Heeft Anonymous die dan?quote:Op dinsdag 7 februari 2012 22:09 schreef Papierversnipperaar het volgende:
[..]
Hij gaat de leiders van Anonymous ontmaskeren
Dat zien we zondag.quote:
quote:Hacked emails allege Russian youth group Nashi paying bloggers
Pro-Kremlin organisation reportedly pays hundreds of thousands of pounds to network of internet users to help political cause
The Russian youth group Nashi has paid hundreds of thousands of pounds to a vast network of bloggers, journalists and internet trolls to create flattering coverage of Vladimir Putin and discredit his political rivals, according to a haul of thousands of emails allegedly sent to and from the group that have been released by Russian hackers.
The mass of data appears to show evidence of the sinister tactics used by Nashi, and includes:
• Price lists for pro-Putin bloggers and commenters which indicate that some are paid as much as 600,000 roubles (£12,500) for leaving hundreds of comments on negative stories about Putin.
• Plans to pay more than 10m roubles to buy a series of articles about Nashi's annual Seliger summer camp in two popular Russian tabloids.
• Calls for paid Nashi activists to "dislike" anti-regime videos posted on YouTube.
• Ideas for smear campaigns against what one activist calls the "fascist" Russian opposition leader, Alexey Navalny, such as a cartoon video likening him to Hitler and a suggestion someone dress up like the blogger to beg for alms in front of the US embassy.
The group of Anonymous hackers told online news portal Gazeta.ru in an interview that they carried out the hack, planned since spring of last year, "as a sign of protest against the government's actions in the public internet sphere".
Opposition leaders have accused Nashi of being behind a series of attacks, including repeated scuffles with the liberal youth leader Ilya Yashin and an incident in which ammonia-laced cola was thrown in the face of the former deputy prime minister Boris Nemtsov. Nashi denied being involved in the latter.
Navalny told the Guardian: "These strategies, what they do on the internet and how they gather protests, are very similar. [Nashi's] main problem is that they don't have real people who are ready to say something in support of them. They don't have one person who supports them for free. So they pay."
The current leader of Nashi, Nikita Borovikov, said: "For several years, I've got used to the fact that our email is periodically hacked. When I heard the rumours that it had been hacked, I wasn't shocked, and have paid no attention to this problem. I'm a law abiding person, and have nothing to fear of hiding, so I pay no attention."
quote:The BBC tracks down a notorious Internet troll. Catch the full episode here: http://news.bbc.co.uk/pan(...)_9693000/9693594.stm
quote:KPN slachtoffer van computerhack
KPN is vorige maand slachtoffer geworden van een geslaagde hackaanval. Dat heeft het bedrijf vanmiddag gemeld. De hacker(s) slaagden erin toegang te krijgen tot servers met klantgegevens van particulieren en bedrijven zoals adressen, telefoonnummers en bankrekeningnummers.
De hack werd op 20 januari ontdekt, aldus een woordvoerder van KPN tegen de NOS. Het bedrijf heeft naar eigen zeggen “onmiddellijk” maatregelen genomen om de gegevens van klanten “maximaal” te beschermen. Een week later bleken de hackers echter nog steeds toegang tot de servers te hebben. Met behulp van internetbedrijf FoX IT lukte het KPN uiteindelijk een aantal dagen later om het probleem op te lossen.
Het is niet duidelijk van hoeveel klanten de hackers de gegevens hebben kunnen inzien, maar volgens KPN zijn er geen gegevens gestolen. KPN heeft alle “relevante” instanties, waaronder justitie en het het Nationaal Cyber Security Centrum, geïnformeerd over het hack en belooft “alle medewerking” om de hackers op te sporen. Het Landelijk Parket van het OM heeft inmiddels een onderzoek lopen. KPN belooft te onderzoeken hoe de servers in de toekomst “nog beter” tegen digitale aanvallen kunnen worden beschermd.
quote:Ex-U.S. spy chief says may take crisis for new cyber law
(Reuters) - U.S. intelligence agencies have unique capabilities that can help protect American companies from cyber espionage and attack, but it will probably take a crisis to change laws to allow that type of cooperation, a former spy chief said on Monday.
Intelligence agencies like the National Security Agency are authorized to operate abroad but generally are restricted from working within the United States,
"Until we have a banking collapse or electric power goes off in the middle of a snowstorm for eight weeks, or something of that magnitude, we're likely just to talk about it and not do much," Mike McConnell, former director of national intelligence, said.
The Republican-controlled House of Representatives and the Democratic-controlled Senate have separate efforts under way on legislation aimed at improving cybersecurity.
The House intelligence committee in December approved a bill that would allow U.S. spy agencies to share cyber-threat intelligence with private companies. Some critics worry that could lead to government surveillance of private data.
Senate Majority Leader Harry Reid has said the Senate will take up "comprehensive" cybersecurity legislation this year.
"There are unique things that the government can do. For example code-breaking. The private sector out there does not do code-breaking," McConnell, a former National Security Agency director, told Reuters in an interview.
"How would you harness that capability and then make it available to the private sector in a way that their infrastructure could be better protected?"
A U.S. intelligence report last year pointed the finger at China and Russia as using cyber espionage to steal U.S. trade and technology secrets.
McConnell gives an example that if NSA, which conducts electronic eavesdropping to detect foreign threats, observed a cyberthreat against the U.S. private sector, "NSA is powerless to do a thing other than issue a report."
He said in the area of cyber exploitation, such as reading an adversary's mail without leaving fingerprints, the United States, Britain and Russia are probably the best.
The United States also has the ability to conduct cyber attacks, which would be to degrade or destroy an adversary's computerized system, and has used it.
Has the United States used its cyber attack capability? "Yes," McConnell said. Did it work? "Yes."
McConnell, now vice chairman at the Booz Allen Hamilton consulting firm in charge of cyber activities, did not elaborate on the use of a cyber attack capability.
"Do we have the ability to attack, degrade or destroy? Sure. If you do that, what are the consequences? That is the question," he said.
McConnell said the priority is to protect the country's critical infrastructure such as the financial sector, the electric power grid and transportation from cyber attack and stop the theft of intellectual property through cyber espionage.
"There will be a thousand voices on what is the right thing to do," and it will probably require a crisis to reach consensus, he said.
"All I'm arguing is the government has unique capability, figure out a way to harness the capability in the defense of the nation."
quote:Remember all that talk of how the supporters of SOPA/PIPA were "humbled" by the protests of January 18th, and how they had learned their lessons about trying to push through a bill without actually involving the stakeholders? Remember the talk of how they hoped a new tone could be found in the debate? Yeah. Apparently someone forgot to send that memo to RIAA boss Cary Sherman, who has taken to the pages of the NY Times to lash out at those who fought against SOPA/PIPA, chalking the whole thing up to a massive "misinformation" campaign by Google and Wikipedia. The whole thing is chock full of ridiculous claims, so we might as well go through it bit by bit.
quote:Senate sneaks in SOPA under a new name
Senate Majority Leader Harry Reid (D-NV) launches a second round of attacks in an attempt to censor the Internet.
After trying to adopt Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA), both pieces of legislation turned out to be a disaster, causing outrage among Internet giants and ordinary users alike. Congress had to retreat. However it's determined to get what it wants this time.
After the shelving of SOPA and PIPA back in January Reid stated,“There is no reason that the legitimate issues raised by many about this bill cannot be resolved.”
As RT reported last month, Senator Reid added that lawmakers will“continue engaging with all stakeholders to forge a balance between protecting Americans’ intellectual property, and maintaining openness and innovation on the Internet.”
The vote on the anti-piracy legislation was postponed from its January 24date after Wikipedia and other popular websites went dark to protest the draft law.
Now the battle for online freedom continues.
The rebuttal to push Internet-regulating legislation has transformed into a new cybersecurity bill. The particulars of the latest attempt by senators to censor the Internet have not been disclosed to the public.
However some leaks suggest that the bill will grant the authority to crack down on the Internet to the executive branch of power, namely the White House. It looks highly possible taking into consideration that the legislation has to come out of the Senate Homeland Security and Government Affairs Committee, chaired by Connecticut Independent Sen. Joe Lieberman.
The same Lieberman who earlier co-sponsored the so called Kill Switch bill that could allow the president of the United States to "declare a cybersecurity emergency," and practically shut down the Internet.
After outrage from Internet advocacy groups, Kill Switch never made it in the Senate. This time it may be back under a new name.
Iemand dit gezien? De moeite waard om te kijken?quote:
Nee, het is een Britse Alberto Stegeman.quote:Op donderdag 9 februari 2012 11:40 schreef picodealion het volgende:
[..]
Iemand dit gezien? De moeite waard om te kijken?
quote:KPN sloeg groot alarm na hackaanval
De hackaanval bij KPN vorige maand had grotere gevolgen kunnen hebben voor klanten dan eerder gecommuniceerd. De hacker(s) slaagden erin toegang te krijgen tot servers met klantgegevens van particulieren en bedrijven zoals adressen, telefoonnummers en bankrekeningnummers.
Na de ontdekking van de hack op 20 januari werd zelfs de hoogste alarmfase, code Rood, afgekondigd. Dat meldt de NOS. Omdat de software van het KPN-computersysteem niet up to date was konden hackers gemakkelijk toegang krijgen.
Na de ontdekking van de hack zou het bedrijf “onmiddellijk” maatregelen genomen hebben om de gegevens van klanten “maximaal” te beschermen, toch bleken de hackers een week later nog steeds toegang tot de servers te hebben. Met behulp van internetbedrijf FoX IT lukte het KPN uiteindelijk een aantal dagen later om het probleem op te lossen.
De NOS meldt vanavond dat KPN heeft toegeven dat de hackers de mogelijkheid hadden om alarmnummer 112 voor klanten met een abonnement met telefonie en internet onbereikbaar te maken. KPN had door het lek genoodzaakt kunnen worden het hele netwerk uit te schakelen om gegevens en klanten te beschermen.
In een reactie laat de KPN vanavond weten dat er “voor zover” zij nu “kunnen overzien” geen gegevens zijn gestolen en dat het telecombedrijf. KPN:
. “KPN begrijpt dat mensen zich mogelijk zorgen maken over hun gegevens. Voor zover we nu kunnen overzien is er van onze klanten niets gestolen of kapotgemaakt. KPN heeft meteen actie ondernomen en is met een team van meer dan 100 man aan het werk gegaan om ervoor te zorgen dat mensen kunnen blijven bellen, internetten, zaken doen. En zijn extra maatregelen genomen om systemen en gegevens nog beter te beschermen.”
Volgens KPN heeft het zoveel mogelijk geprobeerd “klanten zolang als dat mogelijk was niet actief op de hoogte te stellen van de inbraak in het IT-netwerk van KPN door een inbreker”. Daarvoor geeft het bedrijf drie redenen:
. 1. onze dienstverlening voor onze klanten (internetten, bellen, TV, websites, zaken doen via het internet) veilig te stellen en onnodige onrust in de samenleving te voorkomen
. 2. te voorkomen dat de hacker(s) in de gelegenheid is om gealarmeerd door de melding – snel grote schade aan te richten bij ons en onze klanten
. 3. de opsporing van de hacker(s) niet te verstoren
Na zorgvuldige afweging en overleg met de autoriteiten heeft KPN besloten tot een daadkrachtige aanpak in stilte.
KPN kondigde vanavond eveneens een “diepgaande analyse” aan naar de hack.
En waaruit maak jij op dat Anonymous achter de hack zat ?quote:
Dat maak ik niet op. Maar als je Anonymous als idee ziet, dan zijn we allemaal Anonymous, dus ook die kids die KPN gehacked hebben.quote:Op donderdag 9 februari 2012 20:17 schreef DjinN het volgende:
[..]
En waaruit maak jij op dat Anonymous achter de hack zat ?
quote:Hackers target iPhone manufacturer to protest harsh working conditions
Hackers protesting harsh working conditions at iPhone manufacturer Foxconn dumped what they said were megabytes of private data belonging to the outsourcing giant.
"Note: The passwords inside these files could allow individuals to make fraudulent orders under big companies like Microsoft, Apple, IBM, Intel, and Dell," a group calling itself Swagg Security wrote in a message posted to Pastebin. "Be careful." The purported contents were made available in a torrent on The Pirate Bay.
The group said Foxconn's network was protected by "an appropriate firewall, but fortunately to our intent, we were able to bypass it almost flawlessly." Over several days, the hackers claimed, they were able to access most data of significance. It didn't take long after the dump for images such as this one to circulate that suggested Foxconn systems were configured in ways that revealed key information about its internal topology.
Several Foxconn servers were reportedly taken offline over the past day.
The stunt coincided with protests planned at a half-dozen of Apple retail stores around the world by demonstrators opposing the conditions of workers who manufacture iPhones and other Apple hardware. A recent series carried by The New York Times documented long hours, low pay, and an explosion that killed several workers at Foxconn, which also makes hardware for Cisco, Dell, Sony, HP, and others.
quote:http://www.embassyhomepage.com/ Embassy in London UK hacked and data leaked via pastebin.com/)
http://www.un.org/ (Official United Nation Website hacked by anonymous via pastebin.com )
http://www.police.uk/ (DOWN 12:30AM GMT)
http://www.mos-partya.ru/ (DOWN 4:01PM GMT)
http://www.astalavista.com/ (IT news and security community Hacked and DB leaked via http://pastebin.com/wSUSxpPx)
http://www.astalavista.net/ (IT news and security community Hacked and DB Leaked)
Source: http://cylaw.info/?p=420
quote:US government losing 'hearts and minds' social media battle
Other governments and some companies are using social media to address dissent, a DARPA program officer said
The US government is losing a race in cyberspace - a social-networking race for the hearts and minds of internet users - a computer security expert said yesterday.
Other countries - and many companies - are using social-networking tools to their advantage, while the US government has taken tiny steps forward, said Rand Waltzman, a program manager focused on cybersecurity at the US Defense Advanced Research Projects Agency (DARPA).
The Chinese government pays citizens to patrol social-networking sites and dispute negative talk about all levels of government or any aspect of Chinese life, and companies such as Dell and Best Buy are training workers to respond to complaints on Facebook and other social-networking services, Waltzman said at the Suits and Spooks security conference in Arlington, Virginia.
US regulations prevent the government from undertaking similar campaigns, he said. "Any time you want to go to the bathroom, you need presidential approval," he said.
The US will not be able to protect its residents if it cannot engage in its own covert social-media operations, Waltzman said.
Waltzman told about a US special forces unit in Iraq in 2009 that attacked an insurgent paramilitary group, killed 16 of the members of the group and seized a "huge" weapons cache. As soon as the US unit left the scene, the Iraqi group returned, put the bodies on prayer mats, and uploaded a photograph from a cheap mobile phone, he said. The group put out a press release in English and Arabic.
The insurgent group "made it look like someone had come in and murdered these guys in the middle of prayer, unarmed," Waltzman said.
Meanwhile, it took the US soldiers three days to get approval to post their video of the fighting, he added. "In social media time, three days is forever," he said. "The damage has already been done, and there's no way to take it back."
When Waltzman recently asked one US Department of Defense official why the agency doesn't use social media more, the official said the agency needed to gain knowledge before putting ideas into practice. "To do what he's suggesting, it will take forever," he said. "The Chinese, on the other hand, their concept is called practice to practice. Practice makes perfect."
American politicians seem to be conflicted about using social media covertly, Waltzman said. Some denounce China for its social-media propaganda efforts, yet there are several examples in the 2010 congressional election campaigns of astroturfing, of using fake grassroots campaigns to support candidates, he said.
While US companies and politicians use social-media in a variety of ways, there's public outcry when US intelligence and law enforcement agencies consider monitoring social media or look into covert uses of social media, Waltzman said.
"What you see is this entire social-media space is absolutely filled with hypocrisy and contradiction," he said. "While we have our hands tied, our adversaries - nation states, terrorist organisations, criminal organisations, any kind of nutcase group you want - have completely free hands, and are going ahead full speed."
'To take it down, you have to take down the internet': New file-sharing technology is IMMUNE to government attacksquote:Tribler is vrij en opensource-P2P-programma voor onder meer Windows, Mac en Linux. In 2007 bestond het ontwikkelaarsteam uit 20 Nederlanders, personen van zowel de TU Delft als de Vrije Universiteit uit Amsterdam. Tribler zou de mogelijkheid bieden videocontent (van bijvoorbeeld YouTube) met een BitTorrent-methode te doorzoeken wat dan bekeken kan worden via internet. Het zou ook geschikt gemaakt worden voor settopboxen.
quote:'The only way to take it down is to take the internet down,' says Dr Pouwelse of Delft University of Technology.
quote:Anonymous threatens cyber crusade against Israel
International hacker group accuses Israeli gov't of "crimes against humanity," vows revenge in YouTube video.
International hacker group Anonymous released a video on YouTube overnight Thursday threatening to launch a crusade against the Israeli government, who it accused of committing "crimes against humanity."
The release of the clip came amid an internet feud between Israeli and Arab hackers, which began in early January when a Saudi hacker published tens of thousands of Israeli credit card numbers on the Internet. Anonymous, a loosely organized international group of hackers who seek anarchy through disrupting government and law enforcement networks, threatened to shut down the Knesset website in June, but failed to carry out the threat.
In the video released overnight Thursday, Anonymous accuses Israel of bettering "the lives of a select few, while carelessly trampling the liberties of the masses."
Related:
The group charges the Israeli government with circulating propaganda through political lobbying and the mainstream media.
"Your Zionist bigotry has displaced and killed a great many. As the world weeps you laugh while planning your next attack," the video states, making reference to talk of a potential Israeli military strike against Iran. "You label all who refuse to comply with your superstitious demands as anti-Semitic and have taken steps to ensure a nuclear holocaust...we will not allow you to attack a sovereign country based upon a campaign of lies."
Anonymous threatens in the YouTube clip to wage a three-step campaign against the Israeli government's "reign of terror."
"Step one will be initiated after the release of this video and will be comprised of systematically removing you from the internet. Step two will be later disclosed and is already in initiation; and, as for step three, well, think of this one as a present from Anonymous to you - we will not stop until the police state becomes a free state. We are Anonymous, we are legion, we do not forgive, we do not forget. Israeli government expect us," the video warns in its conclusion.
quote:On Saturday protests are planned across the world against Acta - the Anti-Counterfeiting Trade Agreement. The treaty has become the focus of activists associated with the Anonymous hacking network because of concerns that it could undermine internet privacy and aid censorship.
quote:Deutschland wird das internationale Urheberrechtsabkommen ACTA nach Informationen der Nachrichtenagentur dpa vorerst nicht unterzeichnen. Das Auswärtige Amt habe die bereits erteilte Weisung zur Signierung des umstrittenen Vertragswerks wieder zurückgezogen, verlautete am Freitag aus Regierungskreisen.
Das Anti-Counterfeiting Trade Agreement (Handelsabkommen zur Abwehr von Fälschungen) wurde im Januar von der EU, aber noch nicht von allen Mitgliedsstaaten unterzeichnet. Der auf Initiative der USA und Japans ausgehandelte Vertrag regelt unter anderem die "Durchsetzung von Rechten des geistigen Eigentums im digitalen Umfeld".
quote:
"...niets gestolen..."quote:500 persoonsgegevens KPN klanten online – maildienst KPN offline
De maildienst van KPN is vanmiddag niet bereikbaar nadat er een groot aantal accountgegevens met wachtwoorden van KPN-klanten online zijn gezet. Deze zouden bij de hack die woensdag bekend werd zijn buitgemaakt, schrijft Tweakers.net.
Webmail.kpnmail.nl en pop3.kpnmail.nl zouden sinds vrijdagmiddag niet meer bereikbaar zijn. KPN heeft de mailservers uit voorzorg offline gehaald na de publicatie van wachtwoorden van mail-accounts van klanten. Volgens Webwereld.nl zouden er meer dan 500 persoonsgegevens gelekt zijn. Volgens Webwereld zou de lijst authentiek zijn.
Afgelopen woensdag claimde KPN nog dat er na de hack geen gegevens gestolen zouden zijn. De hack zou het gevolg zijn geweest van achterstallig onderhoud van KPN, dat verzuimde nieuwe software te installeren.
Dit bericht wordt bijgewerkt.
quote:Anonymous took down cia.gov
Traditionally known as FuckFBIFriday, this weekend's eve turned into FuckCIAFriday, as hacktivists downed the official website for the Central Intelligence Agency of the United States cia.gov.
At approximately 3:10 p.m. Eastern time one of twitter accounts related to the hackers' group announced "cia.gov DOWN. #UMAD?#Anonymous."
The CIA website became the latest victim in a series of attacks conducted by the elusive group of hackers against US law enforcement agencies and copyright holders. As RT reported earlier, Anonymous took credit for crashing the websites of the US Department of Homeland Security, which was quickly revived, and the FBI.
The CIA seems to be less prepared for fighting Anonymous than other agencies. If the work of dhs.gov was revived in mere minutes, the CIA's site is still down even more than two hours after the attack. One of the twitter accounts affiliated with Anonymous explained the reasons of the attack: "We do it for the lulz," referring to the popular online abbreviation "for laughs."
In previous occasions Anonymous has orchestrated humiliating assaults with massive distributed denial of services attacks.
The technique also known as a DDoS, is a concentrated effort by multiple individuals to make a network busy to its intended users. The end results in a server overload
Even though DDoS attacks are a violation of the Internet Architecture Boards’s proper use policy, it has become an effective tool for Anonymous to spread online mayhem.
Two weeks ago, the online group also released the audio of a conference call between the US Federal Bureau of Investigation and Britain’s Scotland Yard counterpart targeting members of the largely untraceable group. It was done as part of the FuckFBIFriday campaign.
Along with the secret audio leak, numerous sites fell prey to Anonymous’ crippling assault including several entertainment industry giants and government sites.
The websites for the US Department of Justice and Universal Music Group were among the first to go, with the sites for US Copyright Office, Warner Music, BMI, and RIAA following suit shortly after.
These attacks were in retaliation for a raid on Megaupload, where the feds raided the file sharing service site which led to more than 20 warrants being served and several arrests internationally.
This is not the first time Anonymous takes down cia.gov. In June, as part of a 51-day-long hacking spree, the Anonymous affiliated group LulzSec took down the CIA's site for a few hours. The reason was the same as today: "For the lulz."
We will bring you more details as they develop.
twitter:FredrikNilsson4 twitterde op zaterdag 11-02-2012 om 02:58:322 MINUTES LEFT! 92.123.68.25 & 50.56.116.239 #Anonymous #Chanology #OpChanologyReborn reageer retweet
| Forum Opties | |
|---|---|
| Forumhop: | |
| Hop naar: | |