De oorlogsverklaring aan Scientologie was de eerstequote:
Ik neem aan hetzelfde als met kritiek op moslims: het moet wel ergens op slaan. Alleen maar bashen is nogal nutteloos.quote:Op zaterdag 9 juli 2011 09:55 schreef RobertoCarlos het volgende:
Stel dat iemand kritiek heeft op anonops, wordt die persoon dan aangepakt of is dat dan het vrije woord?
quote:Anonymous threatens police over phone hacking and Julian Assange
Senior source inside hacker collective seeks to embarrass Metropolitan police and judges with 'explosive' revelations
Figures at the top of hackers' collective Anonymous are threatening to attack the Metropolitan police's computer systems and those controlled by the UK judicial system, warning that Tuesday will be "the biggest day in Anonymous's history".
The collective is understood to be seeking to express anger over News International's phone hacking and at the threatened extradition of WikiLeaks founder Julian Assange.
A Twitter feed purporting to belong to Sabu, a senior figure within the group and the founder of the spin-off group LulzSec, which hacked a site linked to the CIA and the UK's Serious Organised Crime Agency, promised two releases of information would be launched within a day.
"Everyone brace," he tweeted. "This will be literally explosive."
A follow-up message read: "ATTN Intelligence community: Your contractors have failed you. Tomorrow is the beginning."
The account, @anonymouSabu, has not been verified as belonging to Sabu – but it has over 7,700 followers and has been referenced by the "official" Anonymous @anon_central account on Twitter.
Sources close to the collective were unusually close-lipped about the targets of tomorrow's hack, but talk within chat channels has suggested several top-level members of Anonymous are eager to launch attacks based around Julian Assange's appeal hearing against extradition, which begins on Tuesday.
Others are also believed to have proposed targeting the Met in retaliation for alleged payments to police officers by News of the World reporters, and the general response to the phone hacking scandal.
Other speculation centres around material claimed to have been obtained last week from contractors relating to security and secrecy of "former world leaders", or plans to target a senior leaders' retreat at Bohemian Grove, California.
As is typical in the chaotic and occasionally paranoid Anonymous community, other sources close to the collective are warning some prominent members are probably engaging in "disinformation campaigns" ahead of any action.
Communication problems around the planned releases were compounded as the main chat channel used by Anonymous was offline for much of Monday, leaving even those close to senior members of the collective unable to verify rumours ahead of the release.
Rumours on Friday suggested that one Anonymous member had broken into the News International servers and taken copies of some internal emails which were being offered for sale or even ransom. However this could not be confirmed, and the Guardian has not seen any evidence that the claimed email stash is legitimate, although News International's site is understood to have been "probed" by members of Anonymous at the end of last week.
Last Wednesday, two days after the Dowler revelations, a listing of emails of NoW staff appeared on Pastebin, a favourite site for posting the results – or beginnings – of attacks against all sorts of sites by Anonymous and other hacker groups.
One source told the Guardian that News International's server had been probed for up to 30 minutes at a time last week by hackers using "proxy chaining" – a method of logging in via a number of remote computers – to disguise their identity. "Everyone thinks Interpol will get involved at some point," the source said.
The hackers' anger at the company was ignited by the revelation last week that a private detective acting for NoW had listened into voicemails on the phone of the murdered teenager Milly Dowler, which may have interfered with the police investigation to find her.
Anonymous has previously attacked PayPal and Visa over their refusal, following orders from the US government, to process donations for WikiLeaks. It has also carried out online attacks against the Church of Scientology over what is seen as suppression of information.
quote:Military Meltdown Monday
Hello Thar!
Today we want to turn our attention to Booz Allen Hamilton, whose core business
is contractual work completed on behalf of the US federal government, foremost
on defense and homeland security matters, and limited engagements of foreign
governments specific to U.S. military assistance programs.
So in this line of work you'd expect them to sail the seven proxseas with a
state- of-the-art battleship, right? Well you may be as surprised as we were
when we found their vessel being a puny wooden barge.
We infiltrated a server on their network that basically had no security
measures in place. We were able to run our own application, which turned out to
be a shell and began plundering some booty. Most shiny is probably a list of
roughly 90,000 military emails and password hashes (md5, non-salted of course!).
We also added the complete sqldump, compressed ~50mb, for a good measure.
We also were able to access their svn, grabbing 4gb of source code. But this
was deemed insignificant and a waste of valuable space, so we merely grabbed
it, and wiped it from their system.
Additionally we found some related datas on different servers we got access to
after finding credentials in the Booz Allen System. We added anything which
could be interesting.
And last but not least we found maps and keys for various other treasure chests
buried on the islands of government agencies, federal contractors and shady
whitehat companies. This material surely will keep our blackhat friends busy
for a while.
A shoutout to all friendly vessels: Always remember, let it flow!
http://wikisend.com/download/405742/military_email_pw.rar
#AntiSec
quote:BONUS ROUND: BOOZ ALLEN HAMILTON KEY FACTS
quote:BONUS ROUND TWO: ANONYMOUS INTERESTS
quote:Enclosed is the invoice for our audit of your security systems, as well as the
auditor's conclusion.
4 hours of man power: $40.00
Network auditing: $35.00
Web-app auditing: $35.00
Network infiltration*: $0.00
Password and SQL dumping**: $200.00
Decryption of data***: $0.00
Media and press****: $0.00
Total bill: $310.00
*Price is based on the amount of effort required.
**Price is based on the amount of badly secured data to be dumped, which in
this case was a substantial figure.
***No security in place, no effort for intrusion needed.
****Trolling is our specialty, we provide this service free of charge.
Auditor's closing remarks: Pwned. U mad, bro?
We are Anonymous.
We are Legion.
We are Antisec.
We do not forgive.
We do not forget.
Expect us.
quote:BoozAllen Booz Allen Hamilton
by AnonymousIRC
As part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems.
Gebeurd al veel langer bij de politie, elke keer als er Volkert van der G's en Benno L's in het nieuws verschijnen dan zijn er genoeg politiemensen die even hun dossier checken zonder ook maar iets met die zaak te maken te hebben.quote:Op dinsdag 12 juli 2011 13:32 schreef Papierversnipperaar het volgende:
900 Britse agenten misbruiken politiedatabase
Hacken is helemaal in tegenwoordig.
quote:A Glimpse into the Shady World of Romas/COIN
In February, the hacktivist group Anonymous released 70,000 emails from security firm HBGary Federal, revealing that the firm had been part of an effort to sell its information-warfare services to companies seeking to attack WikiLeaks. Barrett Brown combed through the emails and found evidence of what he says is a massive surveillance effort involving numerous security firms. According to Brown, this effort is primarily targeting the Arab world, and is evidently run for the U.S. government. Even Disney/Pixar appears to have been caught up in the effort, at least peripherally. The HBGary Federal emails suggest the alleged program, known as Romas/COIN, is about to be upgraded to a new program known as Odyssey.
quote:
What happened to all the good things we did? Scientology, Habbo, Tunisia, Egypt, true crowd power. We are left with 2 individuals who front an extend group of less than 20 individuals. Wtf.
'Why do we protest?' - We are forgetting.
Over recent months we have all stood by and watched a few members of our beloved Anonymous form their own 'splinter' group known as lulz Security. In the beginning many of us cheered them on as they provided us with the 'lulz'. As their ego's grew so did their unethical ambitions, and to be more precise their motives changed.
Around June 25th, after realizing that not only had their random spree attracted the attention of Law Enforcement but also other well-known and well respected hackers, they decided to merge back into OUR mothership - they had pissed off everybody and then wanted back in - to hide - to blend amongst the mass that is Anonymous, in order to divert unwanted attention back to all Anons.
These individuals have lost their way and lost sight of the original Anonymous ethos. They are attempting to rail-road the collective for their own agenda. Do not allow it.
They are not heroes. They are not powerful or to be feared.
They are vulnerable and they know it.
THEY DON'T SPEAK FOR ALL OF US
They have made powerful enemies, and their so-called 'friends' display the usual characteristics of either bots, or mal-adjusted children who troll and look up to fools in the abscence of a real cause. The sense of victory that some of us feel right now is false and will be short-lived. History will very soon remember these individuals as ego-driven maniacs with no cause. Pathetic individuals who thrive on releasing private information, that is endangering real people in the real world. They do this in the name of Anonymous. This is how we will be remembered too.....unless we prevent it.
Look at the feed above, that's anonymous falling apart - LIVE at the hands of a few scared and insignificant info-rapists.
It's not their anonymous, just as it's not ours. Why are we letting them treat us as theirs?
I think it's time we showed these fools how WE are legion, and we do not forgive, or forget.
df6ee8f33f8878e46149af369ef26428
quote:Operation Green Rights\' Project Tarmaggedon
JULY 12, 2011 -- -- Operation Green Rights presents: Project Tarmeggedon
Free-thinking citizens of the world:
Anonymous' Operation Green Rights calls your attention to an urgent situation in North America perpetuated by the boundless greed of the usual suspects: Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland, and many others.
This week, activists are gathering along U.S. Highway 12 in Montana to protest the transformation of a serene wilderness into an industrial shipping route, bringing "megaloads" of refinery equipment to the Alberta Tar Sands in Canada (see Tar Sands FAQ Sheet below).
Anonymous now joins the struggle against "Big Oil" in the heartland of the US. We stand in solidarity with any citizen willing to protest corporate abuse. Anonymous will not stand by idly and let these environmental atrocities continue. This is not the clean energy of the future that we are being promised.
We will, over the course of the next few days, use the powers we posses to spread news about this scenario and the corporations involved. We are actively seeking leaks to expose the corruption that we all KNOW is beneath this. Anonymous will support the activists on July 13-14 when they initiate civil disobedience and direct action to confront this dire issue. We urge you to get involved. Montana and Idaho citizens, we ask you to join local protests and attend the Highway 12 rally if you are close enough! If you're not, join us in the IRC listed below for our own good times.
The continued development of the tar sands is a major step backward in the effort to curb global warming. Anonymous will not suffer this without a fight, and Operation Green Rights will always support the rights of the people to live in an unpolluted world, and aim to help safeguard it for the future. One way or another.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
IRC: irc.anonops.li channel #operationgreenrights
Location of Protest: http://tinyurl.com/5sy57bg
Sign up to protest! http://www.tarsandsaction.org/sign-up/
Er zijn geluiden dat dit bericht van Th3 J35ter komt.quote:Op dinsdag 12 juli 2011 22:42 schreef Papierversnipperaar het volgende:
http://www.whyweprotest.net
[..]
Het is nogal druk rond Sabu.twitter:AnonBroadcast twitterde op woensdag 13-07-2011 om 16:33:06@LR6security #lulzsec with #jester leadership successfully DDoS'd anonyops.net,injected #whyweprotest & #trolling @anonymousabu via twitter reageer retweet
twitter:RichRoma twitterde op woensdag 13-07-2011 om 23:08:15@anonymouSabu Thank you for keeping your promise like a man - you said you'd affirm/deny when you are finally doxed successfully cheers m8 reageer retweet
twitter:anonymouSabu twitterde op woensdag 13-07-2011 om 23:10:18@RichRoma I am honest. No need to hide who I am. Now come and get me. I have more surprises up my sleeve, putahna;) reageer retweet
quote:PayPal CSO calls for AntiSec hunt
PayPal’s chief security officer has called on the industry to reveal the identities of hackers involved in the online Anti Security (AntiSec) movement in order to stop a string of attacks against organisations.
The movement was run by activists, some within the online Anonymous collective, who had banded together with others to attack organisations it accused of corruption and censorship.
Individuals and groups hacked and launched denial of service attacks against US police, defence and intelligence departments, large technology companies and security firms, and dumped troves of sensitive data on public forums.
This had to stop, according to PayPal security chief Michael Barrett.
“I believe it’s crucial for all companies to do what they can to try to identify these individuals,” Barrett said.
“They delude themselves that they are anonymous on the internet. They are not.
"They can be found, and for the continued safety of the internet, we must identify them and have legitimate law enforcement processes appropriately punish them.”
PayPal’s own Electronic Crime and Threat Intelligence Unit, home to a veteran cybercrime investigator and former consultant to the FBI, Scotland Yard and the US Secret Service, had been on the tails of hacktivist groups for years.
The payments giant also has a personal interest in tracking down hacktivist groups. AntiSec hackers had encouraged others to attempt to access PayPal customer accounts using leaked usernames and passwords. Last year, PayPal's blog website was taken offline following a distributed denial of service attack launched by activists angry that the company had frozen a donations account used by whistle blowing website WikiLeaks.
The AntiSec movement had existed for around a decade and was loosely guided by a mission statement to reveal poor security practice and put an end to security exploit disclosure which it said gave ammunition to criminal ‘black hat’ hackers and put consumers in danger.
But that was a false philosophy, according to Barrett.
“While many of them claim to be defending the internet they love, in practice it would seem that they are only hastening its demise. A cynical interpretation would suggest that what most of them desire is actually their ‘fifteen minutes of fame’.”
He disagreed with some commentators who argued the AntiSec movement may be effective in its mission to force organisations to improve poor information security practice.
“Thoughtfully designed industry regulation” like the Payments Card Industry Data Security Standard (PCIDSS) would do a better job, according to Barrett.
“No one would suggest encouraging improved physical security in the real world by decriminalising breaking and entering and classifying it as a sport; why should the online world be any different?” he said.
The AntiSec movement was brazen. Data stolen during the attacks was typically uploaded to pastebin.org and popular filesharing and BitTorrent websites, and promoted in the relentless stream of Twitter conversations under the AntiSec hashtag.
The most recent high-profile victim of the AntiSec assaults was agricultural giant Monsanto in which 2550 names, addresses phone numbers and email addresses reportedly linked to the company were exposed.
Previous targets included the CIA, Arizona Police department and the beleaguered tech monolith Sony.
Yet for all the bravado of the attacks, Barrett said the participants, typically teenage or young men, were terrified of being arrested.
“They are terrified of being ‘vanned’ (arrested), and if enough of them are, then I believe we’ll start to see a significant reduction in the activities of these groups," he said.
If law enforcement failed to catch the perpetrators, Barrett believed the AntiSec movement would continue unchecked.
In the meantime, the security industry should keep on its toes.
“Security companies and security experts are targets too,” Ron Gula, chief executive of Tenable Network Security said.
“We should not feel that we are ‘above’ being attacked or get some sort of pass for not being a victim just because we're part of the good guy team.
“We all need to collectively watch our backs and realise that if and when we are targeted, it is a serious matter and should not be something that is taken lightly.”
quote:The Quest to Unmask the Ringleader of Anonymous
A Wednesday blog post from a hacker known as The Jester claimed to unmask the ringleader of Anonymous. The thing is, it's pretty unclear if this claim is anything close to legit. First, let's go through The Jester's story.
Known online only as Sabu, the hacker leader The Jester claims to expose made a name for himself with an Anonymous attack on the internet security firm HBGary earlier this year. A series of internet relay chat (IRC) logs from that time period shows Sabu's leadership tendencies within Anonymous. Instructing other hackers and taking taking credit for bringing down HBGary, Sabu appears in those #HQ chat logs to be the group's mastermind. And at one point, while discussing how to set up mirror sites for the HBGary data, Sabu claims ownership of a private web domain. "I can setup anonleaks.prvt.org let me know," said Sabu in IRC. "It's one of my private domains."
On another occasion, Sabu accidentally pasted this domain (prvt.org) into the chat, and The Jester says that by using this URL and the identifying data behind it, we can trace Sabu's identity to Hugo Carvalho an IT professional from Portugal. Using the domain registry information, The Jester links prvt.org to an email address owned by Carvalho's company Host Squadron, as well as the hacker handle, Visigod, which he says Sabu used when he started his Anonymous work. As further proof, The Jester reminds us that Sabu regularly tweets in Portuguese and references Brazil, the address on the domain registry. He links to Carvalho's website, Facebook, MySpace and LinkedIn profiles to show further how he fits the Sabu profile.
The Jester's claim is suspect for a couple of reasons. First of all, Hugo Carvalho flatly denies that he's a hacker called Sabu. "I'm Hugo Carvalho, and the story behind me and this nick guy Sabu is a complete lie. Someone stole my photo from one of my Web sites and started to spread the rumor that I was affiliated with this hacking group," he said in an e-mail to CNET's Elinor Mills. "Feel free to post this e-mail in your Web site and state that there is no relation between me and anyone related to that hacking stuff."
Second, domain registry information is not that hard to change or forge. According to Domain Tools, the owner information on prvt.org has been changed 59 times since November 2007. In fact, the domain was made private from 2009 to June 23, 2011, leaving no history during Anonymous's most active time period. Without access to all those records, we might assume that The Jester is just filling in the blanks with his own theories. The Jester is the first to admit that Sabu could be using the prvt.org as a disinformation tool to mislead authorities and points to a tweet that reads, "@anonymousabu: If its not already obvious already: my!=hector/xavier/rafael lima/monsegur/de leon/kaotico/negron.Disinfos my game – enjoy the ridemates." The list is of some of the many names attached to Sabu, and "!=" is "not equal to," indicating that Sabu is saying none of them are correct.
Sabu actually preempted The Jester's latest claims on Twitter. "OK You found me. I am Hugo. I am in Portugal. Next question is: Can you stop me?" he tweeted on Monday. After The Jester's post Wednesday he went into rapid fire mode, tweeting and retweeting dozens of times an hour about the claims. "Extradite me, then I impress," he tweeted at The Jester just after the blog post went live. "The government of Portugal will not extradite me," he tweeted a few minutes later. "Lets see how far they will go. If you can extradition rights within Portugal I will impress. Next question is: where in europa?" he tweeted to a question from @revmagdalen about the claims. "So make it happen. I am personally challenging you to force your gobernment to force my gobernment to give me up. Your new task," he said in a follow up tweet.
The Jester's claim has renewed interest in unmasking Sabu, but it's a Sisyphean task. As has happened when trying to factcheck older claims to Sabu's identity--some of which have attempted to use prvt.org as a lead--the case is always pretty thin. Though rivals deny that Anonymous hackers are that talented, leaders like Sabu, kayla and Topiary have been successful at dodging or convoluting attempts to reveal their real identities. It's worth remembering that Anonymous has always described itself as a leaderless organization. "We are Legion," reads their motto.
But this peek into the finger-pointing world of hackers does reveal is a culture of superlatives and sabotage. "[Those who try to unmask us] are lonely people that are programmed to feel that they need an enemy at all times," Topiary told Gawker last month. "If we're out of their lives, they don't have much going for them." Topiary goes on to say he's not worrying about getting caught, despite the recent arrest of Anonymous-affiliated hacker Ryan Cleary in the U.K. He may be lying, but we'll never know.
Neither The Jester nor Sabu responded to requests for comment.
quote:http://opcannabis.wordpress.com/
Welcome!
Anonymous Operation Cannabis is an awareness and reform effort. Under the banner of #OpCannabis we will be informing the public on much of the disinformation that is available and what the reality of the situation is. Through us you will also find petitions, protest dates and other resources to help us in our efforts.
Stay tuned for more information.
To join in discussion, Get I2P – Official Homepages I2PProject.net / I2P2.de Download I2P Installer v0.8.7
Point your IRC client at 127.0.0.1:6668 and /join #OpCannabis
In the meantime enjoy the following documentaries
quote:Pentagon declares the Internet a war domain
The Pentagon released a long-promised cybersecurity plan Thursday that declares the Internet a domain of war.
The plan notably does not spell out how the U.S. military would use the Web for offensive strikes, however.
The Defense Department’s first-ever plan for cyberspace calls on the department to expand its ability to thwart attacks from other nations and groups, beef up its cyber-workforce and expand collaboration with the private sector.
Like major corporations and the rest of the federal government, the military “depends on cyberspace to function,” the DOD plan says. The U.S. military uses cyberspace for everything from carrying out military operations to sharing intelligence data internally to managing personnel.
“The department and the nation have vulnerabilities in cyberspace,” the document states. “Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity.”
Other nations “are working to exploit DOD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DOD’s information infrastructure,” the plan states. “Moreover, non-state actors increasingly threaten to penetrate and disrupt DOD networks and systems.”
Groups are capable of this largely because “small-scale technologies” that have “an impact disproportionate to their size” are relatively inexpensive and readily available.
The Pentagon plans to focus heavily on three areas under the new strategy: the theft or exploitation of data; attempts to deny or disrupt access to U.S. military networks; and attempts to “destroy or degrade networks or connected systems.”
One problem highlighted in the strategy is a baked-in threat: “The majority of information technology products used in the United States are manufactured and assembled overseas.”
DOD laid out a multi-pronged approach to address those issues.
As foreshadowed by Pentagon officials’ comments in recent years, the plan etches in stone that cyberspace is now an “operational domain” for the military, just as land, air, sea and space have been for decades.
“This allows DOD to organize, train and equip for cyberspace” as in those other areas, the plan states. It also notes the 2010 establishment of U.S. Cyber Command to oversee all DOD work in the cyber-realm.
The second leg of the plan is to employ new defensive ways of operating in cyberspace, first by enhancing the DOD’s “cyber hygiene.” That term covers ensuring that data on military networks remains secure, using the Internet wisely and designing systems and networks to guard against cyberstrikes.
The military will continue its “active cyber defense” approach of “using sensors, software, and intelligence to detect and stop malicious activity before it can affect DOD networks and systems.” It also will look for new “approaches and paradigms” that will include “development and integration … of mobile media and secure cloud computing.”
The plan underscores efforts long under way at the Pentagon to work with other government agencies and the private sector. It also says the Pentagon will continue strong cyber R&D spending, even in a time of declining national security budgets.
Notably, the plan calls the Department of Homeland Security the lead for “interagency efforts to identify and mitigate cyber vulnerabilities in the nation’s critical infrastructure.” Some experts have warned against DOD overstepping on domestic cyber-matters.
The Pentagon also announced a new pilot program with industry designed to encourage companies to “voluntarily [opt] into increased sharing of information about malicious or unauthorized cyber activity.”
The strategy calls for a larger DOD cyber-workforce.
One challenge, Pentagon experts say, will be attracting top IT talent because the private sector can pay much larger salaries — especially in times of shrinking Defense budgets. To that end, “DOD will focus on the establishment of dynamic programs to attract talent early,” the plan states.
On IT acquisition, the plan lays out several changes, including faster delivery of systems; moving to incremental development and upgrading instead of waiting to buy “large, complex systems”; and improved security measures.
Finally, the strategy states an intention to work more closely with “small- and medium-sized business” and “entrepreneurs in Silicon Valley and other U.S. technology innovation hubs.”
quote:Why hacker group LulzSec went on the attack
LulzSec gained instant notoriety by targeting the CIA, multi-nationals and government websites. Then, at the height of its popularity, it disbanded. One of its founders tells why
Its audacity was brazen and apparently fearless. Among its high-profile victims were Sony, the CIA, the FBI, the US Senate and even the UK's Serious Organised Crime Agency. Exposing frailties in government and corporate networks, the group leaked hundreds of thousands of hacked passwords, and in the process garnered more than a quarter of a million followers on Twitter. But after just 50 days, on 25 June, LulzSec suddenly said it was disbanding.
Just hours before this announcement, the Guardian had published leaked internet chat logs revealing the inner workings of the group, which appeared to consist of six to eight members. The logs showed that authorities were often hot on their heels, and that after an attack on an FBI-affiliated website two hackers had quit LulzSec as they were "not up for the heat". As media attention mounted, Ryan Cleary, an Essex-based 19-year-old suspected of affiliation to LulzSec, was arrested in a joint UK-US "e-crime" investigation. Had the pressure simply got too much to handle?
To find out, the Guardian tracked down one of LulzSec's founding members, "Topiary". A key figure in the tight-knit group, he was revealed in the logs to have managed LulzSec's Twitter account and to have written their press releases. After verifying his identity by asking him to send a direct message from the account – "This is the captain of the Lulz Boat," he confirmed – we began a long conversation by Skype.
"I know people won't believe this, but we genuinely ended it [LulzSec] because it was classy," he says. "The leaks we promised happened . . . 50 days were reached, we just about hit 275,000 Twitter followers, things were on a high, so we redirected our fans to [hacker collective] Anonymous and [hacking movement] AntiSec and wrapped it up neatly . . . A high note, a classy ending, a big bang, then a sail into the distance."
LulzSec's jovial public image undoubtedly helped it achieve unusual popularity within a short time. Its stated aim was to provide "high-quality entertainment at your expense," and the word "Lulz" is itself internet slang for laughs. The group's popularity spiked after it planted a fake story on US news outlet PBS.com in protest over what it claimed was a misrepresentative WikiLeaks documentary made by the broadcaster. The story falsely reported that rapper Tupac Shakur, who was killed in a shooting 15 years ago, had been found alive and well in New Zealand.
"What we did was different from other hacking groups," says Topiary. "We had an active Twitter (controlled by me), cute cats in deface messages, and a generally playful, cartoon-like aura to our operations. We knew when to start, we knew when to stop, and most of all we knew how to have fun."
But the group's mission, Topiary explains, was not calculated. Almost everything LulzSec did – from choosing its name to its next target – happened spontaneously. "We made it up as we went along. We were originally @LulzLeaks on twitter, but I forgot the password so we became @LulzSec. My first name was The Lulz Train, then The Lulz Cannon, then The Lulz Boat. I had no idea what The Love Boat was, it was a complete accident . . . I wrote every press release in Notepad without planning. That's what made us unique, we just came out and made stuff up out of nowhere . . . We released when it felt right, we tweeted what felt right, we wrote what we felt needed to be wrote. We weren't burdened by plans or board meetings, we just did it."
The leaked chat logs also revealed the hackers appeared to revel in the international attention they received. However, Topiary says it wasn't that LulzSec was media-hungry, but that the media was LulzSec-hungry.
"We didn't contact a single media outlet for at least the first 40 days, they just kept reporting on our humble tweets," he says, though he admits the attention "gave us more reasons to leak more. It was a thrill, sure, and it did play a role. We enjoyed occasionally confusing and pranking media with weird tweets, or giving exclusives to certain journalists to piss off other certain journalists. It was another aspect of the situation that helped us leverage the entertainment."
Yet although many of LulzSec's attacks were perpetrated "for the lulz", the group was accused of attempted extortion by one US security company, Unveillance – a charge Topiary staunchly denies. It was also criticised after it hacked and dumped thousands of Sony Pictures Europe customers' usernames and passwords online, some of which were reportedly later used in scams by fraudsters. But Topiary is unapologetic.
"It's Sony's fault for not defending – and encrypting – its customers' data," he says. "Similarly, in a perfect world, we'd have dumped said data and nothing would have happened. These scams simply prove that other people (our fans/spectators) are more evil than us."
Towards the end of LulzSec's reign, it seemed to gravitate towards more overtly political causes. It occasionally compared itself to WikiLeaks in tweets, and its penultimate leak was a joint effort with Anonymous to expose Arizona police as "racist and corrupt", and to "sabotage their efforts to terrorise communities fighting an unjust 'war on drugs'."
Anonymous is well known for its acts of political "hacktivism". On Monday it reportedly threatened to attack the Metropolitan police over News International's phone hacking and the possible extradition to Sweden of WikiLeaks founder Julian Assange. Earlier this year the group claimed responsibility for a series of Distributed Denial of Service (DDoS) attacks on government websites in Tunisia, Iran, Egypt and Bahrain, and in 2008 it attacked the Church of Scientology after it allegedly attempted to suppress a leaked video interview with actor and scientologist Tom Cruise. Topiary has been heavily involved with Anonymous in the past, occasionally acting as its spokesman in televised interviews.
"Anonymous has been a great way for the younger generations to get involved through methods they understand, like utilising the internet," he says. "My main goal with Anonymous was to spread the word of revolution to those who might be seeking something new."
How does he define revolution? "Revolution is kicking the Tunisian government in the teeth by rendering their malicious Javascript embedments inert, allowing Tunisian citizens to surf Facebook without fear of password sniffing. Revolution is a horde of activists holding up Anonymous masks and thanking us for assisting their hard work by obliterating their government's ministry, stock and finance websites, replacing them with inspiring words. Revolution, to me, is bringing down the big guy while not forgetting to stand up for the little guy."
Though Topiary will not disclose his age, he describes himself as a teenager and "an internet denizen with a passion for change". He believes he is part of a generational shift in the way technology – specifically the internet – is increasingly being used as a tool to influence the world. The actions of Anonymous in particular, he says, have brought attention to the idea that actions taken online can have a major impact in real life – "linking the two realities". But he also recognises that the actions of Anonymous, LulzSec and other affiliated hackers can be used by governments as justification for greater control of the internet. So how does he balance his actions with that knowledge?
"It only results in greater government control if we remain apathetic and let it happen," he says. "The goal with Anonymous is to brutally cut down the middle of that decision and shout 'NO' to laws we don't agree with. Laws are to be respected when they're fair, not obeyed without question."
For now, however, Topiary is taking a break from law-breaking. He says he will continue operating on the margins of Anonymous, but will not engage in any more hacking. Instead, he intends to create art, video and graphics for the group to help with a new public relations project, to be titled Voice.
"I've been at this non-stop for a while, it's a big time-sink," he says. "Some people can handle it for years on end, and I respect those people. I just needed some air and a new page in the Anonymous/LulzSec era."
After the arrest of Cleary last month, suspected US hackers believed to be affiliated with LulzSec had their homes raided in Ohio and Iowa. In the past, hackers have been offered immunity from prosecution if they cooperate with the authorities. But, if caught, Topiary says he would "never snitch" on other hackers and that he would "pretty much" rather go to jail than work for the government in any capacity.
"Not sure I'd have a place in government security, unless they enjoy bizarre tweets," he says. "But again, no, I wouldn't accept a job that would fight against the things I've fought for. As for the authorities, well, if they have their claws in, they have their claws in, there's not much I can do about it. But I can only hope that they haven't pinned any of us, especially my friends from LulzSec."
twitter:atopiary twitterde op donderdag 14-07-2011 om 22:43:24This is accurate, just wish it focused more on the team effort of LulzSec rather than me: http://t.co/VnzKzqp A good, informative piece. reageer retweet
quote:https://threatpost.com/en(...)ymous-attacks-071411
McCain Pushes For Select Committee to Address Wikileaks, Anonymous Attacks
In the face of continued attacks on federal agencies and contractors such as Booz Allen Hamilton and IRC Federal that do highly sensitive security work for the U.S. government, Sen. John McCain has asked Senate leaders to appoint a select committee to look into the attacks and data leaks that have plagued Washington throughout 2011.
In a letter to Senate Majority Leader Harry Reid and Senate Minority Leader Mitch McConnell, McCain (R-Ariz.) said that a temporary Senate committee is necessary in order to get a handle on all of the disparate cybersecurity legislation proposals and to address the threat posed by groups such as Anonymous, LulzSec and Wikileaks.
"I write to renew my request that the Senate create a temporary Select Committee on Cyber Security and Electronic Intelligence Leaks. I feel this Select Committee is necessary in order to develop comprehensive cyber security legislation and adequately address the continuing risk of insider threats that caused thousands of documents to be posted on the website Wikileaks," McCain said in his letter, which he sent Thursday.
The request for the select committee comes on the heels of renewed attacks on federal agencies and contractors by Anonymous and other groups affiliated with the AntiSec movement. The most recent incidents in this campaign are the attack by Anonymous on Booz Allen Hamilton revealed on Monday and the attack on IRC Federal last weekend. Both companies are involved in national security work for the federal government, and such companies have become prime targets for the groups in the AntiSec campaign.
In his letter to Reid and McConnell, McCain says that the select committee he is proposing is necessary for a number of reasons, not the least of which is the need to decipher the tangle of legislative proposals and agencies involved in the cybersecurity discussion.
"As you know, cyber security legislation has been drafted by at least three committees and at least seven committees claim some jurisdiction over the issue. The White House put forward a legislative proposal in May and the Department of Energy put forth requirements and responsibilities for a cyber security program that same month. Earlier this month, the Department of Commerce sought comment on its proposal to establish voluntary codes of behavior to improve cyber security and the Department of Defense issued its strategy for operating in cyberspace. With so many agencies and the White House moving forward with cyber security proposals, we must provide congressional leadership on this pressing issue of national security," McCain wrote in the letter.
In addition to the attacks on contractors and federal agencies, the government has been dealing with the fallout from the myriad revelations in the Wikileaks documents that have been trickling out since last year. McCain said in the letter that he thinks the government's current plan for dealing with these things is inadequate.
"I truly believe the only way to ensure the protection of sensitive and valuable information from tampering or dissemination by unauthorized persons is a Select Committee," McCain said.
quote:Wired Story About TruePosition Disappears..., The Company Biz: Selling Mobile Phone Location Intelligence, 'Geo-Fencing' Monitoring Developed
This article hit my Google Reader, when clicking the link, I get a 404. Here is the text of the article copied from the reader:
quote:Banks step up security amid fear of Anonymous hackers
AUSTRALIA'S major banks are on a heightened security footing amid fears of being targeted by the high-profile hacking group Anonymous.
ANZ's top technology executive, Ann Weatherston, said yesterday that investment in technology security had been one of the highest priorities at the bank for the past few years, and spending on that area was now a core part of operations.
''Customers increasingly will judge their banks by the quality of their security,'' she said.
Advertisement: Story continues below
Last month, the global group Anonymous and a second hacking network called LulzSec said they were planning to join forces in a campaign aimed at banks, government agencies and prominent targets around the world to encourage others to steal and leak classified information.
Ms Weatherston made the comments as ANZ outlined a five-year technology blueprint, including setting a target that would eventually give its customers a ''seamless'' technology experience through all of the countries in which it operated.
The plan also involves an upgrade of ANZ's internet banking, expanding its ATM network, and pushing further into mobile-banking.
ANZ also expects to start processing deposit and payment transactions in real time for business customers across its entire Asian network.
With some rival banks, including Commonwealth Bank, upgrading their core banking, ANZ's deputy chief executive, Graham Hodges, said he did not see a need for a big overhaul at this point. The bank would focus on upgrading and simplifying existing systems.
''What is right for us is not necessarily right for someone else,'' he said. He said ANZ's system was more modern than that of its bigger rival, and it was focused on spending more on building up its Asian banking businesses.
Technology remains one of the biggest expenses for banks and, given additional cost and risks, many are reluctant to tinker with systems that work.
Read more: http://www.smh.com.au/bus(...)p.html#ixzz1SE3CMWkS
quote:Anonymous Attacks Monsanto Network, Releases Employee Contact Data
Anonymous released personal information and documents stolen from agricultural chemical and biotechnology company Monsanto as the Senate discusses a committee to address cyber-
The hacking group Anonymous has struck again, this time releasing documents it said it stole from the network of giant biotechnology and agricultural seed company Monsanto in retribution for alleged corporate misconduct.
The hacking collective posted information it stole last month on 2,500 Monsanto employees and associates, the group announced July 13. Anonymous also launched a distributed denial-of-service attack on Monsanto's international Websites, forcing the company to shut down the sites for approximately three days.
The group claimed it spent two months attacking the Monsanto network to access hundreds of pages of documents that it contends reveal “Monsanto's corrupt, unethical, and downright evil business practices.”
In the process, the group accessed three mail servers and released sensitive personal information, including full names, addresses, phone numbers "and exactly where they work," Anonymous wrote on text-sharing site Pastebin. The list also included contact details for media outlets as well as other agricultural companies.
The group also promised to post a wiki providing all the information, including articles and emails, "in a more centralized and stable environment," similar to what it did with HB Gary Federal emails on the AnonLeaks site earlier this year.
"Monsanto experienced a disruption to our Websites which appeared to be organized by a cyber-group," said Tom Escher, the company's director of corporate affairs, in an email to msnbc.com.
These types of activist attacks are not limited to the private sector as government agency Websites like the Central Intelligence Agency, private-public partnership sites affiliated with the Federal Bureau of Investigation, and consulting firm Booz Allen Hamilton have been hit recently, Sen. John McCain (R-Airs.) wrote July 14 in a letter to the Senate leadership. He called these kinds of attacks threats to national security.
McCain wrote, “to renew [his] request that the Senate create a temporary Select Committee on Cyber-Security and Electronic Intelligence Leaks." The committee could also develop a comprehensive cyber-security legislation based on disparate proposals currently in the Senate, he said.
"I truly believe the only way to ensure the protection of sensitive and valuable information from tampering or dissemination by unauthorized persons is a Select Committee," McCain said.
In a letter to Senate majority leader Harry Reid and minority leader Mitch McConnell, McCain requested a committee be appointed to specifically look into the various cyber-attacks and data breaches on federal agencies and contractors.
The temporary Senate committee was necessary to "adequately address" the growing threat from hacking collectives, such as Anonymous and other malicious perpetrators, as well as the risk of losing more classified documents to whistleblowers, such as Wikileaks, McCain wrote.
It won't be an easy task to untangle the snarl of cyber-security-related legislation and proposals currently swirling around Washington, D.C. At least three committees have drafted proposed bills, and at least seven committees claim some jurisdiction over cyber-security, McCain said.
The White House has also put forward a legislative proposal outlining the Obama administration's cyber-security goals in May. The Department of Energy released its own set of requirements and responsibilities for a cyber-security program the same month.
The Department of Commerce is still taking comments on its June proposal to establish voluntary codes of behavior for the private sector to improve cyber-security. To top it off, the Department of Defense on July 14 released its strategy on how it will operate in cyber-space.
"With so many agencies and the White House moving forward with cyber-security proposals, we must provide congressional leadership on this pressing issue of national security," McCain wrote in the letter.
quote:Banned Anons launch Anon+ to take on Google+
Web hackivists Anonymous, having been banned from Google's attempt at building a social networking service, say they are setting up their own rival service named Anon+.
Google decided to oust youranonnews from Google+ over what it said was content it found objectionable. The headless collective claims that a number of accounts connected with it were also deleted.
"This is the sad fact of what happens across the internet when you walk to a different beat of the drum," the outfit wrote.
So, in resposnse it said to "stories of activists being banned from FaceBook, Twitter, YouTube, and governments blocking their people from these sites as well through organized black outs," the mischief makers have announced their intention to build their own social network.
"This is one social network that will not tolerate being shut down, censored, or oppressed - even in the face of blackout. We the people have had enough…enough of governments and corporations saying what’s best for us - what’s safe for our minds," the post on youranonnews.tumblr.com reads.
"The sheep era is over," they write. "The interwebz are no longer your prison."
It's certainly a new twist on the idea - a "social" network on which the members are anonymous. What will become of it is anyone's guess, but version 0.1 Alpha of the site is here.
Read more: http://www.thinq.co.uk/20(...)oogle/#ixzz1SNO120YZ
quote:Internet Bill Could Help Hackers, Experts Warn
Legislation cracking down on rogue websites could inadvertently help hackers who have struck major corporate and government targets in recent weeks, a group of computer science experts said on Thursday.
“America is getting hacked,” security consultant Dan Kaminsky said at a Center for Democracy and Technology briefing. “On a deep architectural level, we have to fix this or our economy cannot work.”
Senate Judiciary Chairman Patrick Leahy, D-Vt., introduced the PROTECT IP Act to crack down on websites that sell copyrighted and counterfeited materials, and it passed out of committee in May.
But Kaminsky and other Internet architecture experts object to a section that requires Internet service providers to use a controversial method known as domain name system filtering to direct traffic away from websites selling copyrighted or counterfeit materials.
Authorities could use a court order to make service providers do the filtering--in essence, redirecting web users from a rogue website to another website that carries a notice about why the site couldn't be reached. But the filtering mandate could undermine online safety initiatives that hinge on use of Web addresses, the experts say.
The system that would allow filtering would also prevent providers from using an emerging security system known as DNSSEC. This security system sends credentialed messages between browsers and ISPs to ensure that users are taken to the proper website—and not a scam website—when they enter a URL.
Not only would a filtering requirement undermine the spread of DNSSEC, but hackers are likely to offer workarounds to private users. When clicked, these workarounds could also function as entry points, the computer architects argued.
Kaminski, Steve Crocker of the security consultancy Shinkuro, David Dagon of the Georgia Institute of Technology, Danny McPherson of security firm Verisign, and Paul Vixie of the Internet Systems Consortium wrote a white paper in May predicting that businesses relying on secure connections will quickly feel the repercussions of the proposal when hacking increases.
Kaminsky’s group said the redirection measures in the bill can be easily circumvented, adding that they have met with the White House, Commerce Department, and members of Congress to air their concerns, which are confined to the technical sections of the bill and not the entire proposal.
The Motion Picture Association of America, a key supporter of the bill, issued a statement on Thursday strongly disputing these claims. Web users are unlikely to reconfigure their computers to circumvent the filtering, the MPAA said, and the security standards cited by the authors ought to be flexible enough to allow for IP protection.
“Here's the bottom line: We rely on the Internet to do too much and be too much to let it decay into a lawless Wild West. We are confident that America's technology community, which leads the world in innovation and creativity, will be capable of developing a technical solution that helps address the serious challenge of rogue sites,” said Paul Brigner, chief technology officer at MPAA.
The technical grievances are just one sticking point in a bill that has received strong criticism from the Internet sector, which fears new costs involved with combating piracy. Civil libertarians fear an overly broad bill could suppress online speech. Sen. Ron Wyden, D-Ore., placed a hold on the bill earlier this year after it passed out of committee.
“By ceding control of the Internet to corporations through a private right of action, and to government agencies that do not sufficiently understand and value the Internet, [the legislation] represents a threat to our economic future and to our international objectives,” Wyden said at the time.
Legislation cracking down on rogue websites could inadvertently help hackers who have struck major corporate and government targets in recent weeks, a group of computer science experts said on Thursday.
“America is getting hacked,” security consultant Dan Kaminsky said at a Center for Democracy and Technology briefing. “On a deep architectural level, we have to fix this or our economy cannot work.”
Senate Judiciary Chairman Patrick Leahy, D-Vt., introduced the PROTECT IP Act to crack down on websites that sell copyrighted and counterfeited materials, and it passed out of committee in May.
But Kaminsky and other Internet architecture experts object to a section that requires Internet service providers to use a controversial method known as domain name system filtering to direct traffic away from websites selling copyrighted or counterfeit materials.
Authorities could use a court order to make service providers do the filtering--in essence, redirecting web users from a rogue website to another website that carries a notice about why the site couldn't be reached. But the filtering mandate could undermine online safety initiatives that hinge on use of Web addresses, the experts say.
The system that would allow filtering would also prevent providers from using an emerging security system known as DNSSEC. This security system sends credentialed messages between browsers and ISPs to ensure that users are taken to the proper website—and not a scam website—when they enter a URL.
Not only would a filtering requirement undermine the spread of DNSSEC, but hackers are likely to offer workarounds to private users. When clicked, these workarounds could also function as entry points, the computer architects argued.
Kaminski, Steve Crocker of the security consultancy Shinkuro, David Dagon of the Georgia Institute of Technology, Danny McPherson of security firm Verisign, and Paul Vixie of the Internet Systems Consortium wrote a white paper in May predicting that businesses relying on secure connections will quickly feel the repercussions of the proposal when hacking increases.
Kaminsky’s group said the redirection measures in the bill can be easily circumvented, adding that they have met with the White House, Commerce Department, and members of Congress to air their concerns, which are confined to the technical sections of the bill and not the entire proposal.
The Motion Picture Association of America, a key supporter of the bill, issued a statement on Thursday strongly disputing these claims. Web users are unlikely to reconfigure their computers to circumvent the filtering, the MPAA said, and the security standards cited by the authors ought to be flexible enough to allow for IP protection.
“Here's the bottom line: We rely on the Internet to do too much and be too much to let it decay into a lawless Wild West. We are confident that America's technology community, which leads the world in innovation and creativity, will be capable of developing a technical solution that helps address the serious challenge of rogue sites,” said Paul Brigner, chief technology officer at MPAA.
The technical grievances are just one sticking point in a bill that has received strong criticism from the Internet sector, which fears new costs involved with combating piracy. Civil libertarians fear an overly broad bill could suppress online speech. Sen. Ron Wyden, D-Ore., placed a hold on the bill earlier this year after it passed out of committee.
“By ceding control of the Internet to corporations through a private right of action, and to government agencies that do not sufficiently understand and value the Internet, [the legislation] represents a threat to our economic future and to our international objectives,” Wyden said at the time.
quote:Tor's Hammer - Slow POST Denial Of Service Testing Tool
Tor's Hammer is a slow post dos testing tool written in Python. It can also be run through the Tor network to be anonymized. If you are going to run it with Tor it assumes you are running Tor on 127.0.0.1:9050. Kills most unprotected web servers running Apache and IIS via a single instance. Kills Apache 1.X and older IIS with ~128 threads, newer IIS and Apache 2.X with ~256 threads.
quote:Yet another report: Internet disconnections a "disproportionate" penalty
The Organization for Security and Co-operation in Europe (OSCE), with its 56 member countries made up of 1 billion people, is the “world's largest regional security organization.” And it really doesn't like Internet censorship.
A new OSCE report on "Freedom of Expression on the Internet" (PDF) takes a hard line on all things Internet, issuing conclusions at odds with the practices of many of its most powerful member states, including France and the US. Net neutrality? Every country needs it. “Three strikes” laws that and in Internet disconnection? Disproportionate penalties for minor offenses. Internet access? It's a human right.
The report was prepared by Yaman Akdeniz, a law professor at Istanbul Bilgi University in Turkey, and it's a scorcher—coming to many of the same conclusions reached by UN Special Rapporteur Frank LaRue last month. Reports, even when they come from organizations like OSCE and the UN, seem unlikely to alter France's stance on Internet disconnections as response to online copyright infringement, or the United States' newfound appreciation of the need for Internet site blocking. As for countries like Belarus and Kazahstan—well, the chances they will suddenly agree with Akdeniz and LaRue are infinitesimal.
Still, the reports do document a growing high-level international perspective opposed to nearly all censorship and curtailment of Internet access, and in strong favor of making such access a universal human right.
Highlights from the report:
Network neutrality: It's "an important prerequisite for the Internet to be equally accessible and affordable to all. It is, therefore, troubling that more than 80 percent of the participating States do not have legal provisions in place to guarantee net neutrality. Finland and Norway stand out as best practice examples… Users should have the greatest possible access to Internet-based content, applications or services of their choice without the Internet traffic they use being managed, prioritized, or discriminated against by the network operators."
"Three strikes": "The increased use of so-called 'three-strikes' legal measures to combat Internet piracy is worrisome given the growing importance of the Internet in daily life… This disproportionate response is most likely to be incompatible with OSCE commitment on the 'freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.'"
Internet kill switch: "Existent legal provisions allow several OSCE participating States to completely suspend all Internet communication and 'switch off' Internet access for whole populations or segments of the public during times of war, states of emergency and in cases of imminent threat to national security. Reaffirming the importance of fully respecting the right to freedom of opinion and expression, the OSCE participating States should refrain from developing, introducing and applying 'Internet kill switch' plans as they are incompatible with the fundamental right to information."
Web blocking: "As blocking mechanisms are not immune from significant deficiencies, they may result in the blocking of access to legitimate sites and content. Further, blocking is an extreme measure and has a very strong impact on freedom of expression and the free flow of information. Participating States should therefore refrain from using blocking as a permanent solution or as a means of punishment… Blocking of online content can only be justified if in accordance with these standards and done pursuant to court order and where absolutely necessary. Blocking criteria should always be made public and provide for legal redress."
quote:One arrest and further threats in the German police hacker case
The "No Name Crew", a group of hackers who recently published classified information relating to the German customs investigators' "Patras" GPS location system, has threatened to publish further data. The data is to be released at midnight on 28 July, and the alleged target is a German federal authority. The data reportedly includes sensitive information such as the authority's emails. The hackers say that they have had "full control of the central download server of the German Federal Police for some time", and that they were able to intercept the network traffic to and from the systems of the German Federal Criminal Police, the German Federal Police and the German Customs Authority, over the course of an entire year.
To avoid being arrested the hackers have, in WikiLeaks fashion, posted a 717 MB encrypted archive on the internet. The criminals have threatened that an automated response mechanism will publish the archive password should a member of their group get arrested. This could now be the case, as the North Rhine-Westphalian Federal Police reported earlier today (Monday, 18 July) that it has arrested a 23-year-old German citizen on the suspicion of intercepting and manipulating data and computer sabotage. Evidence was reportedly secured at the suspect's home. German Focus OnlineGerman language magazine says that the German police is aware of the identities of three suspected group members.
The case is currently being analysed at the cyber defence centre operated by the German Federal Office for Information Security (BSI). Talking to The H's associates at heise Security, the BSI's Matthias Gärtner was unable to rule out that the attackers may be in possession of further sensitive information. Focus Online quoted a high-ranking German security official as saying that he feared that hundreds of secret investigations could be disclosed on the internet.
Classified investigation documents that the magazine claims to have obtained reportedly state that the attackers managed to exploit mistakes made at the German Federal Police's Swisstal-Heimerzheim barracks in North Rhine-Westphalia (NRW). To save money, the police authority is said to have used the standard XAMPP Apache installation package. This package is intended as a simple introduction to the world of Apache for developers and doesn't present any major configuration hurdles. However, the XAMPP developers explicitly warn that the standard settings are not suitable for production use: "To make it convenient for developers, XAMPP is configured with all features turned on. [...] The default configuration is not good from a security point of view, and it's not secure enough for a production environment."
Consequently, the attackers managed to inject at least 42 trojans into the authority's systems. Talking to Focus Online, the BSI said that unauthorised accesses to the German Central Credit Committee's and the Federal Police's infrastructures that could be attributed to the No Name Crew began in autumn 2010.
twitter:AnonymousIRC twitterde op maandag 18-07-2011 om 22:53:57We have joy we have fun we will mess up Murdoch's Sun: http://t.co/JArvwg1 | Hi Rupert! Have fun tomorrow at the Parliament! #AntiSec reageer retweet
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |