tag:blogger.com,1999:blog-57947872375741480792024-03-13T08:37:51.101-07:00Operation IndonesianAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comBlogger140125tag:blogger.com,1999:blog-5794787237574148079.post-33558136284061919442012-10-12T23:48:00.000-07:002012-10-12T09:50:47.361-07:00Discover 'Hole' in Chrome Gets USD 576 MillionIf you managed to find the Google Chrome browser, you can win money of USD 60 thousand, equivalent to Rp 576 million (USD 1 = Rp 9600). This is the second part of the competition held Pwnium Google.
<br />
<div style="text-align: center;">
<img height="350px" src="http://4.bp.blogspot.com/-eqMKzjhAzNw/UHhJP9UuzRI/AAAAAAAAAGc/hxcJOxcHva0/s1600/googlechromebrowser.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
This is experienced by hackers calling themselves the Pinkie Pie. As reported by Cnet, on Friday (10/12/2012), he managed to win the competition find security holes in Chrome.<br />
<br />
Such competition is not the first time Google held. The internet giant is a hobby for-for gifts for hackers who managed to find the product flaws. The goal, of course, to further strengthen the security of the user.<br />
<br />
Took place in Kuala Lumpur, Malaysia, 2 Pwnium competition event held at Hack in the Box 2012. "We announced it had found a new loophole know Pinkie Pie. As a reward, we reward of USD 60 thousand and Chromebook," Google said via the Chromium blog.<br />
<br />
Google Chrome team to quickly patch the gaps found. Before long, the browser update to fix these gaps immediately available within just 10 hours after it was discovered.<br />
<br />
Interestingly, Pinkie Pie so hackers subscription winner of this competition. Previously, he also won $ 60 thousand in the first Pwnium competition held earlier this year.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-13708691598010128332012-10-12T23:24:00.000-07:002012-10-12T09:29:34.872-07:00Facebook tumbles, Anonymous Claims Attack Launch Facebook reportedly run down in a number of European countries. Coinciding with this event, a group of hackers posted tweets claiming to be the mastermind behind the event.
<br />
<div style="text-align: center;">
<img height="350px" src="http://4.bp.blogspot.com/-zrRgwDTYcEg/UHhBFdosUZI/AAAAAAAAAGI/wEU30oOyhDI/s1600/0.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
IBTimes on Friday (12/10/2012), reported that the giant networking sites toppled in Sweden, Denmark, Ireland, Norway and Portugal on Thursday.<br />
<br />
Is Anonymous, the hacker group who often launch the action, claiming the action. On the Twitter account @ AnonymousOwn3r they say, "I will stop # attack to facebook, soon you guys can acess".<br />
<br />
Through the account that Anonymous was proclaimed as the leader, they acknowledge as the responsible party in temporary paralysis GoDaddy site some time ago.<br />
<br />
As Facebook itself through a spokesman denied that the incident was the work of hackers. According to the site this friendship, down which occurs in less than 1 hour it is the impact of the technical stuff being done up.<br />
<br />
"No action hack on Facebook, we have investigated the claim and it was not valid," they stressed.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-66489499133518236522012-10-12T08:56:00.000-07:002012-10-11T18:59:36.365-07:00Email and Phone Bakrie Group Indonesia HijackedThe Bakrie Group reported acts of piracy or hacking email and phone tapping to the Police. Piracy is blamed on the group with the intent to steal corporate data. Bakrie was inflamed.
<br />
<div style="text-align: center;">
<img height="350px" src="http://4.bp.blogspot.com/-DBlkf3x48kE/UHd385wzjyI/AAAAAAAAAF0/cuvM8js5ryQ/s1600/bakrie-brothers.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Christopher Fong, Senior Vice President of Bakrie Group explained, it has obtained the facts about the cheating and actually against the law by certain parties. Upon these findings, Bakrie said he was surprised.<br />
<br />
The purpose of data theft and information, according to Fong, used to win the competition unfairly and illegally. Unfortunately, Fong did not explain what he meant the competition.<br />
<br />
"We get the fact that there is fraud committed in contravention of the law by certain parties by way of hacking of email management within the Bakrie Group to steal data including telephone wiretapping," Fong said in a written statement on Thursday (11/10/2012 ).<br />
<br />
Reporting to the police action is expected to be followed up. "The tort investigate it, find the perpetrators and punish the perpetrators in accordance with the legislation in force, the Bakrie Group expects the public can find out what is really going on," he said.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-40333739557374638942012-10-04T17:07:00.000-07:002012-10-04T03:12:18.647-07:00Netter instigated Internet Freedom Declaration in IndonesiaInternet is increasingly unpopular in Indonesia, a lot of things you can do in the virtual world. In order to create a good internet governance, a number of netizens country also declared freedom of surfing.
<br />
<div style="text-align: center;">
<img height="350px" src="http://images.detik.com/content/2012/10/04/398/135447_mouse150.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
As reported suarablogger.org, the declaration wanted a free and open internet. They also support a wide range of transparent and participatory processes in order to realize the internet governance (policy governance interet).<br />
<br />
When first initiated on October 2, 2012, this movement has been endorsed by 14 civil society institutions in Indonesia. Other Internet users can follow to give support to the visited sites suarablogger.org.<br />
<br />
The following content is the Internet Freedom Declaration.<br />
<br />
----<br />
<br />
<i><b>We pledge to free and open Internet. We support various processes transparent and participatory governance policies in order to realize the Internet (Internet Governance), globally in general and Indonesia in particular, based on the rule of 5 (five) of the following basic principles:</b></i><br />
<br />
<br />
<br />
<ul>
<li><b>Expression </b>: Do not censor the Internet that aim and / or may limit human rights.</li>
<li><b>Access</b> : Increase equitable universal access to the Internet is fast and affordable.</li>
<li><b>Openness</b> : Let the Internet be an open network where all people are free and responsible to communicate, learn, create, and innovate.</li>
<li><b>Innovation</b> : Protect the freedom to innovate and work in the Internet, new technologies should not hinder and penalize the innovators because these things are done by the users.</li>
<li><b>Privacy</b> : Protect your privacy on the Internet and defend everyone's right to control how he uses his data and tools.</li>
</ul>
<br />
<br />
<br />
14 (fourteen) Indonesian civil society institutions which first agreed to support and / or declare the freedom of the Internet was on October 2, 2012 are: ICT Watch, Volunteer Information and Communication Technology (RTIK), Center for Innovation, Policy and Governance (CIPG ), White Water Foundation, Indonesian Center for Deradicalisation and Wisdom (ICDW), the Alliance of Indonesian Journalists (AJI), Institute for Policy Research and Advocacy (ELSAM), Arus Pelangi, Institute for Criminal Justice Reform (ICJR), Combine Resource Institution (CRI) , Indonesia Online Advocacy (idol), One World, Common Room Networks Foundation and Community Voice.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-27387009808459332032012-09-18T18:03:00.000-07:002012-09-18T06:11:34.280-07:00Users of Internet Explorer in Danger!A fairly dangerous gap found in Internet Explorer 7.8 and 9. The users were advised to use other browsers such as Google Chrome or Firefox.
<br />
<div style="text-align: center;">
<img height="350px" src="http://images.detik.com/content/2012/09/18/323/password460.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The shocking thing was presented in an internet forum called Rapid7 security. According to them, Internet Explorer has a bug that they call Zero-day exploits.<br />
<br />
This vulnerability allows anyone who uses Internet Explorer version 7.8, and 9 could be attacked easily. Especially when they visit a site that has been compromised script.<br />
<br />
"An exploit has been used by the attackers before that (gap-ed) published by Metasploit," wrote Rapid7, Tuesday (09/18/2012).<br />
<br />
Seeing such a huge gap, Microsoft is not blind. The software giant acknowledged that they made a number of browser versions do have a 'hole'.<br />
<br />
"We realize that some of the series Internet Explorer can be attacked, but we have confirmed that Internet Explorer 10 is not affected by this issue," said Yunsun Wee, Director of Microsoft's Trustworthy Computing.<br />
<br />
"We recommend that users use Microsoft's Enhanced Mitigation Experience Toolkit (EMET) 3.0, which provides effective protection without affecting web browsing experience," advises Wee.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-23806659458900368782012-09-09T20:38:00.000-07:002012-09-11T19:36:48.881-07:00Tens of thousands of Dominos India website data leakOne of the original Turkish hacker group claimed to have hacked a website fast food pizza india www.domino.co.in their origin "Ajan hackers" publish data to pastebin 37,000 in some parts.
<br />
<div style="text-align: center;">
<img height="350px" src="http://4.bp.blogspot.com/-R3_KmgTCLv8/UEy160hWJhI/AAAAAAAAAFg/NsO1UT3IoEo/s1600/pizaa.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
This domino webisite data leakage which contain personal data such as email passwords, names and telephone. Previous website was never attacked but they never get the data for this.<br />
<br />
As we know, this company is developing fast in the fast food sector based in india<br />
<br />
<b>Dominos India Accounts Part 1
</b><iframe src="http://pastebin.com/embed_iframe.php?i=7vnzSV5k" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 2
</b><iframe src="http://pastebin.com/embed_iframe.php?i=Xwvgu1nE" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 3
</b><iframe src="http://pastebin.com/embed_iframe.php?i=ibFQavea" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 4
</b><iframe src="http://pastebin.com/embed_iframe.php?i=EzY6KmFU" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 5
</b><iframe src="http://pastebin.com/embed_iframe.php?i=zHg5RKrx" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 6
</b><iframe src="http://pastebin.com/embed_iframe.php?i=an0T1W7k" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 7
</b><iframe src="http://pastebin.com/embed_iframe.php?i=TiKhfgde" style="border: none; width: 100%;"></iframe>
<b>Dominos India Accounts Part 8
</b><iframe src="http://pastebin.com/embed_iframe.php?i=GceeHXk7" style="border: none; width: 100%;"></iframe>
http://pastebin.com/u/MaxneyAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-7834765028259277712012-09-09T15:14:00.000-07:002012-09-09T03:16:13.519-07:00Windows 8 Still Vulnerable to Hackers hackedWindows 8 still has loopholes that could be exploited by hackers. This recognition comes from Adobe, one of the Microsoft partner that provides support for the Flash Player.
<br />
<div style="text-align: center;">
<img height="350px" src="http://1.bp.blogspot.com/-MepIluAK37Y/UExrxb4hMxI/AAAAAAAAAFM/Yk9WaJLo3bI/s1600/microsoftwindows8460.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Sunday (09/09/2012), Adobe acknowledged a gap that opens in Flash for Windows 8 is being targeted by the hackers so in recent weeks.<br />
<br />
Windows 8 is not yet officially released by Microsoft. But its Preview Release version can be downloaded from May to tested. Well, Flash Player for browser Internet Explorer 10 (IE10) is a recognized Adobe still has weaknesses.<br />
<br />
Microsoft has claimed not to have issued a new patch for the bug is in Flash Windows 8 until the status is officially released on 26 October.<br />
<br />
"The version of Flash is now in Windows 8 RTM there is not the last revision. But we will release the security update through Windows Update when it comes to GA (general availability)," said Microsoft spokesman.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-16917796314766650592012-09-09T14:57:00.000-07:002012-09-09T03:00:52.747-07:00Every Seconds, 18 The Internet Crime VictimIncreasingly sophisticated technology, unfortunately, is directly proportional to the higher crime cyberspace. Even according to the Norton Cybercrime Report, every second there are 18 adults who were victims of cyber crime.
<br />
<div style="text-align: center;">
<img height="350px" src="http://2.bp.blogspot.com/-fCzNCjMcR48/UExnN3X47sI/AAAAAAAAAE4/gQcY3PkB3l8/s1600/hacker460.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Other data revealed in the report is a crime on the internet cause harm USD 110 billion per year. With an average total loss by an average of USD 197 per victim in the whole world.<br />
<br />
According to Norton, the results of this survey showed an increase in new forms of cyber crime than in previous years, such as the discovery of the social networks or mobile devices.<br />
<br />
That is, it indicates that the cyber crime start focusing on the target device or popular service.<br />
<br />
One in five adults who do online activities (21 percent) have been a victim of cyber crime from the victim on social networks to be a victim in mobile devices. While 39 percent of social networking users have been victims of social crime in cyberspace. Here's the breakdown:<br />
<br />
# 15 percent of social networking users report that the profile has been hacked and someone pretending to be the owner of the profile.<br />
<br />
# One in 10 social network users say they have been victims of a scam and deceptive links on social networking.<br />
<br />
# While 75 percent believe that cybercrime set their sights on social networks, less than half (44 percent) actually use security solutions that protect them from the threat of social networks, and only 49 percent use privacy settings to control what information they disclose, they provide , and with whom they share.<br />
<br />
# Almost one-third (31 percent) of mobile device users receive a text message from someone they do not know and ask them to click a link that has been connected or make outgoing calls to numbers that are not known to take a voice message.<br />
<br />
"Crime cyberspace alter their tactics by targeting the growth of mobile devices and social networks where consumers are less concerned with security risks," said Marian Merritt, Norton Internet Safety Advocate.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-68942369110401615182012-09-04T16:27:00.000-07:002012-09-11T19:46:36.797-07:00City of Newark Web site Hacked, 3000+ Accounts leaked by #0x00x00<div style="text-align: center;">
<img height="350px" src="http://1.bp.blogspot.com/-oJnhyXpAjqE/UEXUftBb28I/AAAAAAAAAEk/Ls2ONahZ7Uc/s1600/database.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Earlier today hacker @0x00x00 announced an attack on the City of Newark, New Jersey website (www.ci.newark.nj.us) which has resulted in over 3000 user credentials being leaked.<br />
<br />
The attack was announced via twitter and posted to pastebin.<br />
<br />
The website is the main website for Newark and contains a heap of information and basic news services for people interested in the Newark area. The site also claims it is newly built, user friendly website and if this is true the developers may want to fix the exploits which have allowed this to happen.<br />
<br />
The leaked data contains user and administration which all emails/usernames and encrypted passwords.<br />
<br />
<iframe src="http://pastebin.com/embed_iframe.php?i=CiQPDQgd" style="border-style: none; width: 100%;"></iframe>
http://pastebin.com/CiQPDQgdAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-42176541684184470392012-09-04T14:52:00.000-07:002012-09-04T02:56:40.389-07:00FBI hack yielded 12 million iPhone and iPad IDs, Anonymous claims<div style="text-align: center;">
<img height="350px" src="http://cdn-static.zdnet.com/i/library/us-thumbs/ipad.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Hackers associated with Anonymous claim to have swiped more than 12 million Apple iPhone and iPad device identifiers from an FBI computer.<br />
<br />
Someone using the banner of AntiSec — a 14-month-old joint operation of Anonymous and LulzSec — posted a document to Pastebin on Monday that contained links to around a million Apple unique device identifiers (UDIDs). The anonymous poster said the release was intended to highlight the FBI's alleged tracking of Apple customers.<br />
<br />
"We never liked the concept of UDIDs since the beginning indeed," the post read. "Really bad decision from Apple. Fishy thingie."<br />
<br />
Every iOS device has a UDID. The number was put in place so developers and mobile advertising networks could track user behaviour. However, over the last year Apple has been phasing out apps' access to UDIDs, as the numbers were sometimes being transmitted to third parties without users' consent.<br />
<br />
According to the post, which was linked to from a well-known Anonymous Twitter account, the hackers got into the Dell laptop of FBI special agent Christopher Stangl during the second week of March this year. Stangl works at the FBI's New York field office, and has been a prominent face in the agency's cybersecurity recruitment efforts.<br />
<br />
AntiSec said the hack, which apparently exploited a Java vulnerability, yielded a CSV file containing "a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service [APNS] tokens, zipcodes, cellphone numbers, addresses, etc".<br />
<br />
1,000,001 released<br />
<br />
The hackers said they were publishing 1,000,001 of the UDIDs and APNS tokens as that was "enough to release". They stressed that they had stripped out the other personal data held in the file, noting that not all the listed devices have the same amount of personal data linked.<br />
<br />
"We have learnt it seems quite clear nobody pays attention if you just come and say 'hey, [the] FBI is using your device details and info and who... knows [why they are] experimenting with that'," the document read. "We could have released mail and a very small extract of the data. Some people would eventually pick up the issue but well, let's be honest, that will be ephemeral... Eventually, looking at the massive number of devices concerned, someone should care about it."<br />
<br />
The hackers added that it was "the right moment" to release the data as Apple was currently looking for alternatives to the UDID system.<br />
<br />
"In this case it's too late for those concerned owners on the list," the document read. "We always thought it was a really bad idea. That hardware coded IDs for devices concept should be eradicated from any device on the market in the future."<br />
<br />
The document, which is written in slightly broken English, has near its end an insult about US presidential candidate Mitt Romney, written in German.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-38347865296346698252012-09-03T16:15:00.000-07:002012-09-03T04:17:30.244-07:00NullCrew pillages Sony servers?<div style="text-align: center;">
<img height="350px" src="http://cdn-static.zdnet.com/i/story/70/00/003621/officialnull030912co.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Hacktivist group NullCew have claimed it has seized control of eight of Sony's servers due to lax security measures.
Through a message sent from the group's official Twitter account, the group claim that they have gained control of eight of Sony's servers, apparently related to the website Sonymobile.com.
<br />
<blockquote class="twitter-tweet tw-align-center">
SONY Hacked: pastebin.com/GiXgB6aT @YourAnonNews @BreakTheSec @TheHackersNews @AnonOpsSweden @AnonHackNews @Cyber_War_News @TruthIzSexy<br />
— OfficialNull (@OfficialNull)<a data-datetime="2012-09-03T05:41:52+00:00" href="https://twitter.com/OfficialNull/status/242497617630744576">September 01, 2012</a></blockquote>
<b><i>"Sony, we are dearly dissapointed in your security. This is just one of eight sony servers that we hve control of. Maybe, just maybe considering IP addresses are avaliable. Maybe, just maybe it's the fact that not even your customers can trust you. Or maybe, just maybe the fact that you can not do anything correct technologically."</i></b><br />
<br />
The release shows a list of usernames and passwords, which apparently were taken from one of the 'hijacked' servers as proof of the security breach. 441 usernames with additional email addresses, 24 usernames with hashed passwords, and 3 admin data sets are part of the data dump. According to the group, the attack was made possible through weak security credentials.<br />
<br />
In addition, NullCrew stated on its Twitter feed that it has broken into a Cambodian airliner and military website -- now a target due to the arrest of The Pirate Bay's co-founder in Cambodia. As part of "operation The Pirate Bay (#OpTPB)" the group have taken Cambodian payment transactions, plane component prices, and usernames. NullCrew state that "The founder of The Pirate Bay was arrested in Cambodia, so Cambodia is now a target."<br />
<br />
This is not the first time Sony has borne the brunt of cyber attacks. Last week, a second alleged member of the LulzSec hacking group was arrested on charges over Sony's computer breach last year, which resulted in the theft of over a million user accounts on the Playstation network, and the closure of the service for over a month.<br />
<br />
We have reached out to Sony and will update if we hear back.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-73135266391395477722012-09-02T16:16:00.000-07:002012-09-02T04:18:24.755-07:00SOCA, Cambodia National Bank & US Courts Attacked for #OpFreeAssange<div style="text-align: center;">
<img height="550px" src="http://cdn.cyberwarnews.info/wp-content/gallery/opfreeassange/just-ping-online-ping-online-web-based-ping-free-online-ping-from-50-locations-worldwide.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
This weekend has been very eventful so far and it is looking that the following weeks may be to with a few new operations backed by anonymous and other hacktivist are picking up pace. The most recent attacks come from @0x00x00 who has been using exploits within the sites servers has been taking down a number of high profile sites<br />
<br />
The most high profile site so far is the Serious Organised crime agency (www.soca.gov.uk) the other sites to be taken down so far as well are the Cambodian National Bank (nbc.org.kh) and a subdomain for the US court systems (mab.uscourts.gov).
<br />
<div style="text-align: center;">
<img height="250px" src="http://cdn.cyberwarnews.info/wp-content/gallery/opfreeassange/oops-google-chrome-could-not-connect-to-www-mab_-uscourts-gov_.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
These attacks have all been in the name of the Operation Dubbed #OpFreeAssange and at time of publishing the sites where back up and active. The attacks have not been long lasting but they have been fairly constant for up to an hour each.
<br />
<div style="text-align: center;">
<img height="250px" src="http://cdn.cyberwarnews.info/wp-content/gallery/opfreeassange/oops-google-chrome-could-not-connect-to-www-nbc_-org_-kh_.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
#OpFreeAssange has also had other targets over the past weekend with a few websites being defaced and sites such as 2600.com and adrian.org.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-75711944158985778202012-09-02T10:24:00.000-07:002012-09-01T22:29:13.124-07:00Two Israeli Sites Hacked by #gsec_ for #OpFreePalestine<div style="text-align: center;">
<img height="350px" src="https://si0.twimg.com/profile_images/2355531214/image.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Two Israeli based websites have been attacked in the latest attacks for an Operation that has been on going for some time now and is called #OpFreePalestine, an operation by anonymous hacktivist to free Palestine.<br />
<br />
The most recent attacks come from Grey Security or @gsec_ and was announced via twitter on the 31st of august and has been posted to pastebin.
<br />
<blockquote class="twitter-tweet tw-align-center">
#OpFreePalestine - satec-heating.co.il #Hacked[1,894 User Emails] [http://pastebin.com/1VXiXWyz]#GSec @VizFoSho<br />
— #GSec (@gsec_)<a data-datetime="2012-09-01T08:34:14+00:00" href="https://twitter.com/gsec_/status/241635026456961024">September 01, 2012</a></blockquote>
The two websites that have been attacked are Connections Mag (connectionsmag.co.il) and Satec heating solutions (http://www.satec-heating.co.il) which proves solutions for water and home heating.<br />
<br />
The leaked data was posted to pastebin in two separate files and contains the following message<br />
<br />
The Satec leak contains minor database information as well as a list of emails from users of the site. At the end of the file is a link to full database listing of all user emails from the site, the database has been uploaded to <a href="http://www.axifile.com/en/1163DE9A3C" target="_blank">axifile</a><br />
<iframe frameborder="0" height="240px;" src="http://ozdc.net/embed.php?aid=3186" width="300px;"></iframe><br />
<br />
http://ozdc.net/archives.php?aid=3185<br />
<br />
http://pastebin.com/1VXiXWyz<br />
<br />
http://pastebin.com/D07fc65yAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-73127347672576442022012-09-02T07:08:00.000-07:002012-09-01T19:09:49.165-07:00Cambodian Government Sites Attacked for #OpTPB2<div style="text-align: center;">
<img height="350px" src="http://3.bp.blogspot.com/-tu93RlyBM6g/UCcvmp-6i5I/AAAAAAAAC2g/wP2NVVV784M/s1600/privacy.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
This week there has been a major turn in the fight against censorship with one of the worlds largest torrent sites being arrested and detained in Cambodia. As a result of this already hackers have started to attack Cambodian based government websites.<br />
<br />
So far there has been 2 leaks and the attacks so far have come from Nullcrew aka @OfficialNull and they have targeted the tax office (http://www.tax.gov.kh/) , ministry of works and transport (http://www.mpwt.gov.kh) and the Institute of Standards of Cambodia (http://www.isc.gov.kh/) in the first attack and in the second the Cambodian army have been targeted.<br />
<br />
The attacks have only resulted in very minor data being leaked but it does prove that the Cambodian government really needs to rethink their cyber security and they need to do this fast before something major happens.<br />
<br />
<i><b>Recently the co-founder of Piratebay was arrested in Cambodia, this seems like the megaupload case.</b></i><br />
<i><b>As long as the government attempts to censor, then there will be more of this; what happened to “Freedom.”</b></i><br />
<i><b>It is angering, whenever they won’t allow us the slightest bit of freedom on the internet, taking all we care for.</b></i><br />
<i><b>So that is why #OpTPB has come to be, they should have expected it when they did this.</b></i><br />
<i><b>Cambodia, we will not stop until you come to your sences.</b></i><br />
<i><b><br /></b></i>
<i><b>And now, for the leaks!</b></i><br />
<br />
part 1 http://pastebin.com/uMJzRyB9<br />
<br />
part 2 http://pastebin.com/KRvybdL7<br />
<br />
http://ozdc.net/archives.php?aid=3182Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-18490527980432437652012-09-01T13:57:00.000-07:002012-09-01T02:02:50.959-07:00National Bank Limited & Standard Chartered Banks hacked by @0x00x00 A hacker using the handle @0x00x00 who has been leaking data all week has just released a load of data from two banks after they were hacked.
<br />
<div style="text-align: center;">
<img height="350px" src="http://cdn.cyberwarnews.info/wp-content/gallery/random4/34sf5sx.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The hack is on National Bank Limited (nationalbanklimited.com) and Standard Chartered (standardchartered.com). The NAtional bank limited appears to be offline at time of publishing and this may have something do to with these hacks.
<br />
<div style="text-align: center;">
<img height="350px" src="http://cdn.cyberwarnews.info/wp-content/gallery/random4/e67h2a.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The hacker has also released two images from the hack which shows the banks back end.
<br />
<blockquote class="twitter-tweet tw-align-center">
#BankOwnage nationalbanklimited.com standardchartered.com Pwned! pastebin.com/raw.php?i=8Wbb… @TruthIzSexy @BreakTheSec @Cyber_War_News @AnonOpsSweden<br />
— กิิิิิิิิิิิิ(@0x00x00)<a data-datetime="2012-09-01T02:33:04+00:00" href="https://twitter.com/0x00x00/status/241725330883223553">September 01, 2012</a></blockquote>
The leaked data is 2 complete database dumps one from each bank. The leak was announced via twitter and posted to pastebin with 2 further links to dropbox for full database download <a href="http://dl.dropbox.com/u/48825242/standardcharteredbank.sql" target="_blank">here</a> and <a href="http://dl.dropbox.com/u/48825242/bank.sql" target="_blank">here</a><br />
<br />
Each leak contains a few administration account details as well as load of other information,<br />
<br />
standardchartered.com<br />
<iframe frameborder="0" height="240px;" src="http://ozdc.net/embed.php?aid=3180" width="300px;"></iframe><br />
Nationalbanklimited.com<br />
<iframe frameborder="0" height="240px;" src="http://ozdc.net/embed.php?aid=3179" width="300px;"></iframe><br />
http://ozdc.net/archives.php?aid=3179<br />
<br />
http://ozdc.net/archives.php?aid=3180<br />
<br />
http://pastebin.com/8WbbWqYJAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-12217964508785365042012-09-01T09:21:00.000-07:002012-08-31T21:24:23.162-07:00Classmate of Lulzsec Hacker arrested and accused as another Lulzsec teammate<div style="text-align: center;">
<img height="350px" src="http://2.bp.blogspot.com/-_OrozMQ5d-8/UEFWtGUpCqI/AAAAAAAAH2k/8jb2vj4hjTg/s1600/Classmate+of+Lulzsec+Hacker+arrested.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The two students accused of Sony Pictures hack participated in Cyber Defense Competition team exercises at the University of Advanced Technology in Arizona. US authorities have reportedly arrested a second suspected member of hacking group LulzSec on charges of taking part in an extensive computer breach of Sony Pictures Entertainment.<br />
<br />
Raynaldo Rivera, 20, of Tempe, Arizona, surrendered to the FBI in Phoenix six days after a federal grand jury in Los Angeles returned an indictment charging him with conspiracy and unauthorised impairment of a protected computer.<br />
<br />
In September 2011 charged Cody Kretsinger, then 23, with being Recursion. This week, meanwhile, the FBI announced the arrest of Raynaldo Rivera, 20, after he was recently indicted by a federal grand jury on charges of conspiracy and the unauthorized impairment of a protected computer.<br />
<br />
Two men who've been arrested on charges that they hacked into the website of Sony Pictures Entertainment and posted stolen data studied together at the same university, and they also participated on the university's team for the Cyber Defense Competition held in March 2011.<br />
<br />
According to court documents, the attackers used a VPN service in an attempt to mask their activities, and later boasted of having compromised the Sony website by using a single SQL-injection attack.<br />
<br />
Kretsinger began pursuing a network-security degree at UAT in August 210, and in July 2011 was named as student of the month, saying that "a job with the NSA or Department of Defense is my ultimate dream."<br />
<br />
Both men’s grand jury indictments charge them with conspiracy and unauthorized impairment of a protected computer to participate in the Sony breach, which authorities said cost the studio more than $600,000. Prosecutors say Rivera used a proxy server to conceal his IP address and location.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-11409290745691685192012-08-31T21:32:00.000-07:002012-08-31T09:36:14.816-07:00Anonymous Threatens New York Times, OpNYT Initiated<div style="text-align: center;">
<img height="650px" src="http://i1-news.softpedia-static.com/images/news2/Anonymous-Threatens-New-York-Times-OpNYT-Initiated-2.jpg?1346406214" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Anonymous once again turns its attention to the media. This time it’s the New York Times, its reporters being accused of trying to downplay the impact of the TrapWire mass surveillance project, whose existence was recently unearthed by WikiLeaks.<br />
<br />
After WikiLeaks published the Stratfor files and the world learned of TrapWire, the Internet started buzzing. Protests have been planned, sites have been hacked, and many have started looking for the company that’s behind it.<br />
<br />
Hacktivists and activists have concentrated their efforts on learning more about the project and the fact that someone called it “wildly exaggerated” isn’t seen too well.<br />
<br />
“The New York Times put on the story some yahoo who declared fears to be ‘wildly exaggerated’ in part because two unnamed, titleless sources at the Department of Homeland Security told them they tried it and didn't like it,” they wrote in a statement.<br />
<br />
“No indication is given as to whether or not this was proven to the reporter, or if he saw any evidence of it at all. At any rate, this reporter did not see fit to mention what was elsewhere being shouted by Anonymous, Telecomix, Wikileaks, ProjectPM, and independent researchers: that Cubic is in control of this capability, and that this was where the main problem lay.”<br />
<br />
While they’re upset that the paper published the piece, they don’t seem to have planned anything related to cybercrime. Instead, they urge supporters to raise awareness by “spreading these and other failures of the New York Times by attaching the info to those deeds to come.”<br />
<br />
Finally, Anonymous representatives claim that the Times has changed its administrator password recently, which they consider to be amusing, but “not in accordance with generally-accepted Anonymous tradition of non-aggression via hacking or DOS towards publications not run (officially) by the state.”Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-66421225792085588432012-08-31T21:15:00.000-07:002012-08-31T09:23:18.964-07:00Anonymous Releases Simple Guide for Joining the Community<div style="text-align: center;">
<img height="350px" src="http://i1-news.softpedia-static.com/images/news2/Anonymous-Releases-Simple-Guide-for-Joining-the-Community-2.png?1346400798" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
In a blog post entitled “How to join Anonymous” the hacktivists running AnonPR teach everyone, well, how to join Anonymous.<br />
<br />
“Wanna lose your theet, have a talking parrot, fire big ass canons and plunder a lot of booty? Then you’re in the right place lad! Here’s what you need to do in order not to be a total [expletive],” they write.<br />
<br />
“Find yourself a new name that is completely unrelated to anything you know or have usedbefore. Leave everything you did, have or know behind – especially your e-mail address and pics of your girlfriend.”<br />
<br />
They instruct their supporters to download an IRC client and join one of the many networks, depending on what they’re looking for.<br />
<br />
There is AnonPR for the latest news, AnonNet – where the dragons are –, AnonOps, VoxAnon, and AnonPlus.<br />
<br />
So far, the small “guide” has attracted the attention of hackers, activists, developers and even journalists. They all want to contribute to the movement.<br />
<br />
Yes, for many internauts to be part of Anonymous is cool, but before joining the hacker-activist community, there are some things you should consider.<br />
<br />
First of all, it’s not a bad thing to try and make your voice heard, especially if you have something to say. Protesting against things you consider to be unjust is also healthy. We have freedom of speech and we should use this right.<br />
<br />
However, there are other ways to make your voice heard besides hacking websites and launching DDOS attacks. Such activities are illegal and, as we recently witnessed, they will likely land you behind bars or in never-ending extradition trials which cause grief to your family and friends.<br />
<br />
In a recent interview we had with a former member of the TeaMp0isoN group, he sent out a message to all those who are thinking of becoming hackers.<br />
<br />
“Only thing I have to say to people is that the life of a blackhat is not worth the trouble and that I hope this does send a clear message out to people that you are not anonymous online, nothing is secure anymore. Be ethical and do good with your skills instead of bad, or you could meet the fate like the rest of the other big fish,” the hacker said.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-60352791424839594102012-08-31T19:49:00.000-07:002012-08-31T07:54:55.971-07:00RasGas, new cyber attack against an energy company<div style="text-align: center;">
<img height="350px" src="http://securityaffairs.co/wordpress/wp-content/uploads/2012/08/oil.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
A new strange attack has hit Qatar's natural gas pumper RasGas, like happened to Saudi Aramco company a virus has infected machines of its network.<br />
<br />
RasGas is a joint venture between Qatar Petroleum and ExxonMobil operating in Qatar that has an annual export quote of 36.3 million tonnes of liquefied natural gas.<br />
<br />
The attack has necessitated the isolation of the company systems from internet to avoid further damage to its infrastructures, according to local reports the office systems have been unusable since August 27th . Actually (Thursday August 30th 22:40 CET) RasGas website is still down, the company report.<br />
<br />
"RasGas is presently experiencing technical issues with its office computer systems. We will inform you when our system is back up and running."<br />
<br />
As occurred in the case of Saudi Aramco the malware was not affecting gas extraction and critical processing. An official RasGas spokesperson contacted by Pipeline editorial staff declared:<br />
<br />
“Our IT department is facing technical difficulties, we have been affected by an 'unknown virus’, our operational systems onsite and offshore are secure and this does affect nor impact our production as a Ras Laffan Industrial City plant or scheduled cargoes,"<br />
<br />
“In response to that we have a specialist RasGas IT team working in collaboration with ICT Qatar to resolve this issue as soon as possible,"<br />
<br />
The web press announced that the company has experienced an unprecedented complete shutdown of its computer network due to a reported "unknown virus" attack.<br />
<br />
<br />
<br />
Actually there are no info regarding the nature of malware and the motivation of the attack meanwhile in the case of Saudi Aramco the experts blamed the Shamoon malware recently discovered.<br />
<br />
Who is behind of these attacks?<br />
<br />
It's hard to provide an answer, the stakes are high and the possible responsibles are too much.<br />
<br />
In closing my last article on the case of company Saudi Aramco I had predicted that similar events could have been repeated soon. These companies are relatively easy targets for cyber attacks that can block their activities. Fortunately, to date there have been no serious accidents and serious damage to people and / or production plants, but it's just a fluke. The attacks will increase in frequency and complexity, and companies must be supported by their governments to put in place the appropriate defensive measures ... otherwise we will soon witness a catastrophe foretold.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-7481496315710813792012-08-31T18:55:00.000-07:002012-08-31T07:05:28.263-07:00Siemens and Fujitsu General Hacked, Data leaked for #OpColtan<div style="text-align: center;">
<img height="350px" src="http://ts1.mm.bing.net/images/thumbnail.aspx?q=4908474000343700&id=da1a1b7b5931ff5074014759454ba6cb" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Earlier we posted that another Philips website had been hacked not long after a large load of data was leaked from various other Philips sites. Well now another two electronics Giants have been hacked by Anonymous hacktivist in the name of OpColtan.<br />
<br />
The two companys are Siemens Switzerland (siemens.ch) and Fujitsu General Brazil(.fujitsugeneral.com.br) and both have resulted in data from server databases being leaked via paste sites.<br />
<br />
The attacks have been carried out by @OpGreenRights and the Siemens attack has been posted to private paste in two different parts while the Fujitsu leak was posted to pastebin in a single paste.<br />
<br />
The leaked data from the Siemens attack contains basic database information as well as other non critical information related to the site.<br />
<br />
Message:<br />
<br />
<i><b>Our attention turns to you, unscrupulously and greedy multinationals. Behind your famous commercial images, fabricated and marked on an false Ethic, the most cruel barbarites are hidden. </b></i><br />
<i><b><br /></b></i>
<i><b>Coltan, the mineral that you use to produce capacitors of mobile phones, besides being harmful to health, is also the sick result of environmental rape and enslavement of underdeveloped populations. </b></i><br />
<i><b><br /></b></i>
<i><b>His gruesome traffic conceal the abuse of human rights and the dirty, imperialist war, which is the daughter of greed and contempt of life in all its meanings. We can not remain indifferent to greedy profiteers whose revenues are derived from the suffering of a colonized, oppressed and exploited people, forced to work in inhuman conditions and paid with meager wages. </b></i><br />
<i><b><br /></b></i>
<i><b>We also can not remain indifferent to the accomplices of environmental devastation. Your work is unworthy: if you break the Life, we violate your sites. Appeal to the Citizens of the World: while self-styled advertising campaigns boast the next technological item, thousands of children are deprived of their childhood, their bloody hands don’t know what a toy is, and they excavate constantly, searching for a mineral which is harmful to health. </b></i><br />
<i><b><br /></b></i>
<i><b>Thousands of fathers and mothers also work up to 72 hours without any protection, being enslaved and humiliated. Coltan is deleterious for human rights, for environment, and also for health. </b></i><br />
<i><b><br /></b></i>
<i><b>Do not be complicit in this mess, make your voice heard, read up, stand up, fight to restore dignity to those who are without because of the dirty work of “democratic” giants of marketing. </b></i><br />
<i><b><br /></b></i>
<i><b>“We must always take sides. Neutrality helps the oppressor, never the victim. Silence encourages the tormentor, never the tormented.” (Elie Wiesel)</b></i><br />
<br />
part 1: http://privatepaste.com/2ef6d13062<br />
part 2: http://privatepaste.com/938acfc3f2<br />
<br />
http://ozdc.net/archives.php?aid=3163<br />
<br />
http://ozdc.net/archives.php?aid=3164<br />
<br />
The leak from Fujitsu contains a short message as well as the exploitable url a few administration accounts and assistant accounts as well. All passwords appear to be encrypted.<br />
<br />
http://ozdc.net/archives.php?aid=3162<br />
<br />
http://pastebin.com/1YMJPa8hAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-45449066604530809212012-08-31T18:41:00.000-07:002012-08-31T06:44:56.255-07:00Philips Advanced hacked for #OpColtan<div style="text-align: center;">
<img height="350px" src="http://i.imgur.com/d0ftR.png?1" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
Anonymous hacktivist have attacked another Philips based website and leaked more data today. The attack comes less then 24hrs after the first main release of data which was well over 200,000 client and subscriber emails and personal details.<br />
<br />
The most recent attack has been carried out by @OpGreenRights and has been dubbed as part of #OpColtan which has been running for many weeks now. The electronics Giants websites appear to be very insecure considering the amount of data and accounts that have been leaked from its servers.<br />
<br />
The most recent leak was posted to pastebin and has targeted the sub domain for the professional industry advance.philips.com. The leaked data contains very much the same information as the last leak with lots of company and personal information being leaked.<br />
<br />
It appears all passwords are encrypted.<br />
<iframe frameborder="0" height="240px;" src="http://ozdc.net/embed.php?aid=3158" width="300px;"></iframe><br />
<br />
http://ozdc.net/archives.php?aid=3158<br />
<br />
http://pastebin.com/j99WjJNSAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-43097812683432694292012-08-31T17:53:00.000-07:002012-08-31T05:56:33.676-07:00Russian Auto Company Hacked, Data Leaked<div style="text-align: center;">
<img height="350px" src="https://si0.twimg.com/profile_images/2535213202/zkx3khuzn69c6y7faoqh.png" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
A few days ago hacker group Nullcrew aka @OfficialNull announced that they had access to a Russian based auto company (http://lada-auto.ru) and they published its database layout with table and row names.<br />
<br />
Today they have published what they said they would and that is the matching data from them tables and rows and this data contains a bunch of user accounts and other auto group login details.
<br />
<blockquote class="twitter-tweet tw-align-center">
HUGE Dump (Russian Auto): pastebin.com/S2PVFMAz #OpRussia @YourAnonNews @AnonOpsSweden @Cyber_War_News @BreakTheSec @EduardKovacs<br />
— OfficialNull(@OfficialNull)<a data-datetime="2012-08-30T10:16:58+00:00" href="https://twitter.com/OfficialNull/status/241298492927135744">Agustus 31, 2012</a></blockquote>
Account details that have been leaked include usernames, emails and encrypted passwords.<br />
<br />
All together there was 1,404 emails and about 600 more accounts without emails.
<iframe frameborder="0" height="240px;" src="http://ozdc.net/embed.php?aid=3156" width="300px;"></iframe><br />
http://ozdc.net/archives.php?aid=3156<br />
<br />
http://pastebin.com/S2PVFMAzAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-75834281016007589922012-08-31T17:21:00.000-07:002012-08-31T05:22:52.410-07:00OpFreeAssange :Nullcrew hack more websites<div style="text-align: center;">
<img height="350px" src="http://yaledailynews.media.clients.ellingtoncms.com/img/photos/2012/07/30/nullcrew_r650x390.JPG?3f718820369242b7a257ae794d20e737b9eba86c" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The Hacker group NullCrew continue to show their support for Operation Free Assange by breaching into number of high profile sites.<br />
<br />
Yesterday, they hacked into the following sites:<br />
<br />
www.africacollege.leeds.ac.uk<br />
data.gov.uk<br />
<br />
They have compromised the database from those sites and leaked in separte pastes. The leak contains database details, email address, password hashes and usernames.<br />
<br />
The only statement they posted next to the data dump was a quote from the founder of WikiLeaks: Intelligence agencies keep things secret because they often violate the rule of law or of good behavior.<br />
<br />
This isn’t the only website allegedly penetrated by NullCrew in support for Assange. They also claim to have breached lada-auto.ru – a website dedicated to Lada, the trademark vehicle of Russian car manufacturer AutoVAZ.<br />
<br />
Meanwhile , a hacker reffered as 0x00x00, who is not affilated with Nullcrew, claimed that he hacked the following sites as part of the OpFreeAssange:<br />
<br />
www.history.knowsley.gov.uk<br />
www.nag.co.uk<br />
www.dlink.co.uk<br />
www.mcc.ac.uk<br />
www.tex.ac.uk<br />
www.sanger.ac.uk<br />
www.gsfc.nasa.gov<br />
www.navy.mil<br />
www.washington.eduAnonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-30421919365908925152012-08-31T16:16:00.000-07:002012-08-31T04:24:14.921-07:00British police logins grabbed by 'Free Assange' hacker<div style="text-align: center;">
<img height="350px" src="http://cdn-static.zdnet.com/i/library/uk-thumbs/police-uk.jpg" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
A hacker has posted online what appears to be login information for police officers in the Hertfordshire and Nottinghamshire constabularies.<br />
<br />
The usernames, passwords and PINs were posted to Pastebin on Thursday, along with the banner 'OpFreeAssange' and a quote from Wikileaks founder Julian Assange. The hacker, '0x00x00', stressed that he or she was not a member of Anonymous.<br />
<br />
In a statement, Hertfordshire Constabulary said it was investigating the breach, and confirmed that the information had been "stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website".<br />
<br />
The force said the database was externally hosted. The Pastebin document refers to Amazon Web Services, but a Hertfordshire Constabulary spokesperson was not able to confirm AWS was the hosting provider.<br />
<br />
Hertfordshire Constabulary said it had disabled part of its website as a precaution, but there was "absolutely no suggestion that any personal data relating to officers or members of the public has been, or could have been compromised".<br />
<br />
A spokesperson for Nottinghamshire Constabulary said in a statement that, following initial inquiries, the force was "confident at this stage that no restricted or confidential information was accessed or databases compromised".<br />
<br />
"We continue to investigate and have taken steps to further strengthen security around our website as a precaution," the statement continued.<br />
<br />
The hacker said in the Pastebin document: "This is nothing big not some l33t h4x shit ... but this tells how insecure the Web is."<br />
<br />
Julian Assange is currently holed up in the Ecuadorian embassy in London, having claimed asylum there after losing his fight against extradition to Sweden, to face questioning over sex crime allegations.<br />
<br />
Assange maintains that, if sent to Sweden, he will then be deported again to the US to face charges over US military and diplomatic secrets that were published through Wikileaks.<br />
<br />
His situation has sparked several online attacks, against targets such as the Ministry of Justice, that have apparently been perpetrated by members of the hacking collective Anonymous.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.comtag:blogger.com,1999:blog-5794787237574148079.post-54502525108474432422012-08-30T21:30:00.000-07:002012-08-30T09:31:36.386-07:00Ukrainian Civil Society and Government Website Hacked, OpUkraine<div style="text-align: center;">
<img height="350px" src="http://i1-news.softpedia-static.com/images/news-700/Ukrainian-Civil-Society-and-Government-Website-Hacked-OpUkraine.png?1346311575" style="font-family: Verdana, Arial, Helvetica, Georgia; font-size: 14px;" width="550px" /><span style="color: black; font-family: Verdana,Arial,Helvetica,Georgia; font-size: 14px;"></span></div>
The Anonymous hackers behind Operation Ukraine seem to be determined to put a stop to what they call the “dog Holocaust.” They recently hacked another high-profile Ukrainian site and published its entire database.<br />
<br />
The data leak consists of tens of email addresses, birth dates, IP addresses, usernames and password hashes allegedly stolen from the Civil Society and Government web portal (civic.kmu.gov.ua).<br />
<br />
This isn’t the only target of the second phase of OpUkraine. The organizations attacked previously are the Ukrainian Soccer Portal, the Football Federation, the Ministry of Agriculture, the Ministry of Internal Affairs and the website of the City of Kiev.<br />
<br />
However, until now, the hacktivists have relied on distributed denial-of-service attacks to make their point. Now, it seems that they’ve turned to other methods.<br />
<br />
Anonymous continues to accuse the Ukrainian government of violating the agreements made with animal rights organizations. This is probably why we will continue seeing such attacks, at least for a while.Anonymoushttp://www.blogger.com/profile/05755493988773464756noreply@blogger.com