quote:Op dinsdag 21 juni 2011 20:40 schreef Nibb-it het volgende:
[..]
Post er eens iemand anders hier is het weer niet goed
No commentquote:Op dinsdag 21 juni 2011 20:52 schreef David1979 het volgende:
Een fantopic voor zielige pubertjes die het leuk vinden om privegegevens online te gooien, tja
NOS Journaal: 1 van de meest gezochte hackers ter wereld!quote:
quote:BarrettBrownLOL Barrett Brown
Computer-assisted disinformation is the next big thing. tinyurl.com/3r8erpm #opmetalgear
quote:http://wiki.echelon2.org:8090/wiki/Cubic_Corporation
Cubic Corporation is a US Military/Defence contractor, with subsidiaries including Cubic Defense Applications Inc, and Cubic Cyber Solutions, Inc. They wholly own cybersecurity corporations Abraxas and Ntrepid. Ntrepid provides Persona Management services to the US government in fulfillment of the contracts issued as part of US CENTCOM Operation Earnest Voice.
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.quote:The hackers hacked: main Anonymous IRC servers invaded
War rages between competing factions within the hacker collective Anonymous after this weekend's drama-filled takeover of the main Anonymous IRC server network. That network, used by Anons to plan and conduct attacks, was taken over by one of its own, an IRC moderator known as "Ryan."
His attack has sparked a debate over the "leadership" of Anonymous.
Hacking the hackers
The main Internet chat servers used by Anonymous have been run by a group called "AnonOps," which provides communications platforms for the group. Pointing IRC clients at anonops.ru or anonops.net would connect anyone to the servers, where they could then join channels like "#OpSony" and participate in various Anon activities.
Though Anonymous is often described as leaderless, factions like AnonOps by necessity have a loose structure; servers must be paid for, domain names must be registered, chat channels must have at least some moderation. Ryan was one of those IRC mods, and this weekend he proceeded with an attack that seized control of the AnonOps servers away from the small cabal of leaders who ran it.
Those leaders include people with handles like "shitstorm," "Nerdo," "blergh," "Power2All," and "Owen"—and if you're paying attention, you'll remember that HBGary Federal's Aaron Barr had fingered Owen as one of three "leaders" of all Anons.
The most popular channel on the old IRC servers now says simply, "anonops dead go home." Ryan also put up a set of chat logs showing Owen and others reacting to the weekend's massive denial of service attacks against AnonOps that culminated in the server takeover. (In the transcript below, "doom" is one of the AnonOps servers.)
Owen -> SmilingDevil: we lost a numbe rof servers last night
SmilingDevil -> owen:we need some more security.
Owen -> SmilingDevil: dude
Owen -> SmilingDevil: it forcved level3 to stop announing a /24
Owen -> SmilingDevil: it was in the gbps range
Owen -> SmilingDevil: doom alone got hit with 1 gb
SmilingDevil -> owen: gigabit or gigabyte?
Owen -> SmilingDevil: all leafs went down
Owen -> SmilingDevil: add it all up
Owen -> SmilingDevil: yeah huge
SmilingDevil -> owen:we need a hidden irc server for the admins.
SmilingDevil -> owen: that only they know about
Owen -> SmilingDevil: um thats called the hub
Owen -> SmilingDevil:
SmilingDevil -> owen: did they take that too?
Owen -> SmilingDevil: but anyhow
Owen -> SmilingDevil: we suffered alot of damage
The "old" leaders released a statement this morning explaining what happened over the weekend and why IRC remained down:
We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named "Ryan". He decided that he didn't like the leaderless command structure that AnonOps Network Admins use. So he organized a coup d'etat, with his "friends" at skidsr.us . Using the networks service bot "Zalgo" he scavenged the IP's and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them (which is why the network has been unstable for the past week). Unfortunately he has control of the domain names AnonOps.ru (and possibly AnonOps.net, we don't know at this stage) so we are unable to continue using them.
Not everyone buys the explanation. One Anon pointed out that the Zalgo bot in question is controlled by a user named "E," not by Ryan.
Second, Zalgo can only see chan msgs and msgs to zalgo. The net staff is saying (pretty much) Ryan used Zalgo to steal server passwords (false, I know server protocol) which were tranfered in channels in plain text for the to see (true).
Third: Take everything AnonOps says with a grain of salt. They're putting out lies and not telling the whole story.
Others pointed out that E and Ryan are friends and that E was actually recommended as an op by Ryan.
However it happened, the end result was that Ryan redirected some of the AnonOps domain names he had control over, he led an attack on the IRC servers with denial of service data floods, and he grabbed (and then published) the non-obfuscated IP addresses of everyone connected to the IRC servers. Ryan apparently also gained root access to the Zalgo network services bot, which is presumably how he harvested the non-obfuscated IP addresses, though it's not clear exactly what Zalgo did or how much access it provided Ryan.
Clashing factions
Ryan is associated with 808chan, a 4chan splinter site and apparent home of the recent denial of service attacks on AnonOps. Ryan is "DDoSing everything that he doesn't own with his band of raiders from 808chan," says one Anon.
The 808 brigade apparently valued big botnets, and made users prove their abilities before letting them participate. AnonOps had a more democratic ethos; anyone could show up, configure the Low Orbit Ion Cannon attack tool, and start firing at Sony or others.
"It's an open network where everyone, mostly newfags can join and not have to prove they're able to wield a botnet and can just join a channel of their choosing, fire up LOIC and hit some organization for reasons they believe are right," said one Anon.
Ryan's control of AnonOps extends to some of the actual domain names, including AnonOps.ru. This wasn't a hack; he was actually given administrative control over the domains some time ago by AnonOps leaders.
One Anon explained the reason for this, saying: "As for the domains, they were transferred to Ryan after some of us got vanned so he can keep the network up. What he did certainly wasn't the plan." (Getting "vanned" refers to getting picked up by the police.)
According to another Anon, the current fight was precipitated when Ryan's IRC credential were revoked. "You morons don't realize Ryan IS LEGALLY THE OWNER OF DOMAINS," he wrote. "Nerdo and Owen removed Ryan's oper, Ryan took domains."
Smoky back rooms?
Among Anons arguing over what happened this weekend, the key debate involves the issue of leaders. Anonymous also said it was leaderless and memberless, but is it? The AnonOps statement above claims that Ryan was angry at the "leaderless" structure of the group and wanted to set himself up as king; again, though, not everyone is so sure.
Owen, for instance, helps to shape the conversation and planning in IRC. One Anon complained privately to me that Owen has booted him from the IRC servers—and thus from the place where all the real work against Sony was taking place several weeks ago. "Owen has not only told me that he doesn't really give a shit about freedom of speech, he's also moderately against the action that's being taken on Sony," this Anon said.
Owen and others conduct some of their work in private, invite-only channels, which leads some Anons to suspect that the really important operations and hack attempts are only discussed in a virtual back room. As one Anon put it yesterday:
"Have you ever been in one of their invite-only chats? This is no bullshit. EVERYTHING is decided on them, the eventual course of the operation, the hivemind's target, the channel's topic, everything. Why all this secrecy? These invite-only chats have NO reason to exist. You want to keep out trolls? Turn on mute, and give voice to a few. At least we can see what is being written."
Others were even angrier. A former AnonOps member wrote:
From the fucking beginning (during the hack at Aiplex which started Operation Payback) there has been an secret club, an aristocracy in AnonOps, deciding how operations will play out in invite-only channels.
It's obvious, for they control the topic, the hivemind, the guides, every single thing behind the scenes.
I don't know if the Owen's current bureaucracy is to be trusted, or Ryan's new delegation (from 808chan!) is.
What I do know is that AnonOps no longer has a good reason to exist. The insane amount of power the channel operators wield, and the reputations gained by their NAMES, causes them to become dictator-like, as "power corrupts".
Why did we leave the comforts of the womb of anonymous imageboards, and end up in name-fagging circlejerks controlled only by a few? Why?
Anonymous, this is bullshit. Neither side, neither Ryan's coalition of hackers nor Owen's bureaucracy can be trusted.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS—it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
On Twitter, some Anons began spreading the word that Ryan had "betrayed" Anonymous, and that he had done so "to mess up all after having stolen PSN credit cards." No evidence for this last assertion was provided.
As the old AnonOps team attempted to get a handle on what had happened—and after they switched to an Indian domain name—they expressed irritation with early media mentions ("fail reporting") of the attack.
"Some 'mainstream' media is calling this the 'insider threat,'" they wrote, "which isn't really a fair representation, AnonOps doesn't have any corporate secrets, its run by the people for the people on a basis of mutual trust. Drama happens almost 24/7, occasionally drama overspills the network.
"Also we must remind the press AnonOps DOES NOT EQUAL Anonymous, saying they are one and/or the same thing in a blog/article just makes you look stupid. AnonOps is just a IRC network and a few other services that ANYONE can use, its not the only place Anonymous gather, and unlikely to be the *last* (see Streisand effect)."
But will the AnonOps leaders ever gather on a forum they don't control? Ryan took great delight in posting the following alleged comment from Owen to another AnonOps leader: "yo odnt honestly think we're goign to some other irc where we have no control do you?"
Of course, Anonymous has always been about drama and "the lulz," so the current confusion may not even bother them that much; this is just par for the course. But it's certainly amusing to others.
"Lmao. You fucking twits can't even keep your shit safe," wrote someone watching the debacle. "This literally made me laugh out loud. Not lol, but laugh. You all are so stupid."
Further reading
Anons commenting on the news (anonnews.org)
Ryan's dump of AnonOps chats (sites.google.com)
quote:Overheid niet voorbereid op cyberaanval
De Nederlandse overheid is onvoldoende voorbereid op een cyberaanval van internationale omvang, die razendsnel een maatschappijontwrichtende crisis kan veroorzaken. Dat blijkt uit een grote oefening die de overheid zelf onlangs heeft gehouden.
Het AD schrijft vandaag dat uit de evaluatie van de oefening blijkt dat het de overheid vooral ontbreekt aan goede coördinatie. Ook lijkt zij slecht doordrongen van de ernstige gevolgen die een cyberaanval kan hebben. Zo kan zo'n aanval ertoe leiden dat hackers het betalingsverkeer platleggen. Maar ook vitale systemen als die van de luchtverkeersleiding op Schiphol of olieraffinaderijen in de Rotterdamse haven, zijn kwetsbaar.
Cybercrises
Bij de grote oefening Cyberstorm III werd nagebootst hoe in Nederland miljoenen computers in handen van hackers komen. Vandaag wordt de Tweede Kamer ingelicht over de resultaten.
Volgens wetenschappers waren de crisiscoördinatoren vooral aan het vergaderen en overleggen. Het ontbrak aan coördinatie en overzicht. 'Nederland is nog onbekend met cybercrises, dat was bij de oefening goed te merken,' zegt hoofdonderzoeker Marcel Quanjel in het AD.
Maatregelen
Staatssecretaris Fred Teeven schrijft de Tweede Kamer dat de overheid door de oefening is gewezen op de 'complexiteit van ict-crises'. Volgens hem zijn er al maatregelen getroffen. Zo komt volgend jaar het Nationaal Cyber Security Centrum in bedrijf. Ook wil Teeven meer oefeningen.
quote:Hunt for hackers of US government sites leads to Essex teenager's bedroom
Police believe Ryan Cleary, 19, had 'significant role' in hacker group LulzSec which is thought to have attacked CIA website
Investigators believe a teenager arrested at his family home in Essex may have been a "significant" figure in a computer hacking group alleged to have staged attacks against websites belonging to the US government, the electronics giant Sony, and an elite British crime unit.
Scotland Yard cybercrime detectives were questioning Ryan Cleary, 19, over the attacks carried out by the LulzSec group, which mostly targeted websites belonging to institutions and companies in the US.
The events leading to the arrest of Cleary involved an investigation by British police and the US Federal Bureau of Investigation. The FBI's involvement, plus the nature of the targets, raised the prospect that Washington may seek the teenager's extradition to the US, just as it did in the case of UFO obsessive Gary McKinnon, a saga that is still ongoing.
LulzSec have attacked the websites of the CIA, the US senate, US broadcasters and, on Monday, the day of Cleary's arrest, the hackers bought down the website of Britain's Serious and Organised Crime Agency (Soca).
LulzSec is believed to have established itself as a formidable splinter group to Anonymous, the hacking group embroiled in the WikiLeaks fallout, with high-profile attacks on the Gawker website in December last year and a devastating assault on the US security firm HBGary in February.
Members of Anonymous claimed in emails to the Guardian that Cleary, though involved, was not the "mastermind" behind any hacking group. "He owned the server which LulzSec used to communicate using IRC [internet relay chat, a bit like instant messenger]."
UK records show that a company called Arcusvoice, which held domain names used to host websites, was registered to Cleary's home address in Wickford, Essex.
"Ryan Cleary was not a mastermind hacker," the email continued. "He could not keep his own personal information safe. He simply provided the means of communication, just like if two people send letters to each other, FedEx/Royal Mail/DHL are the providers of communication."
Cleary's brother, 22-year-old Mitchell, said: "He's not the sort of person to do anything mad or go out and let his hair down or do anything violent. He stays in his room – you'll be lucky if he opens the blinds, but that's just family, isn't it? I barely see him – I'm more of a football person – he's more of an inside person."
Mitchell said his brother had fallen out with people over WikiLeaks: "He used to be part of WikiLeaks and he has upset someone from doing that and they have made a Facebook page having a go at him."
James Rounce, a neighbour of Cleary, said: "They moved in about 10 years ago and have been pleasant neighbours. I think he had been away at university and had come back for the holidays or because he had finished his exams. You could tell he was very bright just from the way he spoke and presented himself."
LulzSec staged two types of attacks. One was hacking into websites, the other was effectively blocking a website from being used, called a denial of service.
As recently as May, the group attacked websites belonging to broadcasters, including Fox and the US public service broadcaster, PBS. LulzSec also claimed credit for an attack on the US X Factor website, which experts believe indicates the relatively young average age of the group.
Earlier this month, LulzSec declared its intention to break into government websites and leak confidential documents. Yesterday it dismissed claims it had staged an attack on the British census.
According to security experts, it is a small and close-knit team – although they probably do not operate in the same country or even time zone. The security firm Imperva believes there are just eight members, including one who orchestrated the attack on the US security company HBGary, and another who can call on the resources of a "botnet" of virus-infected PCs to attack any website on the net.
Researcher Rik Ferguson of security software firm Trend Micro said "it seems to be a tight-knit group – they don't let people join them, they just take suggestions from people of what to target for a hack next."
quote:LulzSec rogue suspected of Bitcoin hack
More than $9m of online currency was stolen in weekend attack on Bitcoin currency exchange that could cost members of Anonymous and LulzSec thousands of dollars each
ore than 400,000 Bitcoins – 6% of all the virtual currency presently in circulation – for an initial price of $17.50 each, which would have netted $7m at a constant price.
But the attempt to sell such a large volume of coins at once drove the value of the currency down almost to zero, before trading on the site was suspended.
More than 60,000 users' details were compromised in the attack and have since been posted publicly in dozens of places across the internet. Trading on the MtGox site has still not been reinstated since the attack, leaving the future of the fledgling currency in doubt.
Bitcoins are produced without the involvement of any governments or banks; instead, they are generated by using software (also called Bitcoin). The idea was created in 2009 by a Japanese programmer.
Bitcoins are not issued by a central authority, but instead generated by a mathematical algorithm after computers complete a certain number of complex calculations.
Some of most experienced members of the Anonymous and LulzSec hacker collectives are believed to have botnets of more than 100,000 compromised computers.
If that many machines were set to work generating Bitcoins, they could create up to $7,500 worth a day for as long as Bitcoins trade at current levels – meaning members of the hacker collectives could be among the biggest losers if Bitcoins' value does not recover as and when MtGox reopens. In the hours before the hack, the total value of the currency in circulation was more than $150m.
Anonymity and security are the central propositions of the currency, which has attracted controversy after being used in sites selling drugs and pornography.
High-profile organisations accepting the coins include WikiLeaks and the US lobby group Electronic Frontiers Foundation, who have suspended their acceptance of Bitcoins in the wake of the hack.
MtGox says access to its site was gained after a financial auditor's computer was hacked, and insists its site was not compromised.
However, Amir Taaki, who runs the rival Bitcoin exchange Britcoin.co.uk, disputes this chain of events. Developers working on his site, which runs on much of the same software as MtGox, found a security hole several days before the hack was carried out. He says MtGox was notified publicly and privately of the issue.
"Due to the recent events at MTGox.com, we at Britcoin have decided to move our servers to a new location," read a Britcoin statement. "MTGox suffered an SQL injection [a form of hacking attack that creates direct access to databases and files] which means access to the site's funds were in the hands of the malicious hacker. As such, until we see evidence to the contrary, for security reasons we are assuming that MTGox has none of its clients' bitcoins."
Other senior coders in the Bitcoin community claim to have been offered the full database of MtGox users days before the hack was carried out. Though they had not verified whether the database was genuine, it came from the same intermediary who has been testing interest in selling or distributing details from the Sega Pass hack.
Members of Lulzsec, the hacker group whose alleged member Ryan Cleary was arrested in Essex on Tuesday, denied responsibility for the Sega Pass hack, as did several members of Anonymous.
The recent spate of hacks denied by both groups – neither of which usually seeks to hide from the limelight – raises the possibility of a third, as yet unnamed, group of hackers carrying out the attacks.
Lulzsec and Anonymous members stand to lose a significant amount of money if Bitcoins fail. Several members of both groups – speaking directly and through intermediaries – claim to know of others using thousands of hacked computers to generate Bitcoins.
quote:A sinister cyber-surveillance scheme exposed
Hacked emails from security contractor HBGary reveal a disturbing public-private partnership to spy on web users
When President Eisenhower left office in 1960, he provided the American people with a warning.
"In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry.
Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and its parent company HBGary.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Despite the details I have provided in the document – which is also now in the possession of several major news outlets and which may be published in whole or in part by any party that cares to do so – there remains a great deal that is unclear about Romas/COIN and the capabilities it comprises. The information with which I've worked consists almost entirely of email correspondence between executives of several firms that together sought to win the contract to provide the programme's technical requirements, and because many of the discussions occurred in meetings and phone conversations, the information remaining deals largely with prospective partners, the utility of one capability over another, and other clues spread out over hundreds of email exchanges between a large number of participants.
The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.
Altogether, the existence and nature of Romas/COIN should confirm what many had already come to realise over the past few years, in particular: the US and other states have no intention of allowing populations to conduct their affairs without scrutiny. Such states ought not complain when they find themselves subjected to similar scrutiny – as will increasingly become the case over the next several years.
Barrett Brown
guardian.co.uk, Wednesday 22 June 2011 19.39 BST
Article history
Ik heb een harde kern van 30 lurkers. En daarnaast gaat het om het principe: We're all Anonymous. Information is free.quote:Op donderdag 23 juni 2011 00:43 schreef Yuri_Boyka het volgende:
Eeh man ik begrijp iets niet, waarom al die moeite terwijl er niemand reageert?
Hoe weet je dat?quote:Op donderdag 23 juni 2011 00:49 schreef Papierversnipperaar het volgende:
[..]
Ik heb een harde kern van 30 lurkers.
quote:FBI takes down legit sites in search of LulzSec
It looks like the blundering efforts of the FBI to try to pin down the likes of LulzSec have caused a bunch of legitimate businesses to go offline.
Reports are emerging that the bungling snoops raided a datacentre in the US yesterday and wandered off with a collection of hardware. The datacentre was run by Swiss firm DigitalOne, which its itself now offline.
DigitalOne’s chief executive, Sergej Ostroumow, was forced to email clients explaining the shenanigans. “This problem is caused by the FBI, not our company," he wrote. "In the night FBI has taken 3 enclosures with equipment plugged into them, possibly including your server - we cannot check it.
“After FBI’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.”
According to the New York Times, the FBI has teamed up with the CIA an other 'law' enforcement agencies around the world in an increasingly frantic attempt to track down LulzSec and its cronies.
In their efforts they seem to be causing as much mayhem as the hackers themselves.
Read more: http://www.thinq.co.uk/20(...)zsec9/#ixzz1Q349eQ6X
Door het analyseren van de beschikbare data.quote:
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
Yep!quote:Op dinsdag 21 juni 2011 22:54 schreef Papierversnipperaar het volgende:
Even een flashback, 10 mei:
Anonops #6: Anonymous en de MO-revoluties
[..]
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.
quote:19 year old Brit arrested for hacking - Ryan Cleary - has been in hacker feuds before
The 19 year old Essex boy who has been arrested by the British police on the request of the FBI has been embroiled in hacker feuds before.
Ryan Cleary of Wickford Essex has been taken into a London police station for questioning about cyber crime. The police will want to talk about the huge hack of Sony earlier this year, attacks on the CIA and a possible though unconfirmed hack of UK Census data in past few days.
So far the group believed to be behind the attacks - LulzSec have denied that Cleary is anything to do with them. They said on their official Twitter:
"Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here!"
Other places, state that he is associated with them and helps to moderate message boards for them.
It could be that Cleary has been turned over to the police by a rival hacker for upsetting other people in the hacking community. Looks like he did that a lot. He was fingered out by Anonymous in May 2011 for bad behaviour, and his personal details were published on a webpage by Anonymous as punishment for trying to force a change in the group's direction. Something that it seems he had been guilty of before back in 2008 when he was only 16, for attempting a DDos attack on Fourchan, the hackers' message boards site.
Even if Cleary isn't directly connected to LulzSec or Anonymous, the group's philosophy encourages other people to take part. So it's possible he or someone else could have acted separately to these main groups...
LulzSec in partnership with Anonymous have declared a widespread operation against governments called #AntiSec. This statement was put in pastebin, and has been tweeted by the official LulzSec account so we believe it to be genuine:
"Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood."
This is going to be great.
Looks like Cleary, was already guilty of pissing off Anonymous - which led to the spill of his personal details onto the internet
quote:Lulzsec hackers take crucial step towards getting laid
Lulzsec computer hackers scored an important victory in their bid to achieve sexual congress with a fellow human being, it emerged last night.
The Brazilian government joined the CIA and the US Senate as the latest victim of the group’s online antics, raising their profile to the point where insecure and emotionally damaged teenage girls might start to think they’re a bit ‘cool’.
Suspected LulzSec hacker 19-year-old Ryan Cleary was arrested in the UK on Monday night following an investigation by Scotland Yard, who told reporters that a “significant amount of crusty material” had been recovered from his bedroom and would now be subjected to forensic examination by officers wearing special gloves.
Mr Cleary’s family expressed disbelief that the self-confessed computer ‘enthusiast’ had anything to do with hacking.
His mother Rita, 45, said her son ‘lives his life online’ but she thought he had spent his time frantically masturbating in his bedroom like any other normal teenage boy.
She added that, as he was led away by police, he told her “whatever you do don’t go in the draw of my bedside cabinet – and I’m only looking after it for a friend!”
Lulzsec arrests
Experts are warning that the stereotypical ‘bad boy’ to which girls are historically attracted might be changing, with a shift away from the truant hot-hatch driving hoodie, to the pasty teenager with a 50MB Internet connection.
Social Anthropologist Sheila Williams told us, “What we are seeing is a definite move towards a sexual relationship for many of these so-called hackers, particularly for those with access to teenage girls with very low self-esteem.”
“If the FBI really want this problem to go away, they should just drop their investigations and put a fraction of that money towards hiring a crack team of highly-skilled prostitutes.”
“Trust me, these guys will no longer be a threat to national security from the very second they realise what a real breast feels like.”
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?quote:
Bepaalde lichaamsvloeistoffenquote:Op donderdag 23 juni 2011 02:31 schreef Yuri_Boyka het volgende:
[..]
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?
Vloeibaar opgeslagen?quote:Op donderdag 23 juni 2011 02:46 schreef Papierversnipperaar het volgende:
[..]
Bepaalde lichaamsvloeistoffen
Ik zou het bericht niet al te serieus nemen.quote:Op donderdag 23 juni 2011 02:51 schreef Yuri_Boyka het volgende:
[..]
Vloeibaar opgeslagen?
En wat is er in dat bericht met onzekere.meisjes?
quote:Massive US-led spy operation on Arab world uncovered
A crowd sourced investigation dubbed Project PM has probed reams leaked emails involving US intelligence companies and uncovered a massive spy operation targeting social media and telecommunications in the Arab world.
The allegations, derived from 70,000 emails stolen from HBGary earlier this year, detailed a project dubbed Romas/COIN, to be proceeded by Odyssey, which could automatically analyse millions of conversations.
The following report has been republished with permission from Barrett Brown, Project PM.
quote:The new revelation provides for a disturbing picture, particularly when viewed in a wider context. Unprecedented surveillance capabilities are being produced by an industry that works in secret on applications that are nonetheless funded by the American public – and which in some cases are used against that very same public.
quote:Website NAVO doelwit van hackers
Een publiekswebsite van de NAVO is het doelwit geworden van onbekende hackers. De site die, geen gevoelige informatie bevat maar, onder meer een webwinkel voor digitale boeken herbergt, is inmiddels afgesloten.
Het bondgenootschap werd door de politie attent gemaakt op het potentiële gegevenslek. De NAVO sloeg de cyberaanval af door de website direct af te sluiten voor het publiek. Abonnees van de dienst zijn op de hoogte gebracht.
De verdediging tegen dit soort aanvallen staat hoog op de agenda bij de NAVO, en is aangewezen als ontwikkelingspunt. In de Estische hoofdstad Tallinn is een centrum ter verdediging tegen cyberaanvallen ingericht. Het centrum zorgt ook voor het herstel zodra hackers toeslaan.
quote:anonops_live Viral Revolution
#anonops : Your Anon News • Greetings, members of NATO. We are Anonymous.: youranonnews.tumblr.com... http://bit.ly/k53Zfc #anonymous
quote:Greetings, members of NATO. We are Anonymous.
In a recent publication, you have singled out Anonymous as a threat to “government and the people”. You have also alleged that secrecy is a ‘necessary evil’ and that transparency is not always the right way forward.
Anonymous would like to remind you that the government and the people are, contrary to the supposed foundations of “democracy”, distinct entities with often conflicting goals and desires. It is Anonymous’ position that when there is a conflict of interest between the government and the people, it is the people’s will which must take priority. The only threat transparency poses to government is to threaten government’s ability to act in a manner which the people would disagree with, without having to face democratic consequences and accountability for such behavior. Your own report cites a perfect example of this, the Anonymous attack on HBGary. Whether HBGary were acting in the cause of security or military gain is irrelevant - their actions were illegal and morally reprehensible. Anonymous does not accept that the government and/or the military has the right to be above the law and to use the phony cliche of “national security” to justify illegal and deceptive activities. If the government must break the rules, they must also be willing to accept the democratic consequences of this at the ballot box.We do not accept the current status quo whereby a government can tell one story to the people and another in private. Dishonesty and secrecy totally undermine the concept of self rule. How can the people judge for whom to vote unless they are fully aware of what policies said politicians are actually pursuing?
When a government is elected, it is said to “represent” the nation it governs. This essentially means that the actions of a government are not the actions of the people in government, but are actions taken on behalf of every citizen in that country. It is unacceptable to have a situation in which the people are, in many cases, totally and utterly unaware of what is being said and done on their behalf - behind closed doors.
Anonymous and WikiLeaks are distinct entities. The actions of Anonymous were not aided or even requested by WikiLeaks. However, Anonymous and WikiLeaks do share one common attribute: They are no threat to any organization - unless that organization is doing something wrong and attempting to get away with it.
We do not wish to threaten anybody’s way of life. We do not wish to dictate anything to anybody. We do not wish to terrorize any nation.
We merely wish to remove power from vested interests and return it to the people - who, in a democracy, it should never have been taken from in the first place.
The government makes the law. This does not give them the right to break it. If the government was doing nothing underhand or illegal, there would be nothing “embarrassing” about Wikileaks revelations, nor would there have been any scandal emanating from HBGary. The resulting scandals were not a result of Anonymous’ or Wikileaks’ revelations, they were the result of the CONTENT of those revelations. And responsibility for that content can be laid solely at the doorstep of policymakers who, like any corrupt entity, naively believed that they were above the law and that they would not be caught.
A lot of government and corporate comment has been dedicated to “how we can avoid a similar leak in the future”. Such advice ranges from better security, to lower levels of clearance, from harsher penalties for whistleblowers, to censorship of the press.
Our message is simple: Do not lie to the people and you won’t have to worry about your lies being exposed. Do not make corrupt deals and you won’t have to worry about your corruption being laid bare. Do not break the rules and you won’t have to worry about getting in trouble for it.
Do not attempt to repair your two faces by concealing one of them. Instead, try having only one face - an honest, open and democratic one.
You know you do not fear us because we are a threat to society. You fear us because we are a threat to the established hierarchy. Anonymous has proven over the last several years that a hierarchy is not necessary in order to achieve great progress - perhaps what you truly fear in us, is the realization of your own irrelevance in an age which has outgrown its reliance on you. Your true terror is not in a collective of activists, but in the fact that you and everything you stand for have, by the changing tides and the advancement of technology, are now surplus to requirements.
Finally, do not make the mistake of challenging Anonymous. Do not make the mistake of believing you can behead a headless snake. If you slice off one head of Hydra, ten more heads will grow in its place. If you cut down one Anon, ten more will join us purely out of anger at your trampling of dissent.
Your only chance of defeating the movement which binds all of us is to accept it. This is no longer your world. It is our world - the people’s world.
We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us…
quote:Dox everywhere: LulzSec under attack from hackers, law enforcement
Hacking group Lulz Security has found itself coming under attack from all angles, drawing unwanted attention from both law enforcement and other hackers groups. Though the group's antics have won it many fans who appreciate LulzSec's anti-establishment leanings, they've also earned plenty of enemies, and those enemies have started to fight back. So far, they've posted LulzSec's "dox"—the names, pictures, and addresses of the people claimed to be the ringleaders of the group.
Since LulzSec first gained prominence, pro-US hacker th3j35t3r ("The Jester") has worked to uncover their identities and embarrass them. th3j35t3r, who has made a name for himself by knocking pro-jihad Web sites offline, has butted heads with Anonymous in the past, opposing the faceless collective's support for WikiLeaks. He worked to disrupt the activities of the AnonOps faction—taking servers offline and revealing names of the participants. Since many of AnonOps' key players moving on to form LulzSec, th3j35t3r's focus has shifted accordingly.
th3j35t3r is staunchly pro-establishment, regarding the LulzSec Distributed Denial of Service attacks on the CIA Web site as terrorism, LulzSec members as bullies, and those who have suffered from LulzSec's antics as victims.
Another group claiming to side with LulzSec's victims and oppose LulzSec's campaign against security organizations are "Web Ninjas". Web Ninjas have posted chat logs and dox of a number of alleged LulzSec members.
LulzSec has also been taking heat from the anti-establishment side of the fence, represented by TeaMp0isoN_. TeaMp0isoN_ members don't care about the victims, don't deny their blackhat status, and don't like law enforcement or security companies. Instead, they're motivated by disdain for LulzSec's methods and public profile—they think that LulzSec are "scene fags." LulzSec's tools have been simple SQL injection and Local File Inclusion vulnerabilities, and botnet-powered Distributed Denial of Service attacks: in TeaMp0isoN_'s view, this is not enough to earn the label hacker.
Beyond publishing information about LulzSec team members, TeaMp0isoN_ defaced the Web site of LulzSec and AnonOps participant joepie91. joepie91's relationship with LulzSec and AnonOps has long been something of an oddity; he's open about his participation in the groups, but continues to argue that he does nothing more than talk, and takes no active role in these groups' illegal activities. Whether active or passive, TeaMp0isoN_ plainly regard him as fair game, and doxed him on Twitter.
Meanwhile, LulzSec has been doing some doxing of its own. In the immediate wake of the arrest of British teenager Ryan Cleary, LulzSec claimed he had nothing to do with their group, that position was later softened, with the acknowledgement that Cleary operated an IRC server that LulzSec uses. Claiming that "snitches get stitches", LulzSec then doxed a coupled of individuals whose leaks of private chat logs and other incriminating data apparently led to Cleary's arrest.
Law enforcement agencies aren't standing still, either. After his arrest on Monday night, British teenager Ryan Cleary has been charged by police with creating and operating a botnet and performing Distributed Denial of Service attacks against the Web sites of the Serious Organized Crime Agency (SOCA, the UK's closest counterpart to the FBI), the International Federation of the Phonographic Industry (IFPI), and the British Phonographic Industry (BPI). He faces a custody hearing tomorrow morning.
For the time being, LulzSec appears to be shrugging off the attacks, continuing to laugh, at least in public, at its accusers. The group promises that it will be publishing more stolen documents on Friday: the first fruit from its "Anti-Security" venture, in which it has sought to attack and embarrass computer security companies and law enforcement agencies.
quote:LulzSec claims attack on US police website
Hacker group says it broke into the computers of an Arizona law enforcement agency and planned to release more classified documents
The hacking collective LulzSec says it has hacked into the website and database of the Arizona Department of Public Safety (DPS) and released details of staff, emails and correspondence on public file-sharing sites.
A number of DPS officers told the Associated Press that they had been inundated with calls to their home and mobile phones from strangers on Thursday night, and that they were trying to change their numbers.
A DPS spokesman confirmed that the agency's computer system had been breached and was taking additional security safeguards that he wouldn't disclose.
The hackers said they had specifically targeted the department in that state because of its tough immigration law "and the racial profiling anti-immigrant police state that is Arizona". Arizona has introduced tough identification laws which have been criticised by President Obama and others. However, they have been frozen due to legal challenges.
But even as the details were being released, pressure was growing on the group from rival hackers unhappy about what they see as a lack of discretion in the choices of its targets. LulzSec has taken credit for hacking into Sony Pictures Europe, a number of games sites including Eve Online and Sega, defacing the PBS website and attacking the CIA website, the US Senate computer systems and the UK's Serious Organised Crime Agency.
The collective said on its website that it was releasing "hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement."
The LulzSec group also said it planned to release "more classified documents and embarrassing personal details of military and law enforcement" every week but it was unclear whether other Arizona agencies were targeted.
Meanwhile rival hackers, including one called The Jester – an ex-US military member – have been concentrating on tracking down the group's website and identifying its members. The Jester said on Twitter on Thursday that he had traced the Lulz Security website to an ISP in Malaysia, and provided a program for people to help track it down.
Other hackers are also trying to gather data about the group, which the Guardian understands was weakened earlier this month after some members worried about the outcome of attacking US government sites. In the UK one man, Ryan Cleary, has been arrested by the police and charged with offences under the Computer Misuse Act relating to attacks on a number of sites including Soca's.
The Maricopa County Sheriff's Office in Arizona was taking unspecified countermeasures to protect its computer system, officials there said on Thursday night.
Manuel Johnson, a spokesman for the FBI's Phoenix division, said the agency was aware of the situation but couldn't comment on whether the FBI was investigating it.
The Arizona Republic reported that experts worked Thursday evening to close external access to DPS' system.
quote:LulzSec IRC leak: the full record
Full text of the chatroom logs of discussions between the hackers involved in LulzSec, aka Lulz Security, reveal the tensions inside the group
quote:Inside LulzSec: Chatroom logs shine a light on the secretive hackers
Leaked IRC logs identify LulzSec members and show a disorganised group obsessed with its media coverage and suspicious of other hackers
It was a tight-knit and enigmatic group finding its feet in the febrile world of hacker collectives, where exposing and embarrassing your targets is just as important as protecting your own identity.
But leaked logs from LulzSec's private chatroom – seen, and published today, by the Guardian – provide for the first time a unique, fly-on-the-wall insight into a team of audacious young hackers whose inner workings have until now remained opaque.
LulzSec is not, despite its braggadocio, a large – or even coherent – organisation. The logs reveal how one hacker known as "Sabu", believed to be a 30-year-old security consultant, effectively controls the group of between six and eight people, keeping the others in line and warning them not to discuss what they have done with others; another, "Kayla", provides a large botnet – networks of infected computers controlled remotely – to bring down targeted websites with distributed denial of service (DDoS) attacks; while a third, "Topiary", manages the public image, including the LulzSec Twitter feed.
They turn out to be obsessed with their coverage in the media, especially in physical newspapers, sharing pictures of coverage they have received in the Wall Street Journal and other papers. They also engineered a misinformation campaign to make people think they are a US-government sponsored team.
They also express their enmity towards a rival called The Jester – an ex-US military hacker who usually attacks jihadist sites, but has become embroiled in a dispute with Anonymous, WikiLeaks and LulzSec over the leaked diplomatic cables and, more recently, LulzSec's attacks on US government websites, including those of the CIA and the US Senate.
In a further sign that the spotlight is beginning to engulf LulzSec, a lone-wolf hacker managed to temporarily cripple the group's website on Friday morning. Originally thought to be the work of The Jester, an activist, known as Oneiroi, later claimed responsibility for the attack but did not provide an explanation.
The group's ambitions went too far for some of its members: when the group hit an FBI-affiliated site on 3 June, two lost their nerve and quit, fearing reprisals from the US government. After revealing that the two, "recursion" and "devrandom" have quit, saying they were "not up for the heat", Sabu tells the remaining members: "You realise we smacked the FBI today. This means everyone in here must remain extremely secure."
Another member, "storm", then asks worriedly: "Sabu, did you wipe the PBS bd [board] logs?", referring to an attack by LulzSec on PBS on 29 May, when they planted a fake story that the dead rapper Tupac Shakur was alive. If traces remained there of the hackers' identities, that could lead the FBI to them.
"Yes," Sabu says. "All PBS logs are clean." Storm replies: "Then I'm game for some more." Sabu says: "We're good. We got a good team here."
Documenting a crucial five-day period in the group's early development from 31 May to 4 June, the logs – whose authenticity has been separately confirmed through comments made online by LulzSec's members – are believed to have been posted online by a former affiliate named "m_nerva". They contain detailed conversations between the group, who have in recent weeks perpetrated a series of audacious attacks on a range of high-profile targets, including Sony, the CIA, the US Senate, and the UK's Serious Organised Crime Agency (SOCA).
LulzSec threatened m_nerva on Tuesday in a tweet saying "Remember this tweet, m_nerva, for I know you'll read it: your cold jail cell will be haunted with our endless laughter. Game over, child." As an explanation, they said: "They leaked logs, we owned them [took over their computer], one of them literally started crying for mercy". The leaked logs are the ones seen by the Guardian.
The conversations confirm that LulzSec has links with – but is distinct from – the notorious hacker group Anonymous. Sabu, a knowledgeable hacker, emerges as a commanding figure who issues orders to the small, tight-knit team with striking authority.
Despite directing the LulzSec operation, Sabu does not appear to engage in the group's public activity, and warns others to be careful who and how they talk outside their private chatroom. "The people on [popular hacker site] 2600 are not your friends," Sabu warns them on 2 June. "95% are there to social engineer [trick] you, to analyse how you talk. I am just reminding you. Don't go off and befriend any of them."
But the difficulty of keeping their exploits and identities secret proves difficult: Kayla is accused of giving some stolen Amazon voucher codes to someone outside the group, which could lead back to one of their hacks. "If he's talking publicly, Kayla will talk to him," Sabu comments, bluntly.
Topiary, who manages the public image of LulzSec – which centres around its popular Twitter feed, with almost 260,000 followers – also acted previously as a spokesman for Anonymous, once going head-to-head in a live video with Shirley Phelps-Roper of the controversial Westboro Baptist Church, during which he hacked into the church's website mid-interview.
His creative use of language and sharp sense of humour earns praise from his fellow hackers in the chat logs, who tell him he should "write a fucking book". On one occasion, after a successful DDoS attack brings down a targeted web server, Topiary responds in characteristic fashion to the hacker responsible, Storm: "You're like our resident sniper sitting in the crow's nest with a goddamn deck-shattering electricity blast," he writes. "Enemy ships being riddled with holes."
But while LulzSec has a jovial exterior, and proclaims that its purpose is to hack "for the lulz" (internet slang for laughs and giggles), Sabu is unremittingly serious. Domineering and at times almost parental, he frequently reminds the other hackers of the dangers of being tracked by the authorities, who the logs reveal are often hot on their heels.
During one exchange, a hacker named Neuron starts an IAmA (Q and A) session for LulzSec on the website Reddit for "funzies" and to engage with the public. This immediately raises the ire of Sabu, who puts an angry and abrupt halt to it.
"You guys started an IAmA on reddit?" Sabu asks in disbelief. "I will go to your homes and kill you. If you really started an IAmA bro, you really don't understand what we are about here. I thought all this stuff was common knowledge ... no more public apperances [sic] without us organizing it."
He adds: "If you are not familiar with these hostile environments, don't partake in it."
The logs also reveal that the group began a campaign of disinformation around LulzSec. Their goal was to convince – and confuse – internet users into believing a conspiracy theory: that LulzSec is in fact a crack team of CIA agents working to expose the insecurities of the web, headed by Adrian Lamo, the hacker who reported the alleged WikiLeaks whistleblower Bradley Manning to the authorities.
"You guys are claiming that LulzSec is a CIA op ... that Anonymous is working to uncover LulzSec ... that Adrian Lamo is at the head of it all ... and people actually BELIEVE this shit?" writes joepie91, another member. "You just tell some bullshit story and people fill in the rest for you."
"I know, it's brilliant," replies Topiary. The attempts did pay off, with some bloggers passing comments such as: "I hypothesize that this is a government 'red team' or 'red cell' operation, aimed at building support for government intervention into internet security from both the public and private sectors."
The group monitors news reports closely, and appears to enjoy – even thrive – on the publicity its actions bring. But the logs show that the members are frustrated by the efforts of a self-professed "patriot-hacker" known as the Jester (or th3j35t3r), whose name is pejoratively referenced throughout.
The Jester is purportedly an ex-US military hacker, and was responsible for high-profile attacks on WikiLeaks prior to the release of US diplomatic cables in November. In recent weeks he has made LulzSec his principal target, describing them as "common bullies". Topiary in turn dismisses The Jester as a "pompous elitism-fuelling blogger" – but the group is always worried that The Jester or his associates are trying to track them down.
The Jester claims LulzSec are motivated by money and points to allegations that the group tried to extort money from Unveillance, a data security company. Similar accusations against LulzSec by two other groups, "Web Ninjas" and "TeaMp0isoN_". Web Ninjas say they want to see LulzSec "behind bars" for committing "insane acts ... in the name of publicity or financial gain or anti-govt agenda".
The logs do not reveal any discussion of extortion between the LulzSec inner circle; nor do they indicate any underlying political motivations for the attacks. But amid the often tense atmosphere depicted in the logs the hackers do occasionally find time to talk politics.
"One of these days we will have tanks on our homes," writes trollpoll, shortly after it emerged the US government was reclassifying hacking as a possible act of war. "Yea, no shit," responds Storm.
"Corporations should realize the internet isn't theirs," adds joepie91. "And I don't mean the physical tubes, but the actual internet ... the community, idea, concept."
"Yes, the utopia is to create a new internet," says trollpoll. "Corporation free."
On Monday 20 June, Sabu's worst fears may have been confirmed when a 19-year-old named Ryan Cleary was arrested in Wickford, Essex and later charged with a cyber attack in connection with a joint Scotland Yard and FBI probe in to a hacking group believed to be LulzSec.
Metropolitan Police Commissioner Sir Paul Stephenson described the arrest as "very significant", though LulzSec itself was quick to claim Cleary was not a member of the group and had only allowed it to host "legitimate chatrooms" on his server.
"Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us," the group tweeted.
An individual named "Ryan" is occasionally referenced by the hackers in the logs, though he himself does not feature and appears to have only a loose association with the group.
Scotland Yard confirmed on Thursday that it was continuing to work with "a range of agencies" as part of an "ongoing investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group".
In response to the leaked logs, LulzSec posted a statement on the website pastebin, claiming users named joepie91, Neuron, Storm and trollpoll were "not involved with LulzSec" and rather "just hang out with us".
They added: "Those logs are primarily from a channel called #pure-elite, which is /not/ the LulzSec core chatting channel. #pure-elite is where we gather potential backup/subcrew research and development battle fleet members – ie, we were using that channel only to recruit talent for side-operations."
The group has vowed to continue its actions undeterred. But they now face a determined pincer movement from the FBI, UK police, and other hackers – including The Jester, who has been relentless in his pursuit of them for more than a fortnight. If its members' real identities are revealed, LulzSec may vanish as quickly as it rose to prominence
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |