna 100 procent van de Nederlanders die online zijn. Kom je op internet, dan weet dit bedrijf wat je doet en wie je bent.
WPP bestaat uit een groot aantal reclame- en communicatiebedrijven, die op hun beurt weer samenwerken met derden, waaronder internetgiganten als Google. Het verzamelt informatie over internetters bij bezoek aan bepaalde websites. Leeftijd, geslacht, interesses, koopgedrag, soms zelfs huisadressen, zijn enkele zaken die WPP registreert en doorverkoopt aan veel grote adverteerders.
Of in de toekomst 100 procent van de Nederlandse internetters geregistreerd blijven in de gigantische database, is nog maar de vraag. De Tweede Kamer ging onlangs akkoord met de nieuwe Telecomwet. Daardoor is ook formeel vastgelegd dat er strengere eisen worden gesteld aan websites voor het plaatsen van cookies op de computer van de internetgebruiker. Met cookies, kleine tekstbestanden, worden gegevens over het surfgedrag en persoonlijke voorkeuren van internetgebruikers geregistreerd. Ook kan zo worden bijgehouden welke producten door internetters in een winkelwagentje zijn gedaan. WPP werkt met cookies, maar ook met andere technieken om aan data over internetters te komen.
'Op internet zijn veel websites gratis, omdat adverteerders hun boodschap willen communiceren', zegt directeur Brian Lesser van Xasis, het bedrijf dat voor WPP de database beheert, in The Independent. 'Wij ondersteunen deze interneteconomie om deze bedrijven hun doelgroep te geven.' Volgens Lesser zijn alle gegevens geanonimiseerd.
Privacy-belangenorganisatie Electronic Frontier Foundation (EFF) is toch ongerust. 'Als je weet welke websites iemand bezoekt is het vrij eenvoudig om achter de identiteit van die persoon te komen', zegt John Buckman van EFF. Volgens de organisatie zou de superdatabase ook zeer interessant zijn voor hackers.
quote:NATO Server Hacked by 1337day Inj3ct0r and Backup Leaked !
Team Inj3ct0r ( 1337day ) claim to hack Apache Tomcat Version 5.5.9 of NATO. The North Atlantic Treaty Organization or NATO also called the (North) Atlantic Alliance, is an inter governmental military alliance based on the North Atlantic Treaty.
They Leak a Backup of Random 2,646 files from Server as Proof of Hack . The archive uploaded by hackers is available at http://www.mediafire.com/?s2chp1v2jqsf52z .
We talk to Team Inj3ct0r about this hack They said :1.) The Reason of Hacking is “Nuclear weapons. its development and financing”2.) They hack Tomcat 5.5 Server using 1337day privat exploit (0day) .3.) They get the root privilege to the Server.4.) They are able to Deface the website of NATO also, but they will not do this. They have just take the backup of server and trying to distribute that on Internet.
Als je een beetje een leek bent zou je denken dat ze een Apache helikopter hebben gehacktquote:
Apache Tomcat Version 5.5.9quote:Op dinsdag 5 juli 2011 12:31 schreef YazooW het volgende:
[..]
Als je een beetje een leek bent zou je denken dat ze een Apache helikopter hebben gehackt![]()
Ze geven goeie service?quote:Valt trouwens wel op dat die geuploade bestanden met daarin de gestolen data altijd behoorlijk lang nog op die file hosting sites blijft hangen...
Maar de leugens van Fox-news zelf zijn geen probleem?quote:Amerikaanse Secret Service jaagt op hacker Fox News
De Amerikaanse Secret Service, belast met de bewaking van president Barack Obama, onderzoekt de zes valse tweets over een moord op Obama. Een woordvoerder van de Secret Service heeft dat gisteren (lokale tijd) gezegd.
Hackers verstuurden de tweets gisteren, nadat ze de Twitteraccount van de populaire tv-zender Fox News hadden gekraakt. Een zekere 'Script Kiddie' schreef dat Obama was gestorven door twee kogels. Fox News kon de valse mails pas 10 uur later verwijderen.
quote:Italian police are the latest to make arrests in connection to hacking collective Anonymous, according to reports from the country today.
32 dawn raids were carried out, including one across the border in the Swiss region of Ticino. Following the raids, three people including one minor were arrested.
The raids follow police action in Spain last month, which saw another three suspects arrested in connection with the hack which brought down Sony’s Playstation Network for several weeks. It’s unclear if the Italian arrests relate to the same incident or not, but police are reportedly claiming to have grabbed an alleged “ringleader” going by the nickname of Frey – an Italian 26 year-old living in Switzerland.
TechEye reports a statement from Italian police, which downplays Anonymous’ hacking skills.
Out of all of the current hacker groups, Anonymous is the largest, but is also populated by the least technical people. Some of its members carry out attacks using software downloaded from the Internet and do not carry out the most basic attempts to secure their IP address.
We’re expecting more details of the arrests to emerge throughout the day and we’ll update this story as and when we hear more.
"Ringleaders"? Zoals die autistische Engelse jongen die een IRC-kanaal runde?quote:Op dinsdag 5 juli 2011 16:23 schreef joepie91 het volgende:
http://thenextweb.com/eu/(...)talian-police-raids/
[..]
Mja, je moet toch wat als je als landelijke politiemacht niet voor lul wilt staan omdat je een organisatie die geen organisatie is niet aankunt?quote:Op dinsdag 5 juli 2011 17:05 schreef Papierversnipperaar het volgende:
[..]
"Ringleaders"? Zoals die autistische Engelse jongen die een IRC-kanaal runde?
Zelfs met de afgelopen dox-campagnes zijn er geen serieuze hackers gepakt.
Governments are afraid of their people.quote:Op dinsdag 5 juli 2011 17:29 schreef joepie91 het volgende:
[..]
Mja, je moet toch wat als je als landelijke politiemacht niet voor lul wilt staan omdat je een organisatie die geen organisatie is niet aankunt?
Mja goed, het werd eens tijd dat dat het geval was...quote:Op dinsdag 5 juli 2011 17:31 schreef Papierversnipperaar het volgende:
[..]
Governments are afraid of their people.
quote:Op dinsdag 5 juli 2011 17:32 schreef joepie91 het volgende:
[..]
Mja goed, het werd eens tijd dat dat het geval was...
quote:PyroBatNL
De gegevens van de politiebond: phttp://pastebin.com/y0VVMkPv politiebond.nl is gehackt door leden #AnonOps
19 minutes ago
http://www.pastie.org/private/h6zibmouxbasvdhjzcdtvgquote:lysgu Lsygu Ntpfor
look who's back RT “@_TeaMp0isoN_ As I previously tweeted: Retweet this for #anonops IRC, proof we're not dead - pastie.org/private/h6zibm…”
quote:FBI Raids Home of Ohio Man Linked to Hacker Group
U.S. authorities raided the home of a Hamilton, Ohio, man who appeared to have links to the hacker group LulzSec, as a probe into recent high-profile computer attacks gained momentum.
Agents from the Federal Bureau of Investigation searched the home Monday, an FBI spokesman confirmed without providing any further detail. A person close to the matter said the arrested man is an alleged LulzSec member.
U.S. authorities in recent months have conducted dozens of searches as part of investigations into Anonymous, a loosely knit group of cyber activists, and splinter group LulzSec.
The groups have claimed responsibility for a number of attacks against companies and government organizations. That has prompted a global law-enforcement crackdown on the groups that has included waves of arrests across Europe and in Turkey.
British police, who are cooperating with the FBI, have made seven arrests this year as part of their probe. That includes 19-year old Ryan Cleary who had been a prominent figure in Anonymous and then LulzSec. U.K. prosecutors last week charged him with five computer-related offenses. Authorities allege he infected computers in order to form a computer network, called a botnet, that he then used to launch online attacks against websites including that of the Serious Organised Crime Agency, a U.K. equivalent of the FBI.
Essex-based Mr. Cleary, who is out on bail, is co-operating with police, his lawyer said. The lawyer added that Mr. Cleary has been diagnosed with Asperger syndrome, a form of autism. The other six individuals arrested in the U.K. have been released on bail and haven't been charged.
LulzSec recently claimed to identify a couple of individuals it said had "tried to snitch" on the group. LulzSec appeared to reveal the full names, addresses and other contact information of two U.S. men it said were involved in criminal hacks. That included details of a person going by the nickname "m_nerva" who LulzSec claimed came from Hamilton, Ohio.
The individual identified by LulzSec, who apparently had a falling out with the group, couldn't be reached for comment.
LulzSec recently said it was ending its campaigns under that banner, but members have since joined a group within Anonymous called "AntiSec," short for "antisecurity."
Anonymous is well-known to U.S. law enforcement. By late last year, the FBI was investigating attacks by Anonymous members against the movie and recording-industry when the group also started targeting individuals and organizations that had tangled with document-sharing website WikiLeaks.
In January, FBI agents conducted searches of more than 40 residences across the U.S. No arrests were announced following those searches. The bureau is also probing subsequent hacks, including of Sony Corp. and HBGary Federal LLC, and an attack on FBI-affiliated organization InfraGuard. The FBI spokesman declined to comment on the probe.
In April, the FBI raided the home of Darrin Lantz in Gig Harbor, Wash., according to court filings. Authorities suspect Mr. Lantz was involved in an Anonymous campaign against websites belonging to Gene Simmons, of rock band Kiss, in retaliation for anti-piracy comments he made, court filings say.
Authorities say the attacks knocked Mr. Simmons's websites offline for 36 hours, causing tens of thousands of dollars in damage as a result of downtime and costs associated with changing computer servers and website hosts. During one strike, Mr. Lantz's computer attacked a website 48,471 times during a 47-minute period, authorities said.
Mr. Lantz, who hasn't been charged, didn't respond to a request for comment.
Mhmm, random bestandje wat ergens (publiek) gehost was. Was bedoeld om gemakkelijk de config naar alle servers te kunnen wgetten. Niet bijzonder boeiend... gewoon de zoveelste keer dat iemand beweert een server "geroot" te hebben, terwijl ie gewoon z'n info ergens anders vandaan heeft.quote:Op dinsdag 5 juli 2011 17:48 schreef Papierversnipperaar het volgende:
Joepie91, je staat er in
[..]
http://www.pastie.org/private/h6zibmouxbasvdhjzcdtvg
Veel geblaat, weinig wol. Ryan had vrijwel niets met Lulzsec te maken en was zeker geen "prominent lid", en de raid op Laurelai was waarschijnlijk een onzinverhaal (oftewel misinfo).quote:
Ik postte het dan ook vooral omdat er in staat dat er verder niemand is aangeklaagd. Allemaal loze arrestaties. En die Ohio man lijkt door Lulzsec gegeven te zijn.quote:Op dinsdag 5 juli 2011 18:40 schreef joepie91 het volgende:
Veel geblaat, weinig wol. Ryan had vrijwel niets met Lulzsec te maken en was zeker geen "prominent lid", en de raid op Laurelai was waarschijnlijk een onzinverhaal (oftewel misinfo).
Wacht, kan zijn dat die in Ohio m_nerva was, en niet Laurelai... m_nerva was inderdaad gedoxt door Lulzsec voor zover ik weet, en heeft idd een bezoekje van de FBI gehad. Laurelai was al eerder aangewezen door Anonymous (ivm de puinzooi die hij/zij aangericht had met Anonleaks), maar die is dus niet geraid, en heeft zelf waarschijnlijk misinfo lopen verspreiden.quote:Op dinsdag 5 juli 2011 18:42 schreef Papierversnipperaar het volgende:
[..]
Ik postte het dan ook vooral omdat er in staat dat er verder niemand is aangeklaagd. Allemaal loze arrestaties. En die Ohio man lijkt door Lulzsec gegeven te zijn.
quote:Leaked proposals reveal UK web censorship plans
Result of closed-door discussions
Ed Vaizey, the UK's Minister for Culture, Communications and Creative Industries, has been taking part in closed meetings with copyright lobbyists, apparently working on a proposal that could amount to internet censorship.
Leaked online, the proposed "voluntary website blocking" scheme would "inhibit access to specific sites" based on the opinions of "expert bodies" and through shotgun court hearings.
Ed Vaizey has already admitted in parliament that he has held a number of roundtables with ISPs but public interest organisations like the Open Rights Group who asked to attend the meetings were denied access.
Industry bias
The document relates to copyright infringement, but has also been linked to online child safety and there are fears that it could become a one-stop-censorship-shop for anything this "expert body" deems inappropriate.
Other rights-holding organisations involved in the talks include the Football Association, the Publishers Associations, the Motion Picture Association and music industry execs.
While these organisations are keen to protect their own content and stamp out online piracy, rights infringement and plagiarism, the fact that only one group with the interests of the average consumer have been invited to participate in just one session poses a real concern.
Access to the open internet is gradually becoming a human rights issue, and taking on only the views of a biased few when discussing actively blocking websites could have longterm repercussions for Brits.
Human rights
The Digital Economy Act has already proposed blocking sites for copyright infringement, but it's an act that has been the subject of much debate and concern among web-users and some ISPs.
As the Open Rights Group says, "Open policy making that takes on board the broadest range of views is not something within the gift of politicians but a responsibility they bear."
"It is critical that policy making happens through a broad and open public debate, especially on matters that so tangibly affect rights such as access to information and freedom of expression.
"This is not simply about the rights of 'sites that facilitate infringement' or those running them. It is about the processes through which decisions are made about what you are allowed to see and do. Clumsy, quasi-judicial and unaccountable website blocking is dangerous for exactly that reason."
Via BoingBoing
Read more: http://www.techradar.com/(...)969390#ixzz1RFa6X5uT
Disinformation is a wonderfull thing.quote:Op dinsdag 5 juli 2011 18:45 schreef joepie91 het volgende:
[..]
Wacht, kan zijn dat die in Ohio m_nerva was, en niet Laurelai... m_nerva was inderdaad gedoxt door Lulzsec voor zover ik weet, en heeft idd een bezoekje van de FBI gehad. Laurelai was al eerder aangewezen door Anonymous (ivm de puinzooi die hij/zij aangericht had met Anonleaks), maar die is dus niet geraid, en heeft zelf waarschijnlijk misinfo lopen verspreiden.
Ik ben even kwijt welke van de twee in Ohio woonde
quote:Exclusive first interview with key LulzSec hacker
[quote]It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting laughter at the victim of a prank. For 50 days until it disbanded, the group's unique blend of humour, taunting and unapologetic data theft made it notorious. But knowing whether LulzSec was all about the "lulz" or if it owed more to its roots as part of Anonymous – the umbrella group of internet subculture and digital activism – was pure speculation. Until now.
quote:http://pastebin.com/TvSxycCf
To all friendly and enemy vessels,
Today we want to introduce you to Nimbuzz, a Dutch company providing a free
mobile messaging application carrying the same name. This company is not
situated in just the Netherlands as they have offices in Argentina, India,
Indonesia and all over Europe. So why does this company interest us? Well,
simply put, they are capable and self-admittingly willing to co-operate with
governments to help censor the public's use of the very service they offer.
Now it should be noted that some of our blackhat friends who are extensively
involved in the AntiSec movement have had access to this company's networks for
some time. Their access to this network is best described as complete access to
everything in their network including all of their source code on Nimbuzz's svn
server. The gross incompetence of the security model put in place for this
server astounded even us.
We have access to many many networks and because of this we have to prioritize
what is of interest or use to us (or you, the public that we love so much).
However, we had some friends bring it to our attention that this Nimbuzz
company is actually enacting policies that directly go against everything
Antisec stands for. Thus, here we are.
To prove that we aren't making this up here is a document in their CMS
displaying the procedure of how, if requested, they can switch off VOIP
services BY GOVERNMENT REQUEST. A quote from the document:
"In some countries governments and/or operators have reasons for not allowing
VoIP over (mobile) data networks. They may use technical means to active
block and / or throttle the Nimbuzz traffic over their network. This results
in total, partial or severe Nimbuzz service degradation towards the end-user.
When these cases are known, Nimbuzz will open dialogue with the
government/operator. Aim is to resolve the service degradation and restore
quality of service. In return for allowing Nimbuzz service to run properly,
we can offer to switch of VoIP calls on this operator network."
The document goes further to state that Nimbuzz currently blocks all VOIP
traffic in Syria and Egypt and even includes specific data such as IP ranges
given by providers.
This is entirely unacceptable and let's make this perfectly clear:
We DO NOT tolerate any kind of censorship of communication.
We DO NOT tolerate companies working in collusion with governments to stop the
free flow of information
We WILL expose these companies to the public to show how their information can
be manipulated and censored by the governments and corporations that work with
them
Thus, we release the document mentioned above in full as well as some other
information from their CMS. As a bonus we have also acquired some code from the
/trunk directory on their svn. In total we downloaded over 120 Gigabyte of
source code but will not release it..yet.
Take heed, governments that seek to oppose the people who elect them and the
corporations who the people work for - We will not stand idly by while you take
away our electronic and physical freedom.
"People should not be afraid of their governments. Governments should be afraid
of their people."
FILE VIEW/DOWNLOAD:
VOIP Block CMS Site: http://pastehtml.com/view/azgwu5ol2.html
AntiBuzz.rar (4.25 MB): http://www.mediafire.com/?zj9q7gng34ptais
Mirrors available soon, also to be included in next torrent release. Let it flow!
quote:2011-07-05 LocalLeaks and HackerLeaks Press Release
First we would like to thank the global media for being so attentive to the launch of our two new disclosure platforms. We would also like to thank the several dozen people who already trusted us with their sensitive leaks. It has been a remarkable week for those of us who staff these two important projects. None of us ever expected in our wildest dreams the enormity of the reaction to these two ideas.
However we have some sobering news to report. Today, Independence Day in the USA no less - our registrar has suspended our Top Level Domains and shut down both sites. Having failed to explain their reasoning we are left to assume that it was our content they didn't like, and so both HackerLeaks and LocalLeaks have been effectively silenced - censored - and shut down.
ImageThe company responsible is located at www.dot.tk and we encourage all free speech and free information advocates to contact this company and let them know exactly how you feel about censorship. We are seeking legal assistance to help us, and if you're a lawyer and can volunteer your time please contact us at PLF@cyber rights.net
We are in process of registering new Top Level Domains for HackerLeaks and LocalLeaks. The sites and the platforms themselves are fine, and anyway we have back-up copies of both sites as well as mirror servers. Both of these important offerings will be back online within 48 hours and this will not stop our project. This censorship has cost nothing other than it has prevented the world from seeing our disclosures and the people from having a safe place to disclose, and that for only a short time. We will return shortly, expect us.
SIGNED -- LocalLeaks & HackerLeaks Team
quote:Raymond DeRoo
@rderoo
Hi, I am Raymond and due to my gross incompetence I handed our company Nimbuzz to the #antisec movement. They have all of our CMS and SVN content. Yay!
quote:rderoo Raymond DeRoo
Hello @Nimbuzz, am I gonna keep my job? Just wondering.
15 minutes ago Favorite Retweet Reply
quote:Anonymous: Bigger, More Contentious, More Chaotic… but Better?
Much has been made about conflicts that have arisen within the hacker community; the main stream media has made sure of that. Stories of rogue programmers sabotaging parts of networks, or supposed splinter groups pursuing alternative agendas have proliferated. Focus has been put on isolated cases, and rumors of questionable provenance, in order to present a negative opinion of Anonymous with the intent of eroding their overwhelming global support and participation.
Differences of opinion about how to achieve shared goals are the lifeblood of progress, even as they appear to be barriers. Any relationship without debate is stagnant. Any opinions discussed without dissension lack foundation. Any operation carried out without the vetting of competing strategies is poorly planned. Conflict and struggle are often necessary for progress, particularly with group dynamics, and the presence of any element of contention proves the growing strength of the Anonymous movement. The media has simply misrepresented positive group dynamics and presented them in a way that supports their anti-Anonymous narrative.
Conflict can be the harbinger of discovery when welcomed by, and dealt with as, a community of peers. The push-and-pull of passionate participants is often chaotic despite the beauty of the resolutions achieved. Democracy, in all its glory, can be a wonderfully messy and disorganized experience.
The influence of any negative elements, or destructive agendas, such as those present in any large community, can find fertile ground in a community that encourages equal participation within a decentralized and non-hierarchical structure. The process of dealing with these issues through inclusion, transparency, and informed debate may have the appearance of vulgarity but results in the sophisticated inclusion of all while identifying negative forces that will be expelled by the group as a whole. It’s quite democratic. Exclusion of dissension, or minority opinion, may have the appearance of efficient deliberation, but the consensus is false and the issues have been left unresolved and ignored. Sometimes you gotta get in and mix it up a little in order to solve a problem and make some progress. This is the nature of an inclusive and egalitarian community.
Anonymous has grown. It is growing exponentially. It is no longer a semi-closed, elite community of anti-Scientology activists or digital pranksters… well, not only (lulz:). The massive increase in the size of the community has brought development and maturity in the community’s sense of purpose and level of effectiveness. It is truly becoming a global community, as dynamic and multifaceted as any, but much more democratic, and far more threatening to the status quo, than others.
Thus, Anonymous is the target of main stream media assaults and the victim of repeated smear campaigns. It is the subject of disdain for politicians and CEOs, and the identified enemy of governments. It is the thorn in the side of corporations and predatory global capitalist. Anonymous unites heads of state from North America and Europe with dictators and tyrants around the world in a common goal of subversion, and censorship, against this entity that threatens their power and control.
The funny thing is, Anonymous is you. Anonymous is all of us. Anonymous is nothing more than a democratic movement of the people of the planet. Decentralized, and non-hierarchical, this movement represents the collective will of the people of this planet. However, as we are discovering, the will of the people is not the same as the will of the power-that-be. Polls of the people say one thing, but our governments always seem to vote with the corporations. People want to end the wars but our governments keep sending our young to be canon fodder for corporate expansion and resource acquisition. The divide between the people of this planet, and those that lord over them, is becoming increasingly apparent, and increasingly unacceptable.
The corporate controlled media will shine a light on those that disagree with, and seek to do harm to, Anonymous, or even those that try to undermine the credibility of Anonymous by assuming that mantle. Every large community has miscreants. The success and progress of Anonymous has not been effected by minor internal strife, quite the contrary, nor has the relentless media campaign achieved its goal. Anonymous has become a global force to be reckoned with, and this is making a lot of very powerful people very anxious.
Those that hold the power, and control the resources, do not want democracy, transparency, equality or emancipation for the people of this planet. This system is working very well for their interests. Anonymous, all of us, you and me, the people of this planet, informed, enlightened, and communicating, is their worst nightmare. We are Anonymous. We are those whom they are using all of their resources, technologies, law enforcement, and political institutions to stop, censor, and silence. We, the people of this planet, have become a serious threat to those that would own each and every one of us (as they do through imposed financial indebtedness to them) as well as our food, our water, and our planet itself.
So, before you buy into the media spin on the supposed problems within Anonymous, or conflict among hackers, take a look at the following videos. These videos are just a sampling of very current Anonymous and AnonOps operations and activities. Anonymous is now able to fight wars on multiple fronts. Anonymous is now able to directly confront some of the largest and most powerful governments and corporations on the planet. Anonymous is so big it can no longer be hidden like a digital light under a proverbial bushel, nor should it be.
quote:THIS DOMAIN HAS BEEN SEIZED IN THE NAME OF
$$\ $$\ $$\ $$\
$$ \$$ \ $$ | \__|
$$$$$$$$$$\ $$$$$$\ $$$$$$$\ $$$$$$\ $$\ $$$$$$$\ $$$$$$\ $$$$$$$\
\_$$ $$ | \____$$\ $$ __$$\\_$$ _| $$ |$$ _____|$$ __$$\ $$ _____|
$$$$$$$$$$\ $$$$$$$ |$$ | $$ | $$ | $$ |\$$$$$$\ $$$$$$$$ |$$ /
\_$$ $$ _|$$ __$$ |$$ | $$ | $$ |$$\ $$ | \____$$\ $$ ____|$$ |
$$ |$$ | \$$$$$$$ |$$ | $$ | \$$$$ |$$ |$$$$$$$ |\$$$$$$$\ \$$$$$$$\
\__|\__| \_______|\__| \__| \____/ \__|\_______/ \_______| \_______|
Visit us on IRC, server irc.anonops.li channel #antisec
We also would like to deliver the following message from Anonymous:![]()
quote:AnonymousIRC AnonymousIRC
So the word is that admins have been locked out from government servers. http://icdh.gov.tr/
| Let's see when they pull the plug. #AntiSec
quote:Anonymous eyes political role, but won't go legit
Hacker group Anonymous plans to promote an affiliated political party to attract people who share its civil liberties goals, but do not agree with its methods.
The move appears similar to those by many protest movements that floated legal organizations and parties to represent their case in political, social and legal forums. But the decentralized nature of Anonymous, which claims no central leaders or control structure, will likely make it difficult to get support from all members.
There's some evidence of that already.
Anonymous had earlier said in a video that it will stop hacks and DDoS (distributed denial of service) attacks, and will restructure the system from the inside. "Although these methods were effective in turning the media's attention to civil rights violations when our numbers were small, and we had limited options, we now have the numbers to make a difference legally," it said.
The video posted on July 4 on YouTube did not go down well with some group members. It also did not prevent Antisec, a movement led by Anonymous, from hacking and defacing websites in Turkey on Wednesday.
"This (party) is just another group that wants to support the goals of Anonymous. It isn't going to replace it," said Testudo Smith, a spokesman for the group behind the push to form a political party.
Smith said the group's mission at this point is to set up an advocacy group to provide Anonymous with legal channels with which it can fight for its goals of Internet freedom and civil rights. These legal channels are what Anonymous is most lacking at the moment, he added.
A website set up for the Anonymous Party of America sets out a broad agenda for a political party that is largely focused on U.S. politics, and will work towards transparency and accountability in government, individual rights, and common sense. It calls on "any Congressman or Senator that has any honor left, to resign from their corrupted parties and join our call for and end to the present system".
The group might find it difficult to gain legitimacy if other hackers, under the banner of Anonymous, continue to carry out attacks on the websites and networks of companies and organizations.
Smith admitted that getting all hackers to support his group's goals would be difficult.
"We have no control over Anonymous as a whole. There aren't any leaders, and it would be futile to attempt to control Anonymous," Smith said.
But should the political pressure group gain widespread support, the group has grander plans.
"Eventually, when we have enough support, and if we think that it is the best way to make a political impact, then we will register ourselves," Smith said. That's in the very long term though, he added.
Anonymous has been the target of police actions in some countries, including Turkey, Spain, Italy, and the U.K. It also found itself alienated from the mainstream population that supports Internet freedom and individual rights, but were not in favor of the group's methods.
quote:http://thepiratebay.org/torrent/6525567
Today we release the ownage of another government-contracted IT company, IRC
Federal. They brag about their multi-million dollar partnership with the FBI,
Army, Navy, NASA, and the Department of Justice, selling out their "skills" to
the US empire. So we laid nuclear waste to their systems, owning their pathetic
windows box, dropping their databases and private emails, and defaced their
professional looking website.
In their emails we found various contracts, development schematics, and internal
documents for various government institutions including a proposal for the FBI
to develop a "Special Identities Modernization (SIM) Project" to "reduce
terrorist and criminal activity by protecting all records associated with
trusted individuals and revealing the identities of those individuals who may
pose serious risk to the United States and its allies". We also found
fingerprinting contracts for the DOJ, biometrics development for the military,
and strategy contracts for the "National Nuclear Security Administration
Nuclear Weapons Complex".
Additionally we found login info to various VPNs and several Department of
Energy login access panels that we are dumping *live* complete with some URLs
to live ASP file browser and upload backdoors - let's see how long it takes for
them to remove it (don't worry we'll keep putting it back up until they pull
the box ;D)
Before we begin the drop, a personal message to the employees of IRC Federal:
If you place any value on freedom, then stop working for the oligarchy
and start working against it. Stop aiding the corporations and a government
which uses unethical means to corner vast amounts of wealth and proceed
to flagrantly abuse their power. Together, we have the power to change
this world for the better.
“He who passively accepts evil is as much involved in it as he who helps
to perpetuate it.” –Martin Luther King, Jr.
Props to our black hat and antisec comrades: bantown, dikline,
h0no, phrack high council, ~el8 and all you kick-ass motherfuckers
we've never even heard of. Thank you.
################################################################################
## own & rm # own & rm # own & rm # own & rm # own & rm # own & rm # own & rm ##
################################################################################
ello ej33t hax0urz! We decided to throw in a little bonus for those of you that
sojourned through this boring-ass document to give you a little taste (and
hopefully some ideas!) of how this went down.
Before you Adrian Lamo-type el33t (lololol !!!) hackers get sticks up your
asses, just keep the previous doc in mind and remember: even if all you can do
is sql injection, you're still ~300% more talented than most grandmas!
h0h00h0h0!!! (srsly tho)
http://www.ircfederal.com(...)0select%201,username,
mynumber,1%20FROM%20logins%20WHERE%20username%20%3C%3E%20%27bhunt%27
# admin login!
Once we had the admin login, there was a script to upload images. They had
blacklisted extensions (note to self: a whitelist would be more appropriate
here!), that disallowed ASP among others. What they didn't check for was .cfm
There were a few others as well. There was an internal phpbb database that we
downloaded and cracked and got some email passwords.
So now you know! Protect your shit and keepz it realz!
################################################################################
## own & rm # own & rm # own & rm # own & rm # own & rm # own & rm # own & rm ##
################################################################################
De oorlogsverklaring aan Scientologie was de eerstequote:
Ik neem aan hetzelfde als met kritiek op moslims: het moet wel ergens op slaan. Alleen maar bashen is nogal nutteloos.quote:Op zaterdag 9 juli 2011 09:55 schreef RobertoCarlos het volgende:
Stel dat iemand kritiek heeft op anonops, wordt die persoon dan aangepakt of is dat dan het vrije woord?
quote:Anonymous threatens police over phone hacking and Julian Assange
Senior source inside hacker collective seeks to embarrass Metropolitan police and judges with 'explosive' revelations
Figures at the top of hackers' collective Anonymous are threatening to attack the Metropolitan police's computer systems and those controlled by the UK judicial system, warning that Tuesday will be "the biggest day in Anonymous's history".
The collective is understood to be seeking to express anger over News International's phone hacking and at the threatened extradition of WikiLeaks founder Julian Assange.
A Twitter feed purporting to belong to Sabu, a senior figure within the group and the founder of the spin-off group LulzSec, which hacked a site linked to the CIA and the UK's Serious Organised Crime Agency, promised two releases of information would be launched within a day.
"Everyone brace," he tweeted. "This will be literally explosive."
A follow-up message read: "ATTN Intelligence community: Your contractors have failed you. Tomorrow is the beginning."
The account, @anonymouSabu, has not been verified as belonging to Sabu – but it has over 7,700 followers and has been referenced by the "official" Anonymous @anon_central account on Twitter.
Sources close to the collective were unusually close-lipped about the targets of tomorrow's hack, but talk within chat channels has suggested several top-level members of Anonymous are eager to launch attacks based around Julian Assange's appeal hearing against extradition, which begins on Tuesday.
Others are also believed to have proposed targeting the Met in retaliation for alleged payments to police officers by News of the World reporters, and the general response to the phone hacking scandal.
Other speculation centres around material claimed to have been obtained last week from contractors relating to security and secrecy of "former world leaders", or plans to target a senior leaders' retreat at Bohemian Grove, California.
As is typical in the chaotic and occasionally paranoid Anonymous community, other sources close to the collective are warning some prominent members are probably engaging in "disinformation campaigns" ahead of any action.
Communication problems around the planned releases were compounded as the main chat channel used by Anonymous was offline for much of Monday, leaving even those close to senior members of the collective unable to verify rumours ahead of the release.
Rumours on Friday suggested that one Anonymous member had broken into the News International servers and taken copies of some internal emails which were being offered for sale or even ransom. However this could not be confirmed, and the Guardian has not seen any evidence that the claimed email stash is legitimate, although News International's site is understood to have been "probed" by members of Anonymous at the end of last week.
Last Wednesday, two days after the Dowler revelations, a listing of emails of NoW staff appeared on Pastebin, a favourite site for posting the results – or beginnings – of attacks against all sorts of sites by Anonymous and other hacker groups.
One source told the Guardian that News International's server had been probed for up to 30 minutes at a time last week by hackers using "proxy chaining" – a method of logging in via a number of remote computers – to disguise their identity. "Everyone thinks Interpol will get involved at some point," the source said.
The hackers' anger at the company was ignited by the revelation last week that a private detective acting for NoW had listened into voicemails on the phone of the murdered teenager Milly Dowler, which may have interfered with the police investigation to find her.
Anonymous has previously attacked PayPal and Visa over their refusal, following orders from the US government, to process donations for WikiLeaks. It has also carried out online attacks against the Church of Scientology over what is seen as suppression of information.
quote:Military Meltdown Monday
Hello Thar!
Today we want to turn our attention to Booz Allen Hamilton, whose core business
is contractual work completed on behalf of the US federal government, foremost
on defense and homeland security matters, and limited engagements of foreign
governments specific to U.S. military assistance programs.
So in this line of work you'd expect them to sail the seven proxseas with a
state- of-the-art battleship, right? Well you may be as surprised as we were
when we found their vessel being a puny wooden barge.
We infiltrated a server on their network that basically had no security
measures in place. We were able to run our own application, which turned out to
be a shell and began plundering some booty. Most shiny is probably a list of
roughly 90,000 military emails and password hashes (md5, non-salted of course!).
We also added the complete sqldump, compressed ~50mb, for a good measure.
We also were able to access their svn, grabbing 4gb of source code. But this
was deemed insignificant and a waste of valuable space, so we merely grabbed
it, and wiped it from their system.
Additionally we found some related datas on different servers we got access to
after finding credentials in the Booz Allen System. We added anything which
could be interesting.
And last but not least we found maps and keys for various other treasure chests
buried on the islands of government agencies, federal contractors and shady
whitehat companies. This material surely will keep our blackhat friends busy
for a while.
A shoutout to all friendly vessels: Always remember, let it flow!
http://wikisend.com/download/405742/military_email_pw.rar
#AntiSec
quote:BONUS ROUND: BOOZ ALLEN HAMILTON KEY FACTS
quote:BONUS ROUND TWO: ANONYMOUS INTERESTS
quote:Enclosed is the invoice for our audit of your security systems, as well as the
auditor's conclusion.
4 hours of man power: $40.00
Network auditing: $35.00
Web-app auditing: $35.00
Network infiltration*: $0.00
Password and SQL dumping**: $200.00
Decryption of data***: $0.00
Media and press****: $0.00
Total bill: $310.00
*Price is based on the amount of effort required.
**Price is based on the amount of badly secured data to be dumped, which in
this case was a substantial figure.
***No security in place, no effort for intrusion needed.
****Trolling is our specialty, we provide this service free of charge.
Auditor's closing remarks: Pwned. U mad, bro?
We are Anonymous.
We are Legion.
We are Antisec.
We do not forgive.
We do not forget.
Expect us.
quote:BoozAllen Booz Allen Hamilton
by AnonymousIRC
As part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems.
Gebeurd al veel langer bij de politie, elke keer als er Volkert van der G's en Benno L's in het nieuws verschijnen dan zijn er genoeg politiemensen die even hun dossier checken zonder ook maar iets met die zaak te maken te hebben.quote:Op dinsdag 12 juli 2011 13:32 schreef Papierversnipperaar het volgende:
900 Britse agenten misbruiken politiedatabase
Hacken is helemaal in tegenwoordig.
quote:A Glimpse into the Shady World of Romas/COIN
In February, the hacktivist group Anonymous released 70,000 emails from security firm HBGary Federal, revealing that the firm had been part of an effort to sell its information-warfare services to companies seeking to attack WikiLeaks. Barrett Brown combed through the emails and found evidence of what he says is a massive surveillance effort involving numerous security firms. According to Brown, this effort is primarily targeting the Arab world, and is evidently run for the U.S. government. Even Disney/Pixar appears to have been caught up in the effort, at least peripherally. The HBGary Federal emails suggest the alleged program, known as Romas/COIN, is about to be upgraded to a new program known as Odyssey.
quote:
What happened to all the good things we did? Scientology, Habbo, Tunisia, Egypt, true crowd power. We are left with 2 individuals who front an extend group of less than 20 individuals. Wtf.
'Why do we protest?' - We are forgetting.
Over recent months we have all stood by and watched a few members of our beloved Anonymous form their own 'splinter' group known as lulz Security. In the beginning many of us cheered them on as they provided us with the 'lulz'. As their ego's grew so did their unethical ambitions, and to be more precise their motives changed.
Around June 25th, after realizing that not only had their random spree attracted the attention of Law Enforcement but also other well-known and well respected hackers, they decided to merge back into OUR mothership - they had pissed off everybody and then wanted back in - to hide - to blend amongst the mass that is Anonymous, in order to divert unwanted attention back to all Anons.
These individuals have lost their way and lost sight of the original Anonymous ethos. They are attempting to rail-road the collective for their own agenda. Do not allow it.
They are not heroes. They are not powerful or to be feared.
They are vulnerable and they know it.
THEY DON'T SPEAK FOR ALL OF US
They have made powerful enemies, and their so-called 'friends' display the usual characteristics of either bots, or mal-adjusted children who troll and look up to fools in the abscence of a real cause. The sense of victory that some of us feel right now is false and will be short-lived. History will very soon remember these individuals as ego-driven maniacs with no cause. Pathetic individuals who thrive on releasing private information, that is endangering real people in the real world. They do this in the name of Anonymous. This is how we will be remembered too.....unless we prevent it.
Look at the feed above, that's anonymous falling apart - LIVE at the hands of a few scared and insignificant info-rapists.
It's not their anonymous, just as it's not ours. Why are we letting them treat us as theirs?
I think it's time we showed these fools how WE are legion, and we do not forgive, or forget.
df6ee8f33f8878e46149af369ef26428
quote:Operation Green Rights\' Project Tarmaggedon
JULY 12, 2011 -- -- Operation Green Rights presents: Project Tarmeggedon
Free-thinking citizens of the world:
Anonymous' Operation Green Rights calls your attention to an urgent situation in North America perpetuated by the boundless greed of the usual suspects: Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland, and many others.
This week, activists are gathering along U.S. Highway 12 in Montana to protest the transformation of a serene wilderness into an industrial shipping route, bringing "megaloads" of refinery equipment to the Alberta Tar Sands in Canada (see Tar Sands FAQ Sheet below).
Anonymous now joins the struggle against "Big Oil" in the heartland of the US. We stand in solidarity with any citizen willing to protest corporate abuse. Anonymous will not stand by idly and let these environmental atrocities continue. This is not the clean energy of the future that we are being promised.
We will, over the course of the next few days, use the powers we posses to spread news about this scenario and the corporations involved. We are actively seeking leaks to expose the corruption that we all KNOW is beneath this. Anonymous will support the activists on July 13-14 when they initiate civil disobedience and direct action to confront this dire issue. We urge you to get involved. Montana and Idaho citizens, we ask you to join local protests and attend the Highway 12 rally if you are close enough! If you're not, join us in the IRC listed below for our own good times.
The continued development of the tar sands is a major step backward in the effort to curb global warming. Anonymous will not suffer this without a fight, and Operation Green Rights will always support the rights of the people to live in an unpolluted world, and aim to help safeguard it for the future. One way or another.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
IRC: irc.anonops.li channel #operationgreenrights
Location of Protest: http://tinyurl.com/5sy57bg
Sign up to protest! http://www.tarsandsaction.org/sign-up/
Er zijn geluiden dat dit bericht van Th3 J35ter komt.quote:Op dinsdag 12 juli 2011 22:42 schreef Papierversnipperaar het volgende:
http://www.whyweprotest.net
[..]
Het is nogal druk rond Sabu.twitter:AnonBroadcast twitterde op woensdag 13-07-2011 om 16:33:06@LR6security #lulzsec with #jester leadership successfully DDoS'd anonyops.net,injected #whyweprotest & #trolling @anonymousabu via twitter reageer retweet
twitter:RichRoma twitterde op woensdag 13-07-2011 om 23:08:15@anonymouSabu Thank you for keeping your promise like a man - you said you'd affirm/deny when you are finally doxed successfully cheers m8 reageer retweet
twitter:anonymouSabu twitterde op woensdag 13-07-2011 om 23:10:18@RichRoma I am honest. No need to hide who I am. Now come and get me. I have more surprises up my sleeve, putahna;) reageer retweet
quote:PayPal CSO calls for AntiSec hunt
PayPal’s chief security officer has called on the industry to reveal the identities of hackers involved in the online Anti Security (AntiSec) movement in order to stop a string of attacks against organisations.
The movement was run by activists, some within the online Anonymous collective, who had banded together with others to attack organisations it accused of corruption and censorship.
Individuals and groups hacked and launched denial of service attacks against US police, defence and intelligence departments, large technology companies and security firms, and dumped troves of sensitive data on public forums.
This had to stop, according to PayPal security chief Michael Barrett.
“I believe it’s crucial for all companies to do what they can to try to identify these individuals,” Barrett said.
“They delude themselves that they are anonymous on the internet. They are not.
"They can be found, and for the continued safety of the internet, we must identify them and have legitimate law enforcement processes appropriately punish them.”
PayPal’s own Electronic Crime and Threat Intelligence Unit, home to a veteran cybercrime investigator and former consultant to the FBI, Scotland Yard and the US Secret Service, had been on the tails of hacktivist groups for years.
The payments giant also has a personal interest in tracking down hacktivist groups. AntiSec hackers had encouraged others to attempt to access PayPal customer accounts using leaked usernames and passwords. Last year, PayPal's blog website was taken offline following a distributed denial of service attack launched by activists angry that the company had frozen a donations account used by whistle blowing website WikiLeaks.
The AntiSec movement had existed for around a decade and was loosely guided by a mission statement to reveal poor security practice and put an end to security exploit disclosure which it said gave ammunition to criminal ‘black hat’ hackers and put consumers in danger.
But that was a false philosophy, according to Barrett.
“While many of them claim to be defending the internet they love, in practice it would seem that they are only hastening its demise. A cynical interpretation would suggest that what most of them desire is actually their ‘fifteen minutes of fame’.”
He disagreed with some commentators who argued the AntiSec movement may be effective in its mission to force organisations to improve poor information security practice.
“Thoughtfully designed industry regulation” like the Payments Card Industry Data Security Standard (PCIDSS) would do a better job, according to Barrett.
“No one would suggest encouraging improved physical security in the real world by decriminalising breaking and entering and classifying it as a sport; why should the online world be any different?” he said.
The AntiSec movement was brazen. Data stolen during the attacks was typically uploaded to pastebin.org and popular filesharing and BitTorrent websites, and promoted in the relentless stream of Twitter conversations under the AntiSec hashtag.
The most recent high-profile victim of the AntiSec assaults was agricultural giant Monsanto in which 2550 names, addresses phone numbers and email addresses reportedly linked to the company were exposed.
Previous targets included the CIA, Arizona Police department and the beleaguered tech monolith Sony.
Yet for all the bravado of the attacks, Barrett said the participants, typically teenage or young men, were terrified of being arrested.
“They are terrified of being ‘vanned’ (arrested), and if enough of them are, then I believe we’ll start to see a significant reduction in the activities of these groups," he said.
If law enforcement failed to catch the perpetrators, Barrett believed the AntiSec movement would continue unchecked.
In the meantime, the security industry should keep on its toes.
“Security companies and security experts are targets too,” Ron Gula, chief executive of Tenable Network Security said.
“We should not feel that we are ‘above’ being attacked or get some sort of pass for not being a victim just because we're part of the good guy team.
“We all need to collectively watch our backs and realise that if and when we are targeted, it is a serious matter and should not be something that is taken lightly.”
quote:The Quest to Unmask the Ringleader of Anonymous
A Wednesday blog post from a hacker known as The Jester claimed to unmask the ringleader of Anonymous. The thing is, it's pretty unclear if this claim is anything close to legit. First, let's go through The Jester's story.
Known online only as Sabu, the hacker leader The Jester claims to expose made a name for himself with an Anonymous attack on the internet security firm HBGary earlier this year. A series of internet relay chat (IRC) logs from that time period shows Sabu's leadership tendencies within Anonymous. Instructing other hackers and taking taking credit for bringing down HBGary, Sabu appears in those #HQ chat logs to be the group's mastermind. And at one point, while discussing how to set up mirror sites for the HBGary data, Sabu claims ownership of a private web domain. "I can setup anonleaks.prvt.org let me know," said Sabu in IRC. "It's one of my private domains."
On another occasion, Sabu accidentally pasted this domain (prvt.org) into the chat, and The Jester says that by using this URL and the identifying data behind it, we can trace Sabu's identity to Hugo Carvalho an IT professional from Portugal. Using the domain registry information, The Jester links prvt.org to an email address owned by Carvalho's company Host Squadron, as well as the hacker handle, Visigod, which he says Sabu used when he started his Anonymous work. As further proof, The Jester reminds us that Sabu regularly tweets in Portuguese and references Brazil, the address on the domain registry. He links to Carvalho's website, Facebook, MySpace and LinkedIn profiles to show further how he fits the Sabu profile.
The Jester's claim is suspect for a couple of reasons. First of all, Hugo Carvalho flatly denies that he's a hacker called Sabu. "I'm Hugo Carvalho, and the story behind me and this nick guy Sabu is a complete lie. Someone stole my photo from one of my Web sites and started to spread the rumor that I was affiliated with this hacking group," he said in an e-mail to CNET's Elinor Mills. "Feel free to post this e-mail in your Web site and state that there is no relation between me and anyone related to that hacking stuff."
Second, domain registry information is not that hard to change or forge. According to Domain Tools, the owner information on prvt.org has been changed 59 times since November 2007. In fact, the domain was made private from 2009 to June 23, 2011, leaving no history during Anonymous's most active time period. Without access to all those records, we might assume that The Jester is just filling in the blanks with his own theories. The Jester is the first to admit that Sabu could be using the prvt.org as a disinformation tool to mislead authorities and points to a tweet that reads, "@anonymousabu: If its not already obvious already: my!=hector/xavier/rafael lima/monsegur/de leon/kaotico/negron.Disinfos my game – enjoy the ridemates." The list is of some of the many names attached to Sabu, and "!=" is "not equal to," indicating that Sabu is saying none of them are correct.
Sabu actually preempted The Jester's latest claims on Twitter. "OK You found me. I am Hugo. I am in Portugal. Next question is: Can you stop me?" he tweeted on Monday. After The Jester's post Wednesday he went into rapid fire mode, tweeting and retweeting dozens of times an hour about the claims. "Extradite me, then I impress," he tweeted at The Jester just after the blog post went live. "The government of Portugal will not extradite me," he tweeted a few minutes later. "Lets see how far they will go. If you can extradition rights within Portugal I will impress. Next question is: where in europa?" he tweeted to a question from @revmagdalen about the claims. "So make it happen. I am personally challenging you to force your gobernment to force my gobernment to give me up. Your new task," he said in a follow up tweet.
The Jester's claim has renewed interest in unmasking Sabu, but it's a Sisyphean task. As has happened when trying to factcheck older claims to Sabu's identity--some of which have attempted to use prvt.org as a lead--the case is always pretty thin. Though rivals deny that Anonymous hackers are that talented, leaders like Sabu, kayla and Topiary have been successful at dodging or convoluting attempts to reveal their real identities. It's worth remembering that Anonymous has always described itself as a leaderless organization. "We are Legion," reads their motto.
But this peek into the finger-pointing world of hackers does reveal is a culture of superlatives and sabotage. "[Those who try to unmask us] are lonely people that are programmed to feel that they need an enemy at all times," Topiary told Gawker last month. "If we're out of their lives, they don't have much going for them." Topiary goes on to say he's not worrying about getting caught, despite the recent arrest of Anonymous-affiliated hacker Ryan Cleary in the U.K. He may be lying, but we'll never know.
Neither The Jester nor Sabu responded to requests for comment.
quote:http://opcannabis.wordpress.com/
Welcome!
Anonymous Operation Cannabis is an awareness and reform effort. Under the banner of #OpCannabis we will be informing the public on much of the disinformation that is available and what the reality of the situation is. Through us you will also find petitions, protest dates and other resources to help us in our efforts.
Stay tuned for more information.
To join in discussion, Get I2P – Official Homepages I2PProject.net / I2P2.de Download I2P Installer v0.8.7
Point your IRC client at 127.0.0.1:6668 and /join #OpCannabis
In the meantime enjoy the following documentaries
quote:Pentagon declares the Internet a war domain
The Pentagon released a long-promised cybersecurity plan Thursday that declares the Internet a domain of war.
The plan notably does not spell out how the U.S. military would use the Web for offensive strikes, however.
The Defense Department’s first-ever plan for cyberspace calls on the department to expand its ability to thwart attacks from other nations and groups, beef up its cyber-workforce and expand collaboration with the private sector.
Like major corporations and the rest of the federal government, the military “depends on cyberspace to function,” the DOD plan says. The U.S. military uses cyberspace for everything from carrying out military operations to sharing intelligence data internally to managing personnel.
“The department and the nation have vulnerabilities in cyberspace,” the document states. “Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity.”
Other nations “are working to exploit DOD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DOD’s information infrastructure,” the plan states. “Moreover, non-state actors increasingly threaten to penetrate and disrupt DOD networks and systems.”
Groups are capable of this largely because “small-scale technologies” that have “an impact disproportionate to their size” are relatively inexpensive and readily available.
The Pentagon plans to focus heavily on three areas under the new strategy: the theft or exploitation of data; attempts to deny or disrupt access to U.S. military networks; and attempts to “destroy or degrade networks or connected systems.”
One problem highlighted in the strategy is a baked-in threat: “The majority of information technology products used in the United States are manufactured and assembled overseas.”
DOD laid out a multi-pronged approach to address those issues.
As foreshadowed by Pentagon officials’ comments in recent years, the plan etches in stone that cyberspace is now an “operational domain” for the military, just as land, air, sea and space have been for decades.
“This allows DOD to organize, train and equip for cyberspace” as in those other areas, the plan states. It also notes the 2010 establishment of U.S. Cyber Command to oversee all DOD work in the cyber-realm.
The second leg of the plan is to employ new defensive ways of operating in cyberspace, first by enhancing the DOD’s “cyber hygiene.” That term covers ensuring that data on military networks remains secure, using the Internet wisely and designing systems and networks to guard against cyberstrikes.
The military will continue its “active cyber defense” approach of “using sensors, software, and intelligence to detect and stop malicious activity before it can affect DOD networks and systems.” It also will look for new “approaches and paradigms” that will include “development and integration … of mobile media and secure cloud computing.”
The plan underscores efforts long under way at the Pentagon to work with other government agencies and the private sector. It also says the Pentagon will continue strong cyber R&D spending, even in a time of declining national security budgets.
Notably, the plan calls the Department of Homeland Security the lead for “interagency efforts to identify and mitigate cyber vulnerabilities in the nation’s critical infrastructure.” Some experts have warned against DOD overstepping on domestic cyber-matters.
The Pentagon also announced a new pilot program with industry designed to encourage companies to “voluntarily [opt] into increased sharing of information about malicious or unauthorized cyber activity.”
The strategy calls for a larger DOD cyber-workforce.
One challenge, Pentagon experts say, will be attracting top IT talent because the private sector can pay much larger salaries — especially in times of shrinking Defense budgets. To that end, “DOD will focus on the establishment of dynamic programs to attract talent early,” the plan states.
On IT acquisition, the plan lays out several changes, including faster delivery of systems; moving to incremental development and upgrading instead of waiting to buy “large, complex systems”; and improved security measures.
Finally, the strategy states an intention to work more closely with “small- and medium-sized business” and “entrepreneurs in Silicon Valley and other U.S. technology innovation hubs.”
quote:Why hacker group LulzSec went on the attack
LulzSec gained instant notoriety by targeting the CIA, multi-nationals and government websites. Then, at the height of its popularity, it disbanded. One of its founders tells why
Its audacity was brazen and apparently fearless. Among its high-profile victims were Sony, the CIA, the FBI, the US Senate and even the UK's Serious Organised Crime Agency. Exposing frailties in government and corporate networks, the group leaked hundreds of thousands of hacked passwords, and in the process garnered more than a quarter of a million followers on Twitter. But after just 50 days, on 25 June, LulzSec suddenly said it was disbanding.
Just hours before this announcement, the Guardian had published leaked internet chat logs revealing the inner workings of the group, which appeared to consist of six to eight members. The logs showed that authorities were often hot on their heels, and that after an attack on an FBI-affiliated website two hackers had quit LulzSec as they were "not up for the heat". As media attention mounted, Ryan Cleary, an Essex-based 19-year-old suspected of affiliation to LulzSec, was arrested in a joint UK-US "e-crime" investigation. Had the pressure simply got too much to handle?
To find out, the Guardian tracked down one of LulzSec's founding members, "Topiary". A key figure in the tight-knit group, he was revealed in the logs to have managed LulzSec's Twitter account and to have written their press releases. After verifying his identity by asking him to send a direct message from the account – "This is the captain of the Lulz Boat," he confirmed – we began a long conversation by Skype.
"I know people won't believe this, but we genuinely ended it [LulzSec] because it was classy," he says. "The leaks we promised happened . . . 50 days were reached, we just about hit 275,000 Twitter followers, things were on a high, so we redirected our fans to [hacker collective] Anonymous and [hacking movement] AntiSec and wrapped it up neatly . . . A high note, a classy ending, a big bang, then a sail into the distance."
LulzSec's jovial public image undoubtedly helped it achieve unusual popularity within a short time. Its stated aim was to provide "high-quality entertainment at your expense," and the word "Lulz" is itself internet slang for laughs. The group's popularity spiked after it planted a fake story on US news outlet PBS.com in protest over what it claimed was a misrepresentative WikiLeaks documentary made by the broadcaster. The story falsely reported that rapper Tupac Shakur, who was killed in a shooting 15 years ago, had been found alive and well in New Zealand.
"What we did was different from other hacking groups," says Topiary. "We had an active Twitter (controlled by me), cute cats in deface messages, and a generally playful, cartoon-like aura to our operations. We knew when to start, we knew when to stop, and most of all we knew how to have fun."
But the group's mission, Topiary explains, was not calculated. Almost everything LulzSec did – from choosing its name to its next target – happened spontaneously. "We made it up as we went along. We were originally @LulzLeaks on twitter, but I forgot the password so we became @LulzSec. My first name was The Lulz Train, then The Lulz Cannon, then The Lulz Boat. I had no idea what The Love Boat was, it was a complete accident . . . I wrote every press release in Notepad without planning. That's what made us unique, we just came out and made stuff up out of nowhere . . . We released when it felt right, we tweeted what felt right, we wrote what we felt needed to be wrote. We weren't burdened by plans or board meetings, we just did it."
The leaked chat logs also revealed the hackers appeared to revel in the international attention they received. However, Topiary says it wasn't that LulzSec was media-hungry, but that the media was LulzSec-hungry.
"We didn't contact a single media outlet for at least the first 40 days, they just kept reporting on our humble tweets," he says, though he admits the attention "gave us more reasons to leak more. It was a thrill, sure, and it did play a role. We enjoyed occasionally confusing and pranking media with weird tweets, or giving exclusives to certain journalists to piss off other certain journalists. It was another aspect of the situation that helped us leverage the entertainment."
Yet although many of LulzSec's attacks were perpetrated "for the lulz", the group was accused of attempted extortion by one US security company, Unveillance – a charge Topiary staunchly denies. It was also criticised after it hacked and dumped thousands of Sony Pictures Europe customers' usernames and passwords online, some of which were reportedly later used in scams by fraudsters. But Topiary is unapologetic.
"It's Sony's fault for not defending – and encrypting – its customers' data," he says. "Similarly, in a perfect world, we'd have dumped said data and nothing would have happened. These scams simply prove that other people (our fans/spectators) are more evil than us."
Towards the end of LulzSec's reign, it seemed to gravitate towards more overtly political causes. It occasionally compared itself to WikiLeaks in tweets, and its penultimate leak was a joint effort with Anonymous to expose Arizona police as "racist and corrupt", and to "sabotage their efforts to terrorise communities fighting an unjust 'war on drugs'."
Anonymous is well known for its acts of political "hacktivism". On Monday it reportedly threatened to attack the Metropolitan police over News International's phone hacking and the possible extradition to Sweden of WikiLeaks founder Julian Assange. Earlier this year the group claimed responsibility for a series of Distributed Denial of Service (DDoS) attacks on government websites in Tunisia, Iran, Egypt and Bahrain, and in 2008 it attacked the Church of Scientology after it allegedly attempted to suppress a leaked video interview with actor and scientologist Tom Cruise. Topiary has been heavily involved with Anonymous in the past, occasionally acting as its spokesman in televised interviews.
"Anonymous has been a great way for the younger generations to get involved through methods they understand, like utilising the internet," he says. "My main goal with Anonymous was to spread the word of revolution to those who might be seeking something new."
How does he define revolution? "Revolution is kicking the Tunisian government in the teeth by rendering their malicious Javascript embedments inert, allowing Tunisian citizens to surf Facebook without fear of password sniffing. Revolution is a horde of activists holding up Anonymous masks and thanking us for assisting their hard work by obliterating their government's ministry, stock and finance websites, replacing them with inspiring words. Revolution, to me, is bringing down the big guy while not forgetting to stand up for the little guy."
Though Topiary will not disclose his age, he describes himself as a teenager and "an internet denizen with a passion for change". He believes he is part of a generational shift in the way technology – specifically the internet – is increasingly being used as a tool to influence the world. The actions of Anonymous in particular, he says, have brought attention to the idea that actions taken online can have a major impact in real life – "linking the two realities". But he also recognises that the actions of Anonymous, LulzSec and other affiliated hackers can be used by governments as justification for greater control of the internet. So how does he balance his actions with that knowledge?
"It only results in greater government control if we remain apathetic and let it happen," he says. "The goal with Anonymous is to brutally cut down the middle of that decision and shout 'NO' to laws we don't agree with. Laws are to be respected when they're fair, not obeyed without question."
For now, however, Topiary is taking a break from law-breaking. He says he will continue operating on the margins of Anonymous, but will not engage in any more hacking. Instead, he intends to create art, video and graphics for the group to help with a new public relations project, to be titled Voice.
"I've been at this non-stop for a while, it's a big time-sink," he says. "Some people can handle it for years on end, and I respect those people. I just needed some air and a new page in the Anonymous/LulzSec era."
After the arrest of Cleary last month, suspected US hackers believed to be affiliated with LulzSec had their homes raided in Ohio and Iowa. In the past, hackers have been offered immunity from prosecution if they cooperate with the authorities. But, if caught, Topiary says he would "never snitch" on other hackers and that he would "pretty much" rather go to jail than work for the government in any capacity.
"Not sure I'd have a place in government security, unless they enjoy bizarre tweets," he says. "But again, no, I wouldn't accept a job that would fight against the things I've fought for. As for the authorities, well, if they have their claws in, they have their claws in, there's not much I can do about it. But I can only hope that they haven't pinned any of us, especially my friends from LulzSec."
twitter:atopiary twitterde op donderdag 14-07-2011 om 22:43:24This is accurate, just wish it focused more on the team effort of LulzSec rather than me: http://t.co/VnzKzqp A good, informative piece. reageer retweet
quote:https://threatpost.com/en(...)ymous-attacks-071411
McCain Pushes For Select Committee to Address Wikileaks, Anonymous Attacks
In the face of continued attacks on federal agencies and contractors such as Booz Allen Hamilton and IRC Federal that do highly sensitive security work for the U.S. government, Sen. John McCain has asked Senate leaders to appoint a select committee to look into the attacks and data leaks that have plagued Washington throughout 2011.
In a letter to Senate Majority Leader Harry Reid and Senate Minority Leader Mitch McConnell, McCain (R-Ariz.) said that a temporary Senate committee is necessary in order to get a handle on all of the disparate cybersecurity legislation proposals and to address the threat posed by groups such as Anonymous, LulzSec and Wikileaks.
"I write to renew my request that the Senate create a temporary Select Committee on Cyber Security and Electronic Intelligence Leaks. I feel this Select Committee is necessary in order to develop comprehensive cyber security legislation and adequately address the continuing risk of insider threats that caused thousands of documents to be posted on the website Wikileaks," McCain said in his letter, which he sent Thursday.
The request for the select committee comes on the heels of renewed attacks on federal agencies and contractors by Anonymous and other groups affiliated with the AntiSec movement. The most recent incidents in this campaign are the attack by Anonymous on Booz Allen Hamilton revealed on Monday and the attack on IRC Federal last weekend. Both companies are involved in national security work for the federal government, and such companies have become prime targets for the groups in the AntiSec campaign.
In his letter to Reid and McConnell, McCain says that the select committee he is proposing is necessary for a number of reasons, not the least of which is the need to decipher the tangle of legislative proposals and agencies involved in the cybersecurity discussion.
"As you know, cyber security legislation has been drafted by at least three committees and at least seven committees claim some jurisdiction over the issue. The White House put forward a legislative proposal in May and the Department of Energy put forth requirements and responsibilities for a cyber security program that same month. Earlier this month, the Department of Commerce sought comment on its proposal to establish voluntary codes of behavior to improve cyber security and the Department of Defense issued its strategy for operating in cyberspace. With so many agencies and the White House moving forward with cyber security proposals, we must provide congressional leadership on this pressing issue of national security," McCain wrote in the letter.
In addition to the attacks on contractors and federal agencies, the government has been dealing with the fallout from the myriad revelations in the Wikileaks documents that have been trickling out since last year. McCain said in the letter that he thinks the government's current plan for dealing with these things is inadequate.
"I truly believe the only way to ensure the protection of sensitive and valuable information from tampering or dissemination by unauthorized persons is a Select Committee," McCain said.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |