Showing posts with label indian. Show all posts
Showing posts with label indian. Show all posts

Indian Hacker 'Godzilla' Hacked & Defaced Two Websites of Lashkar-e-Taiba

Lashkar-e-Taiba Official Website Hacked & Defaced By Indian Hacker Godzilla (Payback of 26/11)
A young Indian hacker going by the name of Godzilla have targeted couple of websites of infamous militant groups Lashkar-e-Taiba (LT). Which is widely known to us as one of the largest and most active pure jihadi organizations in South Asia, operating mainly from Pakistan. As per sources the hacker managed to gain access on the servers hosting both jamatdawa.org & jamatdawa.net; during this round of cyber attack he not only onslaught the LT server but also change the index page of those above mentioned site. The hacker left his message in the index page saying "Hafiz Muhammad Saeed, its a promise from our side you will not stay in Pakistan for a longer time." For those who are unaware of Hafiz Muhammad, Hafiz is the founder and one of master mind of Lashkar-e-Taiba, he was behind most notably the 2001 Indian Parliament attack and the 2008 Mumbai attacks. And this hack of Godzilla was directly linked to Mumbai attack of 26/11, in the defaced index page hacker quoted "26/11 we will never forget." The defacement has also been done on the very 26th November as payback to Lashkar's brutal attack on Mumbai which killed 170 innocent civilian. While writing this news, both the above website of Lashkar is still under constriction, but you can find the deface mirror from Zone-hc.com


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hcon Security Testing Framework (HconSTF) v0.5 Codename 'Prime' Released

Hcon Security Testing Framework (HconSTF) v0.5 Codename 'Prime' Released

Previously we have discussed couple of times about HconSTF - a browser based security testing framework. Earlier in last year we got HconSTF version 0.4, now after almost 14 month, the author of Hcon, Mr. Ashish Mistry (Information Security Researcher) has proudly released the version 0.5 of HconSTF code named "Prime." No doubt that Hcon has already became a very popular and widely used browser based pen testing framework. Not only in hackers community but also several security experts and infosec researcher's prefers Hcon as one of their all time favorite pentesing tool as HconSTF is very flexible and very handy multipurpose tool for any IT Security Professionals, Web Bug bounty Hunters, Web Developers or any one interested in IT security. As expected this version of Hcon, came with enhanced features and more functionality, so lets take a glance of HconSTF v0.5 -

HconSTF is semi-automated but you still need your brain to work it out. It can be use in all kind of security testing stages, it has tools for conducting tasks like,
  • Web Penetration Testing
  • Web Exploits Development
  • Web Malware Analysis
  • Open Source Intelligence ( Cyber Spying & Doxing )
  • and much more with lots of hidden features

HconSTF v0.5 in Brief:-
  • Based on Firefox 17.0.1
  • Designed in Process based methodology
  • Less in size (40mb packed-80mb extracted), consumes less memory
  • More than 165+ search plugins
  • New IDB 0.1 release integrated
  • Underlined Logging for each and every request
  • More NEW scanners for DomXSS, Reflected XSS
  • New reporting features like note taking, url logging for easy report making
  • Smart searchbox - just select and it will copy it and just change search engine to search
  • Integrated Tor, AdvoR, I2p and more proxies
  • New Grease monkey scripts (18 scripts)
To Download HconSTF v0.5 Click Here [Download Type- Portable (no need to install , run from usb drive or any memory card) Platform : Windows XP , Vista , 7 both x32 & x64]





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Jadavpur University Official Website is Vulnerable to Sql Injection

Jadavpur University Official Website is Vulnerable to Sql Injection 

An ethical hacker from India named Chirag Singh have figured out serious loopholes in the official website of Jadavpur University -one of the most renowned and prestigious university of India. Chirag find blind Sql injection vulnerability which can be exploited by malicious purpose in order to harm the website and gain access. From the vulnerability report submitted by the hacker, it has been found that the web-server of Jadavpur University is using Red Hat Enterprise Linux 5 (Tikanga) where the web application technologies are Apache 2.2.3 and PHP 5.1.6; along with the back-end database is PostgreSQL. The hackers also managed to dump 11 database with more than 215 tables as shown in the picture below 

This issue has already been reported to the concern person and the webmaster of Jadavpur University, and due to security and privacy we are not exposing and mention the vulnerable link and dumped database.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA Sub-domain is Vulnerable Allowing Information Disclosure

NASA Sub-domain is Vulnerable Allowing Serious Information Disclosure

National Aeronautics and Space Administration, widely known as NASA used to fascinate the hackers to come and breach its security system. Many of our readers may be astonished after reading the above lines, but its a fact and history is the witness of that. So far NASA have been targeted several times, where hackers have figured out vulnerability and penetrated the digital security. Yet again same thing happened to NASA, when an ethical hacker from India going by the name of "Zero Cool" find out serious loopholes in one of the sub-domain of NASA, which could lead sensitive information disclosure. The hacker shared a vulnerability report with us, where he has shown that, exploiting the vulnerability one malicious attacker can easily extract lots of confidential data from NASA server, such as source code of various programs (used by NASA), current project information, future research paper, topological graph, license information, several executable files, .dll files, private application software & it's source codes, employ details and many more highly confidential or in other word "Top Secrete" data and files. For security and privacy purpose we are not disclosing those vulnerable links, but exclusively for VOGH readers we are sharing few images to justify the fact. 



This vulnerability report has already been submitted to NASA, and as expected they immediately reacted and promised to path those loopholes with immediate effect. While talking about the ethical hacker "Zero" we would like to remind you that, before this NASA vulnerability disclosure, he exposed several vulnerabilities among many major and high profile websites such as FacebookReebok,Indiagames, mtv, lapdonline, UNESCO, Toshiba, Discovery.com, Novell.comMicrosoft Store India, several Pakistani  and Bangladeshi Govt websites and many more.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

HostGator India Hacked & Defaced By Indian Hacker Group Named "Cyber Rog"

HostGator India Hacked & Defaced By Indian Hacker Group Named "Cyber Rog"

In the cyber space no one is secured, whether its a defense organization, govt sector, federal authorities, giant IT company or even a hosting provider. The famous line "Security is an Illusion" is quite true, and it happens to one of the giant of web hosting provider "HostGator." It was the Indian domain of HostGator which have fallen victim in front of hackers. Few Indian hackers calling them selves "Cyber Rog" breached the tight security system of HostGator, not only that, but also the hackers uploaded his deface page in order to give some message to this giant hosting provider. "Let look at your face, you get pawned man" -said  those hackers from Cyber Rog. They also vows to hit back while saying "Secure your website, next time we will be back." At the end the hacker group made a satire while camouflaging them selves while saying "We are Anonymous" followed by a funny symbol. Immediately after this massacre get spotted the HostGator team restored the site and deleted the hackers page as shown in the picture below.

But you can still view the deface page from a mirror site called "Legend-H" Such matter is deferentially shameful for company like HostGator  who had passed the 200,000 mark in registered domains in 2008 and now that number has touched 80,00,000. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Man From India Jailed For Posting "Communal & Inflammatory" Post on Facebook (#Censorship)

A Man From India Jailed For Posting "Communal & Inflammatory" Post on Facebook (#Censorship) 
Freedom of social media in India has been revoked, as the Indian govt has implemented several policy by which they made the social network completely censored. Though this step has been criticized randomly but the decisions has remain unchanged. And the result is in front of us; when a man from Agra get busted. The incident occurs immediately after he made a posts on social networking site Facebook targeting Prime Minister Manmohan Singh, union Communications Minister Kapil Sibal and Uttar Pradesh's ruling Samajwadi Party (SP) chief Mulayam Singh Yadav. According to police the post which the man from Agra made violated the policy of Indian govt and that's why it is taken as "communal and inflammatory." the man named Sanjay Chowdhary, a resident of the Dayalbagh suburb of Agra, was arrested late Monday and his laptop, sim card and data card impounded.
Police in Agra, about 360 km from here, said the arrest, which some see as an attempt to muzzle freedom of speech and expression on social networking sites, that the arrest was made on "specific information" about certain "communal and inflammatory" posts by Chowdhary. However, officials here admitted that the "case became hypersensitive after some remarks were made on the SP chief".
Senior Superintendent of Police (SSP) Agra, Subhash Chandra Dubey said police had acted "purely on law and order basis" in the matter.
"We are not involved in the political angle of the whole issue, our concern were the inflammatory comments and posts on the Facebook wall of this man and we acted to prevent any communal flare up," Dubey told the media. Some officials, however, said the case was "fast tracked" once cartoons lampooning the three leaders were posted on his Facebook wall.
Soon after his arrest, the inflammatory posts were deleted from his Facebook profile and later his account was deactivated. Chowdhury, a civil engineer and chairman of a public school, was booked under sections 153 A of the Indian Penal Code (IPC) and 66 A of the Information Technology (IT) Act.
"We have arrested him and he is being sent to jail under the due process of law," a police official said.



-Source (Yahoo News)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Indian OS' DRDO Introducing It's Own Operating System to Harden Cyber Security

'Indian OS' DRDO Introducing It's Own Operating System to Harden Cyber Security 

On the 3rd Worldwide Cyber security Summit, Telecom and IT Minister of India, Kapil Sibal said the Indian Government will invest $200 million in coming 4 years. This high tech plan of Indian govt in now getting executed, as Defence Research and Development Organisation (DRDO) along-with other premier institutes is developing India's own operating system (OS), which is likely to be ready in next three years. One of the key purpose of developing this operating system named "Indian OS" to enhance cyber security and strengthen the cyber and digital fence of India. In September the Prime Minister of India Dr. Manmohan Singh  said the government is working on a robust cyber security structure, and this project of introducing the own and secure OS can be calculated as one of the very major part of that very robust cyber security system. 
Speaking to newsmen on sidelines of NAVCOM-2012', two-day international conference on Navigation and Communication that began here, Saraswat, Scientific Adviser to Defence Minister, said, "We have already started a major programme and are one-and-half-years into that programme. It (Indian OS) is a major effort requiring large number of software engineers working together." In his speech the Director-General of DRDO said "One of the major elements of cyber security is having our own operating system because today we are dependent on all OS systems which are imported whether it is based on Windows, Linux which is likely to be having malicious worms/things and hence it is essential that we have our own OS" 
He also said that 150 engineers were working across the country on creating Indian OS, and added it will take at least three more years for getting the Indian OS ready.

So, till that time being, we have to keep patience and wait. We the Team VOGH congratulates DRDO for making such a fruitful Operating System (Indian OS). We strongly believe that day by day the cyber fence of India will be safer and secure. Along with this, the Indian OS will definitely strengthen the nation's cyber security. 


 -Source (TOI)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Several Bangladeshi Govt Sites Along With Uninor Bangladesh & Few College Sites Hacked

Several Bangladeshi Govt Sites Along With Uninor Bangladesh & Few College Sites Hacked By Sen Haxor

After a long time yet again Bangladeshi cyber fence is facing cyber attacks from India. This time a young Indian hacker named Sen Haxor targeted several high profile Bangladeshi websites. Among them there are four Bangladeshi Govt sites which have fallen victim to this cyber attack. Those sites are National Mushroom Development & Extension Centre, Bangladesh Film Development Corporation (BFDC), Govt. Bangla College & Rangpur Zonal Settelment Official Web-portal. Not only Govt website, also the hacker hit  the official website of many Bangladeshi Colleges and defaced the index page. Those colleges are Comilla Victoria Govt. College, Shaikh Burhanuddin Post Graduate College, Ashuganj Sar Karkhana College, CHITTAGONG MODEL SCHOOL & COLLEGE, Birganj College & Panchbari Mahabiddyalay. The story is not over yet, in this phase of cyber attack also penetrated Uninor Bangladesh GPCIC. In a pastebin note the hacker has released the full database, including usernames, password hash & other several login credentials. Though the reason of this hack is not relevant but still in the deface page the hacker represented this hack as a payback of the last Indo-BD cyber war which took place in February this year.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Indian Air Force (IAF) Issued Strict Rules & Discipline to Avoid Hacking

Indian Air Force (IAF) Issued Strict Rules & Discipline to Avoid Hacking

Last month in a report we said Indian Govt is working on a robust cyber security structure, and parallely now the Indian Govt is emphasizing its security structure to fight against cyber threats. As a result of this ongoing cyber awareness, a very strict order have been issued by Indian air force to tackle and avoid cyber attacks. From now and onward every officer of the Indian Air Force (IAF) will now have to sign a declaration that they will not save or view any official document on personal computers. Failure to adhere to this directive will lead to a court marshal and prosecution. In a recent case, operational documents were found on the personal computer of a young pilot posted at an airbase in Tamil Nadu. A court of inquiry has been initiated. Over the years, cyberspace has emerged as a critical frontier for espionage as the use of computers and dependence on the internet has grown. Thus, document security has emerged as one of critical areas of concern for the government. It is perhaps alluding to these increasing instances of the cyberspace being used by foreign agencies to collect critical information. Prime Minister Manmohan Singh, while addressing top cops of the country at the annual security conference hosted by the Intelligence Bureau earlier this month, said, "Our country's vulnerability to cybercrime is escalating... Large-scale computer attacks on our critical infrastructure and economy can have potentially devastating results. The government is working on a robust cyber security structure."
As a general rule, computers in which sensitive information are stored or prepared are never connected to the internet. "The IAF internal communication network, for instance, is not only a stand-alone network with no connection to the net, but also has the system configured in such a way that it doesn't allow external storage devices like pen drives or CDs," a senior MoD official told the press. Nonetheless, some officers have been found "keeping copies or preparing documents using critical information in their personal computers, which have subsequently passed out by malwares in the system or hacked," the officer added.

Beside of developing a robust cyber security structure, there is another reason behind this decision, and that is Couple of months ago we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Later, inquiries revealed that a few naval officers had, against the rules, taken copies of the plans in pen drives from a naval computer, to study. The Chinese-made pen drives allegedly had malwares which transmitted the data back to IP addresses in China once they were used on computers connected to the internet. So the Indian Govt is now very strict about data privacy, so the implemented this new rule. Such bold decisions will surely make security tight and also reduce the probability of data theft & cyber espionage. 


-Source (NDTV)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UNESCO World Heritage Centre Hacked By Xception Code

UNESCO World Heritage Centre Hacked By Xception Code

United Nations Educational, Scientific and Cultural Organization widely known as UNESCO faced hacker attack. A young Indian hacker code named 'Xception Code' targeted UNESCO World Heritage Centre, which is one of the sub-domain of UNESCO. Like his earlier attack, this time also he did not deface or infected the website. But definitely the hacker have stolen sensitive information from the website. As per resources Xception Code managed to get access into the UNESCO web-server and exposed credentials like DNS server information, ns records, database information (tables, columns, user names, user id) and so on. In a post in pastebin the hacker made all the stolen information available. But he did not exposed any passwords, though he claimed to have access in several user-id, administrative passwords and even root password. In his message the hacker said - "Hello, Admin ( I Know You Have Multiple Admins,Because I Have Their Password :D Yes , I Have All Information That Contains Root Password / User Accounts / All Mail Ids Used By Unesco & ALl Info. But, I Am Not Releasing Them. This Is Just A Warning For Unesco, To Patch Their Website/Server...." 
With this news, we also like to remind you that in the middle of this year this hacker has hacked another high profile website, that is National Radio Astronomy Observatory (NRAO). That time also he exposed sensitive information. 

  


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Charged an Indian Programmer For Hacking & Damaging Toyota Website


FBI Charged an Indian Programmer For Hacking & Damaging Toyota Website 

A computer programmer from central Kentucky named Ibrahimshah Shahulhameed who once did contract work for Toyota has been charged with hacking into and damaging computers used by the automobile maker. The FBI filed a federal criminal complaint against Ibrahimshah Shahulhameed of Georgetown, Ky., alleging that the disgruntled former worker logged in to the www.toyotasupplier.com site, which the company uses to communicate with vendors around the globe, and issued commands to slow down the functions of the computer servers. "In some circumstances, there was no rational basis for issuing the commands, unless one was seeking to render the system inoperable," wrote FBI Special Agent Adam Keown, who conducted the probe. 
Both Keown and Toyota alleged that Shahulhameed worked on contract as a computer programmer for Toyota until being let go in late August. Andrew Sell, Shahulhameed’s boss at GlobalSource IT, a Milwaukee, Wis.-based company, told Keown that Shahulhameed had been dismissed because he was harassing other employees working on the Toyota account.
Sell notified Shahulhameed via email that night that his contract to work on the Toyota account had been terminated. “I want to be clear, to prevent any additional issues moving forward, that you should NOT have any future contact with … anyone at Toyota,” Sell wrote. In a response sent Aug. 24, Shahulhameed wrote, “I also want to make sure … I will not be responsible if anyone called me from Toyota.” At that point, Shahulhameed accessed Toyota’s internal computer system without authorization, the FBI and Toyota allege. Toyota also alleges that Shahulhameed possibly copied, downloaded and disseminated trade secrets and proprietary information, including pricing information, quality testing data and parts testing data. Keown had Toyota’s computer equipment examined as well as Shahulhameed’s computer, which the company gave him to use while working on contract. Keown determined that Shahulhameed spent about six hours inside the firewall of Toyota’s computer system, resulting in an estimated 3,000 to 5,000 labor hours in investigative time, restoration of systems and fixing the problems created by the hacking. “Several toyotasupplier.com and internal applications either were not working properly or went down for a number of hours,” Keown wrote.


-Source (mybroadband)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber Crime Cost $8 Billion Loss For India in Last 12 Months

Cyber Crime Cost $8 Billion Loss For India in Last 12 Months While Affecting 42 Million People 

In its annual cybercrime report, security firm Norton has estimated that India has lost more than $8 Billion; in Indian currency around 42,000 Crore in last twelve months. This big consumer cyber espionage has effected more than 42 million of people around the country. In terms of cost, this is a full 18 per cent increase. Against this, the global loss has been pegged at $110 billion. The study further notes that as many as 66 per cent of online adults in India have been a victim of cyber crime. During the past 12 months, as many as 56 per cent of online adults here have experienced cyber crime, over 1,15,000 victims per day, 80 victims per minute and over one every second.
According to the report, the average direct financial cost per victim is $192, which is up 18 per cent over 2011 when it was $163. One key finding this year is that both the cost per victim as well as social and mobile incidents are on the rise due to cybercrime. The study is based on the findings of self-reported experiences of over 13,000 adults across 24 countries, Norton by Symantec said in a statement. 
Globally, every second, 18 adults fall victim to cybercrime, resulting in over 1.5 million cybercrime victims each day. With losses totaling an average of $197 per victim across the world in direct financial costs, in the past 12 months, an estimated 556 million experienced cybercrime, representing 46 per cent of online adults, says the report. Last year, the figure was 45 per cent. "Cybercriminals are changing their tactics to target fast growing mobile platforms and social networks where consumers are less aware of security risks," says Norton by Symantec Asia director and internet safety advocate Effendy Ibrahim said. 
If we compare with other countries who are very much advance in IT then a very nasty truth will come appear, and that is being sound in IT still India is very much week and also careless of cyber security. This carelessness of Indian Govt has already cost maximum damage in terms of finance, defense, privacy and so on. India has already faced big damage in cyber space (both financially & reputation) from native countries like China, Pakistan, where sensitive data of Govt, defense, nuclear & space research has allegedly been stolen by cyber criminals. So far India was dam careless but couple of weeks ago things changed dramatically. And now the Indian Govt is working on a robust cyber security structure, Prime Minister of India Dr. Manmohan Singh himself confirmed that from now on wards India will pay as much attention as possible to make the cyber fence digitally safe and secured. 



-Source (Norton & msn)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Indian Govt is Working on a Robust Cyber Security Structure -Said Manmohan Singh

Indian Govt is Working on a Robust Cyber Security Structure -Said Prime Minister Manmohan Singh

After facing so many loses finally Indian government is taking the very cyber security issue seriously. India has already faced big damage in cyber space (both financially & reputation) from native countries like China, Pakistan, where sensitive data of Govt, defense, nuclear & space research has allegedly been stolen by cyber criminals. While expressing concern over India's escalating vulnerability to cyber crime, Prime Minister Dr. Manmohan Singh  said the government is working on a robust cyber security structureThe structure will help in mitigating threats, by building capacity to face them and enhancing research. Dr. Singh said the police leaders should also dedicate themselves to planned technological up-gradation of their forces. In his speech at the annual conference of DGPs/ IGPs;  Dr. Manmohan Singh said - ""There are many emerging areas where our police forces need to develop new expertise. I have already mentioned the use of new media by miscreants to spread rumours and falsehood. Another such area is our cyber-security. Our country's vulnerability to cyber crime is escalating as our economy and critical infrastructure become increasingly reliant on interdependent computer networks and the Internet"
"Large-scale computer attacks on our critical infrastructure and economy can have potentially devastating results. To this end, we need to build partnerships between Government, academia and the private sector," he added. Dr. Singh said the use of bulk SMSes and social media to aggravate the communal situation was a new challenge. "We need to fully understand how these new media are used by miscreants. We also need to devise strategies to counter the propaganda that is carried out by these new means. Any measure to control the use of such media must be carefully weighed against the need for the freedom to express and communicate," said Dr. Singh.
"I am sure that in the coming months our police forces would be able to work out effective strategies to deal with these tendencies," he added.

-Source (ANI)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Two Alleged Indian Hacker From 'Indishell' Arrested For Hacking into E-commerce Website

Two Alleged Indian Hacker From 'Indishell' Arrested For Hacking into E-commerce Website

Two alleged Indian hackers were arrested on Saturday by the Gautam Budh Nagar cyber crime cell. After an extensive investigation, it has been found that the hackers who were doing BTech in computer science, were charged with hacking into an e-commerce website that specializes in mobile recharge. After hacking into the server, the accused obtained administrative rights of the website. when users asked for recharge of their cellphones, DTH cards, net cards, etc, the hackers would just key in the cell number and the amount to be topped up. However, no bill would be generated as the hackers had bypassed the payment page. 
This way the recharge company would be debited every time without a bill, leading to losses worth several lakh. Police have estimated that the hackers have cheated a Delhi-based company of more than Rs 50 lakh. The accused, Sumit Gupta (24) and Ankit Singh (22), from Moradabad in UP were members of the hacker group, "Indishell" also known as "Indian Cyber Army". They were arrested from Noida and booked under Sections 420 of the IPC and 66C of the IT Act, 2008.
"We received a complaint from the head of recharge of Memory Electronics Pvt Ltd about the website being hacked," said Triveni Singh, DSP (cyber crime cell) GB Nagar. The other accused who are yet to be arrested are also BTech graduates from across India. "Shrinivas, facebook name 'neo', is from Kohlapur in Maharashtra; Ajay Dhaka, alias dark look, is from Jaipur; Raman Kumar Rana, facebook name 'google warrior', is a resident of Pathankot; and Manmohan, alias 'mack', is from Muradabad," Triveni said.



-Source (TOI)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Twitter May Face Nationwide Block in India, If They Doesn't Remove 28 Harmful Pages

Twitter May Face Nationwide Block in India If They Doesn't Remove 28  Harmful Pages

The Government of India has threatened to block Twitter across the whole country, if the social networking giant doesn't block and remove 28 accounts containing objectionable content within 12 hours. The department of telecommunications (DoT) ordered blocking of the accounts on August 20. The blocked accounts include those maintained by a columnist and a journalist working for a TV channel. Those Twitter accounts are part of a list containing over 300 specific URLs that internet service providers (ISPs) in India have been told to block. The list is dominated by URLs belonging to Facebook and Youtube. Indian government allegedly found 102 URLs on Facebook and 85 URLs on YouTube where communally sensitive content was posted. According to a blogpost at Centre for Internet and Society (CIS) told almost "all of the blocked items have content that are related to communal issues and rioting". The information ministry has issued Twitter with a deadline notice to remove "inflammatory and harmful" material that has allegedly triggered ethnic tensions against northeastern migrants living in southern cities. Thousands of migrant students and workers have fled cities such as Mumbai and Bangalore in fear of retaliation for violence against Muslims in the northeastern state of Assam. Internet posts, phone text messages and fake video clips allegedly spread rumours that Muslims were poised to attack them. "If Twitter fails to respond to our request, we will take appropriate action," senior home ministry official R K Singh was quoted as saying in the press. 
"We have asked the information technology ministry to serve them a notice." Information technology minister Kapil Sibal said he was frustrated at the lack of response from US social networking sites.
Twitter has conveyed that it was facing technical difficulties in blocking certain webpages where morphed and inflammatory images were uploaded but the government made it clear that the social networking site has to withdraw them or face punitive action. "We are not ruling out," an official said when asked whether Twitter was buying time. The government says Google and Facebook have largely cooperated while Twitter has been much slower to respond.
The blocking of Twitter accounts was partial due to technical challenges. The accounts have already been blocked with the help of ISPs and not Twitter. Accessing them from India shows web users a message, saying "This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications". Also, the block works only if the accounts are accessed using HTTP and not HTTPS protocol.


-Source (TOI, PTI& IBT)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Official Website Of Orissa Cricket Association Hacked By Mahesh Haxor

Official Website Of Orissa Cricket Association Hacked By Mahesh Haxor 

After remaining silent for a certain of time an Indian hacker code named "Mahesh Haxor" from a newly formed hacker group named "k9 Network cyber army" strikes again. This time he targets the official website of Orissa Cricket Association (OCA). As per sources the hacker managed to get access on the OCA server and uploaded is deface page. But did not deface the main index page. Though the main reason of this hack is still known. As expected the hacker has also created a deface mirror on hack-db. The attack took place on yestreday late night; the time when we are writing the news, the hacker still managed to keep is access on the server and still the deface page is there. This indeed rises question about the securicty conecrn of Orissa Cricket Association. We also want to give you reminder that near about two months ago this hacker Mahesh Haxor has hacked and defaced the official website of West Bengal State University & IIMM Pune





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacked Trinamool Congress Website & Posted A Fake Message

Anonymous Hacked Trinamool Congress Website & Posted A Fake Message

Just few hours before the 66th Independence day of India, the official website of AITMC- All India Trinamul Congress, current ruling party of West-Bengal get hacked and the Archive page which records important announcements made by chief minister of West Bengal & Party Chairman Mamata Banerjee get defaced. Infamous hacker collective group Anonymous took responsibility of this hack. 
One of the hacker announced the hack publicly on twitter while saying- "At last a world leader listens to anonymous and decides to make great changes Mamata Banerjee Confesses : aitmc.org/chairperson_ar… WE LOVE DIDI". As per sources the hacker broke into the TMC's server, gained access on the website and posted a fake announcement :-
“I AM A MAOIST at heart and  always have been, It always pained me to speak and act against the ideology that I myself loved so much. I also appologize to the people whom I have hurt, The artist who tried to speak the truth, the writers who saw the right thing and every and any person who  tried to tell me I was going in the wrong direction, I am at your feet asking you to forgive me for the misguided acts I have done In life,”

Team VOGH took the above screen shot was taken from TMC's website, at the time when it was hacked. 
The hacker group also made the effort of giving a link to a morphed image of Mamata Banerjeeand a link to another document. For privacy reason we can't mention the link here. Trinamool's cyber team removed the offensive post within few minutes. According to the party's spokes man -"TMC website was hacked at 7.30 pm and detected within six minutes by the party's cyber team that works round-the-clock , updating the site every 15 minutes." Also the Party have lodged a complaint, immediately after the mishap. 
This hack is not the very first attack on TMC, earlier in this year (At the time of Indo-BD Cyber-War)  Bangladeshi hackers have hacked and defaced the index page of TMC's official website. We would also like to give you reminder that, Mamata Banerjee is not the first victim, In 2011Pak Hacker named KhantastiC haXor penetrated the official site of Indian Congress and defaced the Profile page of Party President Sonia Gandhi Also few other Pakistan hackers in early 2011 have hacked the official website of All India CongressBharatiya Janata Party (BJP) and so on. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

nullcon security conference Delhi 2012 Highlights/Agenda

nullcon Security Conference Delhi 2012 Highlights/Agenda

Earlier we have discussed several times about nullconAfter the success of Goa, now we all are waiting for nullcon Delhi to showcase cutting edge security technologies and discuss new attack vectors and security threats among the Corporate world and the Government sector. So lets talk about the highlights & agendas of nullcon Delhi 2012. nullcon feel proud to be at the forefront of the IT Security arena in the Asian IT Industry. With the fourth event in the row, nullcon continue to deliver the latest and responsible vulnerability disclosures and their mitigation solutions which help organizations take proactive and timely protective measures to safeguard their critical data and assets.
nullcon Delhi is being held on 26 - 29 Sept 2012 at The Leela Kempinski, Gurgoan.

Highlights:-
1. Day one keynote by CEO Natgrid,Mr. Raghu Raman. Talk Title:  Battle of the Minds
2. Day two keynote by Global Security Evangelist and renowned speaker. Mr. Richard Thieme. Talk Title: Staring into the Abyss.
3. Security Conclave on Critical Infrastructure Protection:  Focused Panel discussion of 90 minutes with participation from Govt. and corporate. Expert panelists from PSUs (Public Sector Undertaking) and large private organizations to create the road map for the protection standard and processes. This year's theme is Critical Infrastructure Protection and will be focused on organizations managing and developing critical infrastructure and organizations offering solutions and risk consulting on the same.
4. Executive Briefing: Exclusive two hours sub-event for senior management and the CIO’s to present summarized content of conference talks/events.
5. Prototype sub-event:  An excellent opportunity/platform for organization to speak/showcase/present (30 Min Talk) new innovative security technologies to the conference attendees to attract industry recognition and to promote their brand.
6. 20+ Exhibitors from security industry.
7. 20+ presentations by security experts on ground breaking defensive and offensive security technologies.
8. Seven security Training by industry experts on deep technical and critical security sbjects.
9. Null Job fair for hiring the best in the security industry.
10. Attendees from varied Industry verticals.
11. Supported by Microsoft (MSRC USA), Praxeva, SANS and Hacker5. 
12. Some of the exhibitors include WatchGuard, Symantec, Microsoft, Praxeva, SANS, JNR, Search Lab, Innobuzz, ACPL, LFY, Payatu


nullcon Delhi is a must attend for all those who share an interest in IT security. It is nullcon's endeavor to be continually delivering the best in IT Security. For more details please visit http://nullcon.net. 
Pre-con registration is closing on 31st August. FREE Registration for Exhibition and Job Fair. Group discount available. For offline registration, kindly drop an email to register@nullcon.net
Being the official media partner, Team Voiceofgreyhat wishes all the very best for Nullcon Delhi 2012.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

22 Year Old IIT Student Arrested For Posting Obscene Photographs of a Girl

22 Year Old IIT Student Arrested For Posting Obscene Photographs of a Girl

Cyber crime wing of the CID Hyderabad has arrested a 22-year-old B Tech student from the Indian Institute of Technology (IIT)-Delhi for allegedly posting obscene photographs of a girl from IIT-Kanpur on a public blog. The name of the suspect is "Surender" who is from Mahabubabad. 
The cyber police seized a mobile phone and a computer from the accused. As per sources the superintendent of police, cyber crime, U Rammohan Rao said they arrested Surender by tracking the Internet Protocol (IP) address of his computer and calls from his mobile phone. Surender and the girl both hail from Mahabubabad in Warangal district. According to police, Surender got attracted towards the girl and tried to take undue advantage of their closeness. When she resisted his advances, he started harassing her through phone calls, SMSs and emails.
A police source said Surender confessed that he bore a grudge against the girl for refusing to marry him. In order to harass her and her family members, he created a fake profile in the name the girl's sister on a public blog and chatted with people asking them to call her by giving the number of the girl's mother. The police initiated action following a complaint by the girl's father that Surender was harassing and blackmailing his daughter and other family members. Earlier, three cases were registered in Kanpur and Mahabubabad against the accused for harassing the girl and trying to forcibly marry her in the Arya Samaj office in Kanpur," Rammohan said.


-Source (IBN) 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chinese Hackers Broke Into Indian Navy's Computer System & Stolen Sensitive Data (VOGH Exclusive)

VOGH Exclusive:- Chinese Hackers Broke Into Indian Navy's Computer System & Stolen Sensitive Data

Again cyber criminals from China targeted Indian cyber fence. This time Indian Navy have fallen victim of this cyber espionage. According to sources hackers have broken into sensitive naval computer systems in and around Visakhapatnam, the headquarters of the Eastern Naval Command, and planted malware that relayed confidential data to IP addresses in China.  There is, to date, nothing known about the data thieves. 
Primary investigation revealed that the classified data has been leaked and that the breach may have occurred as a result of the use of USB flash storage on important systems. The Navy and other armed forces store sensitive data on standalone systems, unconnected to the internet and supposedly with no free USB ports where a flash drive could be plugged in.
The malware is reported to have created a hidden folder on the USB flash drives. When the drive was plugged into a Navy system, the malware searched for files based on particular key words it had been configured to look for. These files were then copied to the flash drive where they would remain hidden. When the drive was plugged into a system which was connected to the internet, the malware would then begin to transfer the files to a specific IP address. The extent of the loss is still being ascertained, and officials said it was “premature at this stage” to comment on the sensitivity of the compromised data. But the Navy has completed a Board of Inquiry (BoI) which is believed to have indicted at least six mid-level officers for procedural lapses that led to the security breach. Navy official also said: “An inquiry has been convened and findings of the report are awaited. It needs to be mentioned that there is a constant threat in the cyber domain from inimical hack ers worldwide.”
Couple of months ago Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 
The above phenomena are clearly indicating that hackers from China was directly linked and responsible for all those biggest cyber espionage. Still it is not clear that whether these cyber criminals are supported by the Govt. or not!!



 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...