• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

'Anonymous' collective hackers intensify cyber attacks across south-east Asia


ASIS website attacked by Indonesian hackers


Date November 11, 2013 - 3:57PM
David Wroe

spy_image-620x349.jpg


Indonesian hackers have crashed the website of Australian intelligence agency ASIS, according to hackers and cyber experts, dramatically stepping up the revenge attacks in response to the spying affair.

On Monday afternoon the website of the Australian Secret Intelligence Service was still not working.

Heru Sutadi, executive director of Indonesian technology think tank the Indonesia ICT Institute, confirmed that hackers from the country had launched a successful "distributed denial of service" attack, which crashed the website.

Mr Sutadi said the hackers, linked to the global cyber-activist network Anonymous, had first attacked the ASIS site on Friday evening.

Several Indonesian hacker groups were also boasting of the cyber-attack on online forums.

A group called the Indonesian Security Down Team is believed to have been behind the ASIS attack.

The ISD Team and other groups including the Indonesian Cyber Army and the Java Cyber Army have vowed to continue such attacks.

They say they are also targeting other high-profile Australian government sites including those of the national security agency ASIO and Department of Prime Minister and Cabinet.

Those sites were working normally on Monday afternoon.

The groups say they are retaliating against Australia's electronic spying operations from its Jakarta embassy, a program revealed by Fairfax Media recently. They say they will continue the hacking unless the Australian government apologises and promises to stop the electronic surveillance program.

An Australian Federal Police spokesperson said the ASIS incident had not been referred to them.

Australia's Department of Foreign Affairs and Trade, which has oversight of ASIS, refused to comment on Monday.

ASIS is the agency responsible for gathering foreign intelligence and carrying out counter-intelligence. It is approximately equivalent to the Central Intelligence Agency in the United States.

The ASIS website includes information on the agency's role, contact details and recruiting information.


 

Anonymous factions threaten cyber-war on one another over anti-NSA hacks


Published time: November 11, 2013 23:41

anonymous-factions-cyber-war-australia.si.jpg


Chip Somodevilla/Getty Images/AFP

Hackers affiliated with the Anonymous Australia collective have posted a video warning their counterparts in Indonesia that if they do not stop infiltrating private Aussie web sites the two factions could engage in an all-out cyber-war.

The group known as “Anonymous Indonesia” took responsibility last week for hacking more than 170 websites in Australia. Anonymous Indonesia told the website Tempo that the hack was in response to a report that the Australian government granted the US National Security Agency access to its embassy in Jakarta to spy on Indonesians.

Yet instead of retaliating against the Australian government Anonymous Indonesia seems to have disturbed the operations of private Australian businesses including a dry cleaner, a bouncy castle business that provides inflatable party toys, and others that obviously had nothing to do with any NSA activity.

The warning issued Monday was not the first video addressed to the Indonesian hackers.

“Innocent businesses should not be attacked,” the first video declared. “We all bound together in an effort to bring down our tyrant governments to shape our world as a better place.”

“You have not stopped your attacks against the Australian public where we have tried to plead with you,” Monday’s video said. “What is there to prove? We do not want a cyber-war, do you? …We have been patient with you, Anonymous Indonesia. There will be no more warnings if you choose to attack again.”

The message goes on to suggest that Anonymous Indonesia instead focus its efforts on the Australian Secret Intelligence Service (ASIS), the Australian Security Intelligence Organization (ASIO), and the Australian Signals Directorate (ASD).

That advice seems to have taken hold, as the ASIS website was knocked offline for hours on Monday. The other pages seemed to be operating as normal but Heru Satudi, executive director of the Indonesian technology think tank the Indonesia ICT Institute, told the Sydney Morning Herald a distributed-denial-of-service (DDoS) attack crashed the site.

Frustration with the Australian government’s complicity in the NSA spying has stretched far past Anonymous, though. The clandestine activity was first exposed by a leak from NSA whistleblower Edward Snowden last month and reverberations from the revelations are still echoing throughout the region.

“Enough is enough,” Indonesian Foreign Minister Marty Natalegawa told reporters last week. “While [the US and Australia] are not able to confirm or deny past activities, at least they should be able, and I’m making a public expectation here, I think they should be able to henceforth say they are not going to do it anymore.

“In the absence of assurances that such [spying] activities never took place, then of course we must assume that such activities are taking place, and draw our own conclusion in terms of their view of Indonesia as a partner,” he continued.

<iframe src="//www.youtube.com/embed/iYLq5HpYFwM?rel=0" allowfullscreen="" frameborder="0" height="360" width="640"></iframe>

 

BLOG: Anonymous targeting Asian government sites

Wade Williamson | Nov. 11, 2013

Guy Fawkes Day was November 5th, and a variety of loosely affiliated movements from Occupy to Anonymous joined to commemorate the day with a Million Mask March. However, it seems that Anonymous or at least Anonymous affiliated hackers in Asia decided to get an early start on the festivities with a variety of attacks against government websites in Australia, Singapore, and the Philippines.

Thus far, these attacks all bear the unmistakable signs of hacktivism, in that the compromised sites were defaced with political messages. Obviously, these sorts of attacks are nothing new, and we have been seeing a bit of their resurgence in the past few months. Prior to this action from Anonymous, the Syrian Electronic Army or SEA had claimed responsibility for a string of attacks targeting large news media organizations ranging from the New York Times to Twitter.

Whenever one of these attacks makes the news, it always seems to spur questions about how such a thing can continue to happen. I wanted to briefly share some of the more common tactics we are seeing against legitimate websites.

Direct Attack


First, it's important to realize that websites, and more specifically web servers, are very common targets for attackers. If the website accepts input from an end-user, that site can be subject to a variety of injection techniques that can allow an attacker to compromise data that the website serves, or ultimately compromise the server itself. These attacks will typically exploit a weakness in the way that the website or application validates a user's input, which allows an attacker to send specially crafted input to compromise the webserver or application. These attacks are extremely common, and are generally mitigated through a combination of IPS to detection injection attacks, web-application firewalling to detect specific attacks against web applications, vulnerability testing of websites, and training to ensure secure coding and web development practices.

Password Compromise


Ultimately, people manage websites, and those people will have passwords to authenticate themselves when managing the site. If an attacker can compromise those credentials, then the attacker gains all the privileges and access of the administrator. This technique was heavily utilized earlier in the year when the SEA was able to steal Twitter credentials for news organizations and was able to send out fake news updates that caused significant movement in financial markets.

This approach can somewhat bridge the gap between hacktivism and the more advanced threats or APTs. To steal a valid user's credentials, attackers will send targeted phishing emails in order to lure the user into entering their credentials into the attacker's website or to deliver malware to the target that will steal the user's password from the local machine. This approach includes some of the basics of an APT, but ultimately the goal is still to gain notoriety for the attacker. Mitigating these attacks requires a complete approach to cybersecurity capable of blocking all types of malicious traffic and content ranging from drive-by downloads, exploits and malware to command and control traffic and malicious URLs, as well as proactive testing of any unknown files or traffic to expose hidden threats. Additionally, end-user training can help users learn to recognize phishing attempts, and two-factor authentication should be implemented to protect web resources from simple password compromises.

DNS Hijack and Redirect

Stealing passwords can be useful for an attacker in a variety of ways. The SEA attacks against the New York Times and variety of other sites provided a stark case in point earlier this year. In that case, instead of stealing passwords from the New York Times directly, the attackers targeted the DNS registrar that the Times uses for its websites. In short, the attackers didn't really attack the New York Times directly at all - they simply broke in to Melbourne IT (the DNS registrar for the New York Times) and changed the DNS record for nytimes.com to point to an IP address in Syria.

An attack such as this is obviously hard to control from an IT perspective simply because the attack never directly touches the intended target. That underscores the importance of choosing a registrar that asks thorough, pointed questions about how security is handled by the vendor. Many registrars will offer additional safeguards and locks that make it far more difficult and time-consuming to make any domain level changes to an account, although not all registrars do this.

Ultimately, there are plenty of methods that can be used by hacktivists to compromise a site and its data. Hacktivism season seems once again in full swing, so it's crucial to know what you're up against and safeguard your data as much as possible.

Wade Williamson is Senior Security Analyst at Palo Alto Networks.

 

Internet Davids take on the NSA Goliath

San Francisco : CA : USA | Nov 11, 2013 at 1:02 AM PST BY preetamkaushik send a private message SelectMedia

101671330-nsa-logo.jpg


It was a United States government agency, the Defense Advance Research Projects Agency, which gave birth to the Internet, and ironically it is another arm of government, the National Security Agency, which has spared little effort in undermining the freedom and openness that Web denizens had taken for granted.

With a multi-billion dollar budget and government cover, the NSA is a formidable adversary to confront. Yet, pockets of resistance are emerging—from countries hit by NSA spying and technology companies coerced to part with their customer data to maverick Internet technologists who have seen their vision for a free Internet corrupted.

Battling Big Brother

The alarming aspect of the NSA’s activities is not that it can snoop on an individual’s cellphone, email or social media network—people took that for granted in case of terror suspects—but that the NSA is proactively “collecting it all,” regardless of probable cause.

Expert like Bruce Schneier, who helped The Guardian newspaper vet Edward Snowden’s cache of secret documents, have issued a clarion call to bodies such as the Internet Engineering Task Force (IETF)—whose mission is to make the Internet function even better—to plug many of the design and technology loopholes that have allowed the NSA to operate with such impunity.

However, the NSA would still be able to coerce companies to collaborate. To mitigate such pressures Google has lodged an appeal with the US Foreign Intelligence Surveillance Court—which authorizes the NSA requests—to share information with the public about the number and scope of such requests.

Countries like Brazil are planning to combat the NSA by bypassing US dependence on Internet infrastructure. The measures range from laying an undersea fiber optic cable to connect South America and Europe independently to demanding that US tech companies operating in Brazil, store data locally.

Rebels with a cause


Seattle-based Riseup.net is a veteran of this fight. Since 1999 they have offered secure chat and email services by not logging users IP addresses, prohibiting data sharing, and refusing to cooperate with the NSA.

With more than 6 million subscribers, Riseup has been galvanized by the NSA revelations to up the ante– it has taken the crowd funding route to raise more than $10,000 to scale up their services. In October, the organization held a “Stop Watching Us” rally in Washington that attracted thousands of protestors demanding legislative oversight of the NSA’s activities and an end to indiscriminate surveillance.

Recent history favors the citizens in their fight. In the 1990s the NSA wanted all electronic devices to be equipped with hardware called a “Clipper Chip.” This would transmit encryption code to the NSA, which would use it to decrypt data on a particular device if the need ever arose. The backlash from technology and civil liberty activists forced the government to back down.

After enduring two long wars in the past decade, does the US government really want to pick a fight with the whole world and its own people on this of all issues?

 

Hacker group alleges Logan River Academy abuses clients


By Amy Joi O'Donoghue
November 11th, 2013 @ 8:05pm

25022673.jpg


LOGAN — The hacker group Anonymous reportedly has the troubled teen industry on its cyber hit list, zeroing in on the Logan River Academy on Monday in a campaign that asserts abuse of its underage clients.

A Twitter storm on social media with the hashtag "ShutLoganRiver" was active on Monday, drawing on allegations that the Utah school uses prolonged solitary confinement, called "development" time, as a way to punish non-compliance with school rules.

Anonymous is a loose and elusive online collective of people around the world who call themselves "hacktivists," responding at varying scales to perceived social injustices.

Participants in the Twitter conversation shared testimonials reportedly posted by family and participants criticizing the program.

"We actually chose to send our son to Logan River Academy, after paying an experienced educational consultant who highly recommended it. The decision was the worst we have ever made," wrote parents from Fairfax, Va. "We pulled our son after only 5 months, the last 3 of which were spent primarily in 'devo' (solitary)."

"I was a victim of this program. I was mentally tortured and (still) have a scar that will never go away," said a Texas resident.

Logan River Academy issued a statement Monday denying allegations of illegal or unsafe conduct, calling the information being shared online "false, inaccurate and misleading."

"Students are not isolated, secluded, abused or mistreated in any way," the statement said. "To the contrary, students facing an acute and temporary crisis receive increased supervision and support during the crisis to protect them and others and to best provide for their well-being."

I was a victim of this program. I was mentally tortured and (still) have a scar that will never go away.
–Texas resident
On its website, the academy describes itself as having experience and success at helping youth 12-18 with autism spectrum disorders, ADHD, anxiety and substance abuse issues, to name a few.

The group is urging that people demand AdvancEd drop the school's educational accreditation and is directing followers to put pressure on Logan Mayor Randy Watts and Utah Gov. Gary Herbert to stop the use of methods it describes as abuse.

On its website, Logan River Academy describes itself as having experience and success at helping youth 12-18 with autism spectrum disorders, ADHD, anxiety and substance abuse issues, to name a few.

The campaign, which builds on a petition on change.org, describes a multi-billion dollar troubled youth industry that charges parents thousands of dollars of month for "treatment" programs that are carried out under little government oversight or scrutiny.

The petition appeared in early October, passing 200 signatures by the end of the month. From there it picked up speed, and had about 870 signatures Monday night.

Utah, the change.org campaign said, is a state "where there is comparable lack of oversight and relevant legislation to safeguard vulnerable students in residential programs."

The troubled youth industry and its robust Utah presence has been the genesis of controversy for years, at times prompting calls for reform.

Nearly a decade ago, Utah licensing officials and watch-dog organizations were urging more oversight for these private programs to ensure that "discipline" doesn't amount to abuse.

In 2004, an attorney with the Utah Attorney General's Office advised state lawmakers that the complete isolation from the outside world in some of the treatment settings creates a high risk for the potential of child abuse and child sex abuse.

Contributing: McKenzie Romero

 
So this is the Messiah??? Anonymous my ass, just another nutcase...

http://sg.news.yahoo.com/james-raj-...ng-mo-kio-town-council-website-034350228.html

A Singaporean man was charged on Tuesday with hacking the Ang Mo Kio town council website in October. James Raj , 35, was charged under the Computer Misuse and Cybersecurity Act.

His lawyer M Ravi said that Raj was charged for defacing a portion of the Ang Mo Kio town council website, adding the image of the Guy Fawkes Mask, displaying a statement addressed to Member of Parliament Ang Hin Kee and signing of with the name “The Messiah”.
The Straits Times reported that Raj was also charged for hacking The Straits Times blogs, the PCF website and Sun Ho's website.

Today reported that Raj had told the court that he has Attention Deficit Hyperactivity Disorder (ADHD), is currently taking medication, claims to be suicidal, suffering from hallucinations and seeing things flashing randomly. The report added that he is being remanded at the Institute of Mental Health (IMH) for a psychiatric evaluation.

M Ravi told Yahoo Singapore that he had been denied access to his client since Monday.

“My client faces serious violation of his constitutional rights of not only having access being denied to him yesterday but also the police denying him access to his counsels… I was denied access to speak to him for even five minutes [in court]," he said.

M Ravi added that he will “file an urgent application to the High Court to seek access to him” if the access is still not granted when court stands at 2:30pm.
 


A charge sheet seen by AFP mentioned
no direct links between Anonymous and Raj, who is also facing drugs charges.



What a failure.

Singapore questions suspects in hacking of PM, president websites

AFP
November 12, 2013, 6:19 pm

e400c6c327ec37dac0f46e10108a1c83f5fbd54c-1983lsr.jpg


Singapore (AFP) - Five local men are being held for allegedly hacking the websites of Singapore's president and prime minister, police said Tuesday, amid a rash of cyber attacks in the city-state.

Police said in a statement the alleged hackers had "exploited a vulnerability" in both websites to display pages from other sources last week.

A "subpage" of the website of the Istana, the official residence of President Tony Tan, was hacked and displayed a crude image early last Friday, an hour after Prime Minister Lee Hsien Loong's website displayed mocking messages from international activist hackers' group Anonymous.

Police said the five suspects are local men aged between 17 and 45.

Another Singaporean, 35-year-old James Raj, was charged in court earlier Tuesday with hacking a local council's website and posting an image of a Guy Fawkes mask, the international symbol of Anonymous.

Raj was charged with hacking into the website of the Ang Mo Kio town council, a district whose team of MPs representing it in parliament is led by Premier Lee, on October 28, and posting the image.

The hacking took place three days before a self-proclaimed spokesperson for Anonymous demanded in a video that Singapore scrap a law requiring news websites to obtain annual licences.

The new Internet licensing rules came into force in June and have angered bloggers and activists who say they are designed to muzzle free expression.

Singapore strictly regulates the traditional media, but insists the new licensing rules do not impinge on Internet freedom.

A charge sheet seen by AFP mentioned no direct links between Anonymous and Raj, who is also facing drugs charges.

According to the charge sheet, Raj identified himself as "The Messiah" and carried out the intrusion from an apartment in Kuala Lumpur, the capital of neighbouring Malaysia.

The same moniker was used by someone who hacked a reporter's blog on the website of the pro-government Straits Times newspaper on November 1.

Raj is also accused of posting a banner on the municipal website which said that one of its members of parliament was tendering his resignation.

He faces a maximum fine of Sg$10,000 ($8,000) and imprisonment of up to three years, or both.

Raj's lawyer M. Ravi opposed his client's continued detention and another hearing was scheduled later Tuesday.

Police said Raj was also linked to a series of hacking incidents, including penetrating the website of a charity group linked to the ruling People's Action Party.

It said Raj and the hackers who allegedly defaced the president and prime minister's websites were not linked.

Prime Minister Lee last week warned that his government would "spare no effort" in going after Anonymous members, who threatened to wage a "cyber war" over the new Internet licensing rules.

 
Last edited:
Police said Raj was also linked to a series of hacking incidents, including penetrating the website of a charity group linked to the ruling People's Action Party.

As expected of loser opposition supporting retards. They will even resort to attacking Charity websites
 

Published: Tuesday November 12, 2013 MYT 5:26:00 PM
Updated: Tuesday November 12, 2013 MYT 5:28:57 PM

Malaysian police help nab Singaporean "The Messiah" who hacked Singaporean government website

BY TAN YI LIANG

PETALING JAYA: A Singaporean hacker calling himself the "The Messiah" was arrested in Kuala Lumpur last Monday for hacking into a Singaporean government website over two weeks ago - from a Kuala Lumpur apartment.

He was charged in a Singaporean court on Tuesday.

Singaporean police tipped of their Malaysian counterparts who swooped in on "The Messiah", 35-year-old James Raj Arokiasamy, in Dorchester Apartments in Sri Hartamas on Nov 4.

James Raj, who had been on the run over three drug offences allegedly committed in 2011, was handed over to the Singaporean police on Nov 5.

On Tuesday he was charged for hacking into the Ang Mo Kio Town Council website on Oct 28 as well as for the drug offences.

If found guilty of the charges under Singapore's Computer Misuse and Cybersecurity Act, he could be fined up to $10,000 and jailed up to three years, or both.

James Raj, who is currently being remanded at the Institute of Mental Health is also believed to be involved in other cyber intrusions, including that of The Straits Times’ blog site and the People’s Action Party (PAP) Community Foundation and City Harvest Church’s co-founder Ho Yeow Sun’s websites.

Singapore’s The Business Times reported that James Raj had been remanded for two weeks beginning Tuesday for psychiatric evaluation after he disclosed he had been prescribed Ritalin for Attention Deficit Hyperactivity Disorder (ADHD), borderline personality disorder, suicidal tendencies and depression.

He was told to turn up in court on Nov 26.

According to the Straits Times on Nov 2, Singapore went on high alert after an attack on a blog on The Straits Times website in the early hours of Nov 1 and a video uploaded by Anonymous on Oct 31 on YouTube.

Anonymous referred to "The Messiah" and three hacking attacks - on the Ang Mo Kio Town Council website, the PAP Community Foundation website and Sun's official website in the video which ran for three minutes and 42 seconds.

 

The US can lock up hackers, but it can't crush their spirit

Jeremy Hammond is just the the latest to be targeted in a global witchhunt against the brightest minds of a generation


Laurie Penny
The Guardian, Thursday 14 November 2013 19.36 GMT

Young-boy-aged-16-sat-dow-008.jpg


To 'the online culture … digital activists who risk everything for the public's 'right to know' are heroes'. Photograph: fotovisage/Alamy

Why is the US sending some of its best young minds to jail? On Friday Jeremy Hammond, a 28-year-old digital activist from Chicago, will learn how many years he is to serve for participating in the 2011 hack of the private security firm Stratfor. "I believe in the power of the truth," said Hammond, pleading guilty to helping liberate millions of emails from the company, which is paid by large corporations to spy on activists around the world. "I did this because I believe people have a right to know what governments and corporations are doing behind closed doors. I did what I believe is right."

Like the others who took part in the Stratfor hack, Hammond wasn't out for money, and he didn't get any. Nonetheless, he has spent the past 18 months in prison, including extended periods in solitary confinement, and now faces a 10-year prison sentence. Hammond is the latest target of a global witchhunt against hackers, whistleblowers and anyone who seeks to release private information in the public interest.

The witchhunt is being led by the US government, but its targets are international: Lauri Love, an activist from Suffolk, was arrested in Britain last month and may face extradition on charges of hacking into US government networks and a possible decade in a US jail. The legislation used to single out and lock up these people is the Computer Fraud and Abuse Act, a flexible law that allows US courts to impose almost indefinite sentences against any crime committed with a computer, down to simple violation of terms of service.

In practice, by some staggering coincidence, the digital crimes that get prosecuted are those that happen to make governments and large corporations look foolish. Financial damage is the main thrust of the prosecutors' claim against Hammond and his fellow LulzSec members, but it isn't really the money that matters. Hammond is being asked to pay back just $250,000; by comparison, you would have to embezzle tens of millions of dollars to get an equivalent sentence for corporate fraud in the same Manhattan courtroom.

No, what matters is that people are using their computer skills to expose uncomfortable truths – including Stratfor's alleged involvement in spying on the Occupy Wall Street protests. "Punishment has to be proportionate to the harm caused," said Hanni Fakhoury, staff lawyer at the Electronic Frontier Foundation. "These punishments are excessive."

With the right skills, you no longer have to hide out in a lonely Washington carpark to leak classified information. You don't have to break into a building to steal documents that might be in the public interest. You don't even have to put your trousers on. All you need to do is sit at your computer and type. The practical risks of hanging out the mucky bedsheets of power are decreasing just as a generation that has grown up with a weary distaste for government lies hits adulthood. Clearly, something has to be done to make them fearful again – and fast.

The witchhunt against hackers and leakers is designed as a deterrent. That, after all, is the logic behind sending people to prison: threaten potential scallywags with the loss of their freedom and livelihood and they might just fall in line. The wildly disproportionate sentencing of young digital activists suggests that there's something the US government and associated nation states are anxious to deter. The trouble is that this deterrent looks rather likely to backfire.

If one thing unites the hackers and whistleblowers hunted by the US government over the past three years, from Chelsea Manning and Edward Snowden to notorious prankster Andrew "weev" Auernheimer, it is that they have little respect for the moral authority of the US government and its mechanisms. They are in their teens and 20s; they grew up in the Bush, Blair and Brown years and came of age just as the financial crash of 2008 swept away the socioeconomic justification for Anglo-American imperialism. The online culture that they helped create believes deeply in transparency and, to that culture, digital activists who risk everything for the public's "right to know" are heroes.

Jeremy Hammond is not the first information activist to be made a martyr by the US state, and he is unlikely to be the last. There are a lot of things you can do, if you are the most powerful nation on Earth, to make individuals afraid. You can destroy their chance of a safe and happy future. You can lock them up for years. But the one thing you can't do, ever, is force them to respect you – and if you can't do that, on a basic level, you have already lost.


.........................................................................................


http://freeanons.org/name-jeremy-hammond/



3458350.png



 

Busted Hacker Becomes FBI Snitch


New York City : NY : USA | Mar 06, 2012 at 4:18 PM PST BY Larry-Crehore

90491051-sabu.jpg


"Sabu" Hector Xavier Monsegur aka Sabu

A group of six expert hackers who have been attacking governments and corporations around the globe have been arrested after its ringleader turned against his comrades and secretly began working as an snitch for the FBI months ago, authorities have announced. Five people were charged in court papers unsealed in federal court in New York. Authorities also revealed that a sixth person, Hector Xavier Monsegur (aka “Sabu”) of New York, has pleaded guilty. Monsegur was charged with conspiracy to engage in computer hacking, among other offences. To which he pled guilty on August 15, 2011.

Portrayed in court papers as the ringleader, Monsegur is known to the hacking underworld as Sabu. Authorities said he formed an malicious hacking group last May and named it Lulz Security or LulzSec. Lulz is internet texting slang that can be interpreted as "laughs", "humor" or "funny." Monsegur and his followers embarked on a dastardly stream of deeds against businesses, government entities, theft of confidential information, defacing of websites and attacks that temporarily shut down business.

According to court papers, Monsegur was an influential member of three hacking groups Anonymous, Internet Feds and Lulz Security, these groups were responsible for multiple cyber attacks on the computer systems of various businesses and governments throughout the world. He also identified vulnerabilities in the computer systems of potential victims.

According to the court papers he participated in attacks over the past few years on Visa, MasterCard and PayPal; Algeria, Yemeni, government computers in Tunisia, Zimbabwe, Fox Broadcasting Co and the Tribune Co, PBS; and the US Senate.

Some alleged associates of the group are already facing charges elsewhere. In England teenager, Ryan Cleary, was arrested in June. In July, a supposed LulzSec spokesman, Jake Davis, was arrested in Scotland. Irish police said on Tuesday that one of the five suspects had been arrested and was being held at a Dublin police station.


 

Microsoft websites went down because of Anonymous

Posted by: HNBulletin in Anonymous, Anonymous Headlines December 1, 2013

dolphin.jpg


Neowin’s reporting that most popular websites belonging to Microsoft services, including microsoft.com, outlook.com, msn.com, office365.com, Microsoft Developer Network, TechNet, SkyDrive, the Windows Store, sites hosted on Windows Azure, xbox.com and Xbox Live broke down.

The Redmond-based tech company has become unavailable on Nov 22, by getting complaints from its users who tried to access Microsoft’ services provided with a “Server not found” error. Later it became clear that the site went down because of attacks initiated by Anonymous group and launched as a part of Operation Killing Bay.

“A couple days ago a DDoS attack was launched at Japanese Microsoft (Domain) Websites and Servers. We are sorry to report that the Japanese Microsoft Websites and Servers did not go down as planned. Although something did go down. We took the pretty much the entire Microsoft domains down,” Anonymous said in their letter.

“We are investigating the root cause of the disruption and will”, the company said.

Operation Killing Bay also known as Taiji. It’s named after a small village in Japan called Taiji. Taiji came into readers’ minds as a place where amount of dolphins slaughter taking place frequently.

Although, Microsoft confirmed that all online services have been restored. And in a very “short statement” that the restoration experienced a lot of problems.

 

IT Security News aggregated by IT Security expert Sorin Mustaca


Venezuela Government websites defaced by @LIberoamericaMu

December 1, 2013 ITSecurity News ehackingnews

Anonymous+Venezuela-government-websites-hacked.jpg


A hacker with twitter handle “LIberoamericaMu” from Hack Argentino team, has gained access to multiple Venezuela Government websites and defaced them.

The hacker in tweet said the hack is for Anonymous Venezuela and said that it will be continued.

“This post is dedicated to all venezonalos, we will not allow this corrupt government dominates our way of thinking we are prepared to face them MATURE F*** YOU!! Cuba will not allow our country to dominate.” The defacement message reads(translated).

List of hacked websites:

pgmerida.gob.ve
www.fundaciteportuguesa.gob.ve
zonfipca.gob.ve
www.iamdr.gob.ve
alcaldiabrion.gob.ve
www.alcaldetorbes.org.ve
www.cortudelta.gob.ve
casabello.gob.ve
polimaturin.gob.ve

The group also hacked the sub-domain of the Venezuela Military website “http://esguarnacpuntademata.mil.ve”. At the time of writing, all of the affected sites still defaced.

via E Hacking News [ EHN ] – Latest IT Security News | Hacker News

 
Last edited:

Florida cop arrested for wearing ‘Anonymous’ mask at Obamacare protest

By Scott Kaufman

Monday, December 2, 2013 11:40 EST

anonymousmasks-shutterstock.jpg


Masks from the film "V for Vendetta," popularized by the "Anonymous" movement. Photo: Shutterstock, all rights reserved.

A North Miami Beach police officer who was protesting the Affordable Care Act was arrested this weekend when he refused to remove the Guy Fawkes mask he was wearing.

According to the police report, Ericson Harrell was wearing the mask, a black cape, and holding an inverted United States flag when police confronted him. He told them he was “protesting Obamacare,” but when he “was asked several times to remove his mask and produce some form of identification or tell us his name,” he refused.

He told officers that “his anonymity was his cause, thus the mask.” The Guy Fawkes mask was popularized by the hacktivist group Anonymous, but originated with David Lloyd’s homage to the purported leader of the Gunpowder Plot in Alan Moore’s 1983 comic book serial V for Vendetta.

When officers discovered he was carrying a .40 caliber pistol in his waistband, he relinquished some of his anonymity by informing them “I’m a cop, I’m a cop.”

He was ordered not to make any sudden movements, then charged with obstruction of traffic and wearing a hood or mask on a street. Florida has a statute — which originated with the state’s attempt to criminalize the Ku Klux Klan without violating the Constitutional guarantee to free assembly or ruining Halloween — that states that “[n]o person or persons over 16 years of age shall, while wearing any mask, hood, or device whereby any portion of the face is so hidden, concealed, or covered as to conceal the identity of the wearer, enter upon, or be or appear upon any lane, walk, alley, street, road, highway, or other public way in this state.”

Harrell was not taken into custody, but issued a summons to appear in court. His superior in the Plantation Police Department collected his badge and police identification on Sunday, but as of this moment his current employment status is unknown.

 


Cyber attacks becoming more political, complex

By Kristine Angeli Sabillo
INQUIRERnet
6:50 pm | Monday, December 2nd, 2013

Anonymous-Philippines.jpeg


MANILA, Philippines – For the last few years, local hackers have been targeting government websites, defacing homepages or sending enormous amounts of illegal traffic to crash web servers.

Earlier in November, Anonymous Philippines called on the public to join their protest march against the “pork barrel” system by defacing at least 38 government websites. On August 26, during the Million People March, at least 30 websites were also hacked. Similar attacks have been made all over the world.

Cyber experts, during the Globe Business Enterprise Innovation Forum in late October, said online attacks in recent years have become more political in nature, in addition to their growing frequency and complexity.

“Two years ago, the motivation was financial. Today, it’s political or ideological,” Jeff Buhl of Arbor Networks said during the forum’s special track on security.

He presented an infographic, showing that at least 33 percent of today’s cyber attacks were because of political or ideological reasons, followed closely by online gaming at 31 percent and vandalism at 27 percent.

He said many of these incidents involve Distributed Denial-of-Service (DDoS) attacks which involve “compromised hosts or bots sending illegal traffic to networks to stop or prevent legitimate traffic.”

“(It’s) like Manila at rush hour,” he said of DDoS attacks that are able to stop online services through the traffic saturation.

Buhl said activists and political groups all over the world have been attacking websites and systems of banks and other institutions as a form of protest.

He said that while there is a 60 percent increase in DDoS attacks over last year, only half of the sources could be monitored with the rest still anonymous.

“There’s a reason why the largest attacking group in the world is called Anonymous,” he said.

Buhl also shared the following information with the audience:

Source of cyber attacks (global):


China 12.5%
US 12%
Netherlands 4.5%
Destination of cyber attacks (global):
US 22.7%
China 21.9%
France 5.3%

Source of cyber attacks in the Philippines:


China 25.3%
US 6.4%
Spain 5.2%

He warned that DDos attacks in the Philippines have also been rising.

Buhl and other speakers, including Huawei Australia Chief Technology Officer Peter Rossi and COMSEC Senior Vice President Ami Braun, said that with attacks becoming more organized and complex, traditional tools and methods such as anti-virus applications and firewalls were not enough.

They said companies and governments all over the world should be more proactive by implementing advanced triggering systems to spot attacks in its early stages, as well as coordinating with each other.

 
Back
Top