Showing posts sorted by relevance for query IRC. Sort by date Show all posts
Showing posts sorted by relevance for query IRC. Sort by date Show all posts

Full Story of Hacking Anonymous IRC Server





War rages between competing factions within the hacker collective Anonymous after this weekend's drama-filled takeover of the main Anonymous IRC server network. That network, used by Anons to plan and conduct attacks, was taken over by one of its own, an IRC moderator known as "Ryan."
His attack has sparked a debate over the "leadership" of Anonymous.

Hacking the hackers:-

The main Internet chat servers used by Anonymous have been run by a group called "AnonOps," which provides communications platforms for the group. Pointing IRC clients at anonops.ru or anonops.net would connect anyone to the servers, where they could then join channels like "#OpSony" and participate in various Anon activities.
Though Anonymous is often described as leaderless, factions like AnonOps by necessity have a loose structure; servers must be paid for, domain names must be registered, chat channels must have at least some moderation. Ryan was one of those IRC mods, and this weekend he proceeded with an attack that seized control of the AnonOps servers away from the small cabal of leaders who ran it.
Those leaders include people with handles like "shitstorm," "Nerdo," "blergh," "Power2All," and "Owen"—and if you're paying attention, you'll remember that HBGary Federal's Aaron Barr had fingered Owen as one of three "leaders" of all Anons.
The most popular channel on the old IRC servers now says simply, "anonops dead go home." Ryan also put up a set of chat logs showing Owen and others reacting to the weekend's massive denial of service attacks against AnonOps that culminated in the server takeover. (In the transcript below, "doom" is one of the AnonOps servers.)

Owen -> SmilingDevil: we lost a numbe rof servers last night
SmilingDevil -> owen: :P we need some more security.
t forcved level3 to stop anno
Owen -> SmilingDevil: dude Owen -> SmilingDevil: iuning a /24 Owen -> SmilingDevil: it was in the gbps range
vil -> owen: gigabit or gigabyte? Owen -> Smili
Owen -> SmilingDevil: doom alone got hit with 1 gb SmilingD engDevil: all leafs went down Owen -> SmilingDevil: add it all up Owen -> SmilingDevil: yeah huge
ly they know about Owen -> SmilingDevil: um thats called the hub Owe
SmilingDevil -> owen: :P we need a hidden irc server for the admins. SmilingDevil -> owen: that o nn -> SmilingDevil: :) SmilingDevil -> owen: did they take that too? Owen -> SmilingDevil: but anyhow
Owen -> SmilingDevil: we suffered alot of damage
The "old" leaders released a statement this morning explaining what happened over the weekend and why IRC remained down:
We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named "Ryan". He decided that he didn't like the leaderless command structure that AnonOps Network Admins use. So he organized a coup d'etat, with his "friends" at skidsr.us . Using the networks service bot "Zalgo" he scavenged the IP's and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them (which is why the network has been unstable for the past week). Unfortunately he has control of the domain names AnonOps.ru (and possibly AnonOps.net, we don't know at this stage) so we are unable to continue using them.
Not everyone buys the explanation. One Anon pointed out that the Zalgo bot in question is controlled by a user named "E," not by Ryan.
Second, Zalgo can only see chan msgs and msgs to zalgo. The net staff is saying (pretty much) Ryan used Zalgo to steal server passwords (false, I know server protocol) which were tranfered in channels in plain text for the to see (true).
Third: Take everything AnonOps says with a grain of salt. They're putting out lies and not telling the whole story.
Others pointed out that E and Ryan are friends and that E was actually recommended as an op by Ryan.
However it happened, the end result was that Ryan redirected some of the AnonOps domain names he had control over, he led an attack on the IRC servers with denial of service data floods, and he grabbed (and then published) the non-obfuscated IP addresses of everyone connected to the IRC servers. Ryan apparently also gained root access to the Zalgo network services bot, which is presumably how he harvested the non-obfuscated IP addresses, though it's not clear exactly what Zalgo did or how much access it provided Ryan.

Clashing factions

Ryan is associated with 808chan, a 4chan splinter site and apparent home of the recent denial of service attacks on AnonOps. Ryan is "DDoSing everything that he doesn't own with his band of raiders from 808chan," says one Anon.
The 808 brigade apparently valued big botnets, and made users prove their abilities before letting them participate. AnonOps had a more democratic ethos; anyone could show up, configure the Low Orbit Ion Cannon attack tool, and start firing at Sony or others.
"It's an open network where everyone, mostly newfags can join and not have to prove they're able to wield a botnet and can just join a channel of their choosing, fire up LOIC and hit some organization for reasons they believe are right," said one Anon.
Ryan's control of AnonOps extends to some of the actual domain names, including AnonOps.ru. This wasn't a hack; he was actually given administrative control over the domains some time ago by AnonOps leaders.
One Anon explained the reason for this, saying: "As for the domains, they were transferred to Ryan after some of us got vanned so he can keep the network up. What he did certainly wasn't the plan." (Getting "vanned" refers to getting picked up by the police.)
According to another Anon, the current fight was precipitated when Ryan's IRC credential were revoked. "You morons don't realize Ryan IS LEGALLY THE OWNER OF DOMAINS," he wrote. "Nerdo and Owen removed Ryan's oper, Ryan took domains."

Smoky back rooms?

Among Anons arguing over what happened this weekend, the key debate involves the issue of leaders. Anonymous also said it was leaderless and memberless, but is it? The AnonOps statement above claims that Ryan was angry at the "leaderless" structure of the group and wanted to set himself up as king; again, though, not everyone is so sure.
Owen, for instance, helps to shape the conversation and planning in IRC. One Anon complained privately to me that Owen has booted him from the IRC servers—and thus from the place where all the real work against Sony was taking place several weeks ago. "Owen has not only told me that he doesn't really give a shit about freedom of speech, he's also moderately against the action that's being taken on Sony," this Anon said.
Owen and others conduct some of their work in private, invite-only channels, which leads some Anons to suspect that the really important operations and hack attempts are only discussed in a virtual back room. As one Anon put it yesterday:
"Have you ever been in one of their invite-only chats? This is no bullshit. EVERYTHING is decided on them, the eventual course of the operation, the hivemind's target, the channel's topic, everything. Why all this secrecy? These invite-only chats have NO reason to exist. You want to keep out trolls? Turn on mute, and give voice to a few. At least we can see what is being written."
Others were even angrier. A former AnonOps member wrote:
From the fucking beginning (during the hack at Aiplex which started Operation Payback) there has been an secret club, an aristocracy in AnonOps, deciding how operations will play out in invite-only channels.
It's obvious, for they control the topic, the hivemind, the guides, every single thing behind the scenes.
I don't know if the Owen's current bureaucracy is to be trusted, or Ryan's new delegation (from 808chan!) is.
What I do know is that AnonOps no longer has a good reason to exist. The insane amount of power the channel operators wield, and the reputations gained by their NAMES, causes them to become dictator-like, as "power corrupts".
Why did we leave the comforts of the womb of anonymous imageboards, and end up in name-fagging circlejerks controlled only by a few? Why?
Anonymous, this is bullshit. Neither side, neither Ryan's coalition of hackers nor Owen's bureaucracy can be trusted.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS—it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
On Twitter, some Anons began spreading the word that Ryan had "betrayed" Anonymous, and that he had done so "to mess up all after having stolen PSN credit cards." No evidence for this last assertion was provided.
As the old AnonOps team attempted to get a handle on what had happened—and after they switched to an Indian domain name—they expressed irritation with early media mentions ("fail reporting") of the attack.
"Some 'mainstream' media is calling this the 'insider threat,'" they wrote, "which isn't really a fair representation, AnonOps doesn't have any corporate secrets, its run by the people for the people on a basis of mutual trust. Drama happens almost 24/7, occasionally drama overspills the network.
"Also we must remind the press AnonOps DOES NOT EQUAL Anonymous, saying they are one and/or the same thing in a blog/article just makes you look stupid. AnonOps is just a IRC network and a few other services that ANYONE can use, its not the only place Anonymous gather, and unlikely to be the *last* (see Streisand effect)."
But will the AnonOps leaders ever gather on a forum they don't control? Ryan took great delight in posting the following alleged comment from Owen to another AnonOps leader: "yo odnt honestly think we're goign to some other irc where we have no control do you?"
Of course, Anonymous has always been about drama and "the lulz," so the current confusion may not even bother them that much; this is just par for the course. But it's certainly amusing to others.
"Lmao. You fucking twits can't even keep your shit safe," wrote someone watching the debacle. "This literally made me laugh out loud. Not lol, but laugh. You all are so stupid."
Click here To see the Dump of Anon Ops Chat 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous IRC servers hacked by a splinter group


While Sony is busy pointing the finger at the hacker group Anonymous for the on-going PSN and SOE hacks, Anonymous has problems of its own. This weekend AnonOps, an IRC network where some of the members congregate and plan operations, found itself under a denial-of-service attack. That attack finally ended with a number of its IRC servers being taken over.
The culprit: one of their own, a former IRC Operator (IRCop) named “Ryan.” Depending on who you believe, Ryan was power-hungry and wanted control over AnonOps for himself, or he was tired of the autocracy of the few Anonymous members who made up the group’s loose leadership structure.
The story is far from clear, and may never be, but the fact of the matter is that a good number of the IRC servers used by AnonOps were seized in the attack, and one of the most popular channels was all but shut down. Ryan also owns a number of AnonOps and Anonymous-related domain names, as well.
This schism in leadership at AnonOps is due to two big issues: one of power, and the other of authority. Some believe that Ryan favored a more “prove your mettle” approach to internet activism, where people had to prove they were worthwhile and actually had a cause worth attacking for before they could leverage tools like the infamous Low Orbit Ion Cannon (LOIC) denial-of-service tool. LOIC is the utility used to control botnets and give them targets to attack. At AnonOps, virtually anyone could come in, tell the LOIC who to target next, and just sit back and wait for the attack.
The second issue was leadership: a number of Anonymous members argued that the owners of the AnonOps IRC servers and their tools were starting to get a little power-mad as their names were circulated around the Internet. Some members accused the small group of making all of the decisions about who Anonymous would attack, when, and what operations they would engage in without involving the rest of the group in them.
Whether or not they had the right to act as leadership is up for debate. Most of the people in the tiny group of IRC moderators at AnonOps were the people responsible for paying to keep the domains registered and the servers up.
What this means for the group is unclear, and it’s very likely that the amorphous and fluid nature of a group like Anonymous means that any lack of specific leadership will ultimately go unnoticed by the larger collective. At the same time, unless something changes, AnonOps will likely shutter and the group of IRC operators that used it will be forced to gather somewhere else to plan their activities.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Exploiting Old Ruby on Rails Vulnerability To Compromise Web Servers & Create Botnet

Hackers Exploiting Old Ruby on Rails Vulnerability (CVE-2013-0156) To Compromise Web Servers & Create IRC Botnet
A critical vulnerability on Ruby on Rails spotted in January this year which was deemed “critical” at the same time yet again found in the wild. The vulnerability known as CVE-2013-0156 that affected versions 3.0.20 and 2.3.16 again rises it's hand. Though a security patch was released by the Rails developers. But as we all know that many server administrator used to be unaware of these events have not patched their systems. As a result hackers and cyber criminals are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a dangerous botnet. This major security issue was first discovered by a security consultant Mr. Jeff Jarmoc of research firm Matasano Security. In his blog Jarmoc said "It’s pretty surprising that it’s taken this long to surface in the wild, but less surprising that people are still running vulnerable installations of Rails. It also appears to be affecting some web hosts." According to his blog post -the exploit that's currently being used by attackers adds a custom cron job -- a scheduled task on Linux machines that executes a sequence of commands. Those commands download a malicious C source file from a remote server, compile it locally and execute it. The resulting malware is a bot that connects to an IRC (Internet Relay Chat) server and joins a predefined channel where it waits for commands from the attackers. A pre-compiled version of the malware is also downloaded in case the compilation procedure fails on the compromised systems.
"Functionality is limited, but includes the ability to download and execute files as commanded, as well as changing servers," Jarmoc said. "There's no authentication performed, so an enterprising individual could hijack these bots fairly easily by joining the IRC server and issuing the appropriate commands." But the matter of relief is that Jarmoc concluded while saying "this is a pretty straightforward skiddy exploit of a vulnerability that has been publicly known, and warned about, for months."

But still administrators who have not yet patched their Rails version should immediately should update the Ruby on Rails installations on their servers to at least versions 3.2.11, 3.1.10, 3.0.19 or 2.3.15 which contain the patch for this vulnerability. However, the best course of action is probably to update to the latest available Rails versions, depending on the branch used, since other critical vulnerabilities have been addressed since then. 

Brief About RoR:- Ruby on Rails is a popular framework for developing Web applications based on the Ruby programming language and is used by major websites including Hulu, GroupOn, GitHub and Scribd.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Operation Green Rights (Project Tarmaggedon) By Anon


Hackers Group Anonymous Called a news Operation Named Green Rights: Project Tarmaggedon. 


According to The Official Press Release of Anonymous:-
 
"Free-thinking citizens of the world:
Anonymous' Operation Green Rights calls your attention to an urgent situation in North America perpetuated by the boundless greed of the usual suspects: Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland, and many others.
This week, activists are gathering along U.S. Highway 12 in Montana to protest the transformation of a serene wilderness into an industrial shipping route, bringing "megaloads" of refinery equipment to the Alberta Tar Sands in Canada (see Tar Sands FAQ Sheet below).
Anonymous now joins the struggle against "Big Oil" in the heartland of the US. We stand in solidarity with any citizen willing to protest corporate abuse. Anonymous will not stand by idly and let these environmental atrocities continue. This is not the clean energy of the future that we are being promised.
 
We will, over the course of the next few days, use the powers we posses to spread news about this scenario and the corporations involved. We are actively seeking leaks to expose the corruption that we all KNOW is beneath this. Anonymous will support the activists on July 13-14 when they initiate civil disobedience and direct action to confront this dire issue. We urge you to get involved. Montana and Idaho citizens, we ask you to join local protests and attend the Highway 12 rally if you are close enough! If you're not, join us in the IRC listed below for our own good times.
The continued development of the tar sands is a major step backward in the effort to curb global warming. Anonymous will not suffer this without a fight, and Operation Green Rights will always support the rights of the people to live in an unpolluted world, and aim to help safeguard it for the future. One way or another.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
Location of Protest: http://tinyurl.com/5sy57bg
..."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Declared #Operation Britain


Anonymous Group has declared #Operation Britain to expose Media, Govt. Police and their corruption and negligence while ruling country and so on. 

According to the Official Press Release of Anonymous (#OpBritain):-

".. . Citizens of Britain,


The riots that we have witnessed over the last week, whilst violent and misguided, are a product of decades of neglect inflicted on your country by various governments. We do not condone mindless thuggery, but that does not stop us from seeing the reality behind it.

Your politicians and the media do their best to avoid seeing that reality. They would rather manipulate public anger in order to cloud judgment and create division. They will use these riots as an excuse to withdraw civic freedoms, increase draconian police powers, and discourage legitimate protest. By placing their emphasis on mindless criminality, your politicians mask the extent to which a significant section of society is stuck in an impoverished way of life with little hope for the future.

Anonymous senses your displeasure and witnesses the iron fist of the state being used more and more often to put down dissent before it begins. We note also the ever increasing tide of propaganda issued to justify these repressive acts. The law is no longer the protector of the citizens but the protector of a wealthy few from the many, who have very little. Justice has become yet another commodity that only the wealthy can afford.

We sympathise with the anger that seethes under the facade of your country's diplomatic image. It is time to take a stand and realise that solutions will not be found in today's corrupt political landscape. You should seize this opportunity to rally for freedom. Anonymous stands with you in this struggle and will fight alongside you in the battle for permanent change. Let your enemies stand forewarned.

Saturday October 15th 2011 will be your opportunity for rebellion. We call on Britain to unite and organise peacefully. Unions, anti-cuts groups, community organisations, students, activists, citizens: you know your political system is not fit for purpose. Rally your supporters and stand together in holding mass protests in your major cities. Together you can send a powerful message to your government: you are the people of Britain and your voice WILL be heard.

Yours sincerely,
Operation Britain

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

OpBritain IRC channel:- http://irc.lc/anonops/opbritain
OpBritain Twitter accounts:- http://twitter.com/#!/AnonActionUK
http://twitter.com/#!/Op_Britain
http://twitter.com/#!/GroupAnon..."

For more information and to see the post on anon news click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Exposed full Details of IRCFederal.com


Hacker group Anonymous Exposed full details and sensitive data of IRCFederal 

According to Anon:-

"Today we release the ownage of another government-contracted IT company, IRC Federal. They brag about their multi-million dollar partnership with the FBI,
Army, Navy, NASA, and the Department of Justice, selling out their "skills" to the US empire. So we laid nuclear waste to their systems, owning their pathetic windows box, dropping their databases and private emails, and defaced their professional looking website.
In their emails we found various contracts, development schematics, and internal documents for various government institutions including a proposal for the FBI to develop a "Special Identities Modernization (SIM) Project" to "reduce terrorist and criminal activity by protecting all records associated with
trusted individuals and revealing the identities of those individuals who may pose serious risk to the United States and its allies". We also found
fingerprinting contracts for the DOJ, biometrics development for the military, and strategy contracts for the "National Nuclear Security Administration
Nuclear Weapons Complex".
Additionally we found login info to various VPNs and several Department of Energy login access panels that we are dumping *live* complete with some URLs
to live ASP file browser and upload backdoors - let's see how long it takes for them to remove it (don't worry we'll keep putting it back up until they pull
the box ;D)
 
Before we begin the drop, a personal message to the employees of IRC Federal:
 
If you place any value on freedom, then stop working for the oligarchy and start working against it. Stop aiding the corporations and a government
which uses unethical means to corner vast amounts of wealth and proceed to flagrantly abuse their power. Together, we have the power to change
this world for the better.
 
“He who passively accepts evil is as much involved in it as he who helps to perpetuate it.” –Martin Luther King, Jr.
 
Props to our black hat and antisec comrades: bantown, dikline,
h0no, phrack high council, ~el8 and all you kick-ass motherfuckers
we've never even heard of. Thank you...."

For More Details Click HERE

You May also Download this torrent file 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Fedora 16 will work with Btrfs as standard file system

At its IRC meeting on Wednesday, the Fedora Engineering Steering Committee (FESCo)resolved to use Btrfs as the standard file system in Fedora 16 "Verne". Btrfs was called the "Next Generation File System for Linux" by numerous major kernel developers two years ago and is still labelled as experimental. For Fedora 16 there will be a "simple switch" from Ext4 to the new file system; therefore Fedora's installation program will not force Btrfs' RAID- and LVM-like capabilities onto users. It will probably not be known until August or September whether Fedora 16, which is planned for the end of October, will actually use Btrfs as the standard, because testers and developers need time to gain additional experience with the upcoming alpha and beta versions. If major problems crop up or the criteria for the switch, which have yet to be fully specified, are not fulfilled, the Fedora Project will probably postpone the switch until Fedora 17, just as it did with the switch to the Sysvinit and Upstart alternative from Fedora 14 to 15. One of the criteria for the switch to Btrfs is a proper program to check and repair Btrfs file systems. The current tool only offers basic functions; a much better onewas vaguely announced for the end of May but has yet to show up. According toBtrfs and Red Hat developer Josef Bacik, it will soon be released but has not appeared yet because it is being thoroughly tested. Fedora developers state in the IRC log that they do not expect quota support to be finished in Btrfs by the time Fedora 16 is released and that they can live with that.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OccupyOakland Anonymous Performed DDoS Attack On Oakland Police & Exposed Confidential Data


Another Occupy Wall Street protest by Anonymous. Previously Anonymous Hacked IACP & Exposed 600 MB of Personal Data and this time the target was Oakland police. Members of the 'hacktivist' launched a DDOS attack that brought down the main web site of the Oakland Police Department for much of last night, cracked at least part of the security on an Oakland city government server and posted information on the names and data structure of Oakland city servers and the names, addresses and other personal data on Oakland police.
Members of the group have also put out the call for more hacked data and offered a $1,000 reward for specific data on the officer who fired the riot-control weapon that critically injured Iraq War veteran Scott Olsen. Olsen, a former Marine who participated in the protest Tuesday night, was apparently struck in the head by either a tear-gas canister or flash-bang grenade fired by Oakland riot police during a violent effort to drive OccupyOakland protesters off the streets.

In a Press Release Anon Said:-
"#OccupyOakland has come under attack from city police, who now appear to be calling in reinforcements from Palo Alto. A protester who did two tours in Iraq is in critical condition with fractured skull and brain injury after a cop shot him in the head with a "non-lethal" weapon. A crowd of protesters were deliberately hit with a flashbang while rendering first aid to an injured protester. Police claimed in a recent press release that "no injuries" have been reported so far.
These are among the most disturbing and criminal acts to be have been proven on the part of U.S. police since NYPD officers were outed as having routinely planted drugs on suspects earlier this month. The time has come to retaliate against Oakland police via all non-violent means, beginning with doxing of individual officers and particularly higher-ups involved in the department's conduct of late.
Those willing to assist in doxing should send any found materials to transistor@hushmail.com. To work with Anonymous, use an IRC client to join irc.anonops.li #anonops.
I'm offering a $1,000 reward, no questions asked, for the name of the officer who threw a flashbang at the injured Iraqi vet. "

To see the entire press release of Anonymous Click Here

  • For more information and to see the server details and other confidential information leaked by Anon Click Here
  • Exposed Names, Addresses and other Personal data of Oakland Police are Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The End Of Anonymous: Anonymous Attacks Eachother


It now seems that there is an internal war happening in the ranks of leaderless hacker group ‘Annoymous’ in which a rogue admin had taken control of two key sites that the group uses to coordinate their actions online.
In a message to users posted on AnonOps.in, part of Anonymous’s AnonOps network, admins accused a former comrade of organising a “coup d’etat“.
The name that seems to be comng up is ‘Ryan’, who is now being accused of stealing IP addresses and passwords of users of two ‘Anonymous’ sites. AnonOps.net and AnonOps.ru were attacked by first getting the precious information, and then getting Denial of service (DoS) attacks directed against them.
The sites provide communication within the members of the group through IRC channels and have been used to launch several attacks, they were also key in organising Anonymous activity in support of the uprising in Tunisia and Egypt and Siria.
Some messages have been appearing in hacking websites from anonymous:

‘We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named “Ryan”. He decided that he didn’t like the leaderless command structure that AnonOps Network Admins use. So he organised a coup d’etat, with his “friends” at skidsr.us . Using the networks service bot “Zalgo” he scavenged the IP’s and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them.’
‘We would STRONGLY ADVISE all users to STAY AWAY from AnonOps.net and AnonOps.ru, and they should be considered COMPROMISED. Using or connecting to any service on those addresses may put your computer, and by extension your person, at risk’.
These latest developments come after Sony had accused the hacker group to be more than likely (however without providing definite evidence) involved in the data leak that caused the loss of personal and financial information of over 70 million users of the Playstation Network. Please let us know what are your thoughts by leaving a comment below.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Syrian Ministry of Defence Hacked & Defaced By Anonymous (#Op-Syria)


Famous Hacker group Anonymous declared #Op-Syria. They hacked and defaced the official website of  Syrian Ministry of Defence

To see the post on pastebin click here

To join the IRC chat room of #Op-Syria cheek the following link:-
http://irc.lc/AnonOps/opsyria

Anon released a video to give message about #Op-Syria:-



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#Antisec, Turkish Takedown Thursday By Anonymous





Hacker Group Anonymous declared #operation Turkey for the shake of #Antisec. This time they damaged more than 70 Turkish websites. 

Anonymous messages about #operation Turkey: -


"Over the last few years, we have seen how the Turkish government has tightened its grip on the internet. It has blocked thousands of websites and blogs while abusive legal proceedings against online journalists persist. The government now wants to impose a new filtering system on the 22nd of August that will make it possible to keep records of all the people’s internet activity. Though it remains opaque why and how the system will be put in place, it is clear that the government is taking censorship to the next level.
These acts are inexcusable. Accessing and participating in the free flow of information is a basic human right. Anonymous will not stand by while the Turkish government violates this right. We will bring our support to circumvent censorship and retaliate against organizations imposing censorship. 
Hundreds of thousands of people protested against internet censorship decisions but AKP government ignored the voice of the people and violently oppressed the protesters. 
We call on all internet citizens to support freedom of speech by pushing the Turkish government to stop these foolish policies. The free flow of information won’t be stopped. Sharing of knowledge won’t be stopped. It is time to fight for our rights and stand up for what we believe in.

Join us in the IRC channel to discuss what we can do to liberate the internet: http://chat.mibbit.com/?server=194.8.74.43&channel=%23opTurkey

(server: irc.anonops.li, channel #opturkey)

We are Anonymous.
We are Legion.
We do not Forgive.
We do not Forget.
Expect us.
.."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec hacked porm sites, then next target is Onile Gamming (Brink & Bethesda)



Hacking collective Lulz Securtiy (LulzSec) has made headlines most recently with high profile intrusions  and data compromising on websites owned by PBS, Sony, FOX and Unveilance a whitehat security company that specializes in data breaches and botnets. With each successful breach LulzSec posts a press release on it’s website listing it’s spoils of war, usernames, passwords, email address, etc. LulzSec, like hacktivist group Anonymous is made of an unknown amount of individuals located from around the world. They operate in a similar manner in which communication is made in an IRC chat room(s) and the assumption is that there is no clear leadership or structure, though that remains to be seen. There has been recent IRC Chat logs and other data mining that suggests the two groups have ties to one another, an assumption LulzSec denies.
This past Friday afternoon the group announced that it had stolen and posted administrative emails and passwords for 50+ porn sites, along with 26,000 emails and passwords for users of the adult content website Pron.com.
Hi! We like porn (sometimes), so these are email/password
combinations from pron.com which we plundered for the lulz
Check out these government and military email
addresses that signed up to the porn site…
They are too busy fapping to defend their country
The group was quick to point out that six of the 26,000 email addresses stolen from Pron.com contained those who signed up for the site using their government or military (.gov and .mil) email accounts.
LulzSec, called on its followers over Twitter to try and use the credentials to log into Facebook, and to post on the compromised accounts to show their propensity for Internet porn. Facebook quickly responded to by matching up the leaked email addresses against its own database and resetting those users passwords.
In an unexpected twist though, LulzSec has now turned it’s reticule on Bethesda and its online FPS game Brink. It started on Sunday (June 12th) with tweets from their LulzSec twitter account:
“We were going to keep this little treasure chest to ourselves, but it appears the hand has been bitten. Say your prayers, Brink users >:]”
Followed by:
“Big lulz coming up in the near future. Time to show these bitches how it’s done. #Brink #Bethesda #ZeniMax.”
The group later tweeted again that it would have carried out the attack yesterday but that it looked forward to releasing ‘it” in 24hrs.
“We’d release right now, but we’re missing one vital ingredient to complete our victory soup. No ETA, but we’re hoping in the next 24 hours.”
The news only gets more bleak with the tweet “Snap your minds into a new realm, my friends. We did it because they couldn’t stop us – and did it we did, as you’ll see. We always deliver.” almost indicating that the hack has been completed, whatever “it” may be. There hasn’t been any word from Bethesda on the matter as of this write up but it appears that the Bethesda Store is currently unavailable and has been since 3pm yesterday which was around the time the first LulzSec tweet was posted in regards to Bethesda. If you or anyone you know has a Bethesda account I encourage you to at least change your password as soon as possible and as a general rule of thumb if you use the same password on multiple sites/services change those as well. Since we don’t know the full reach and exposure of what LulzSec has accomplished be on the look out of any personal information of yours that may be associated with Bethesda so that you are aware of just what information of yours must be watched closely or altered in the near future.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sony blames hacktivist group Anonymous for Playstation Network intrusion


File this one under “things not to do when dealing with massive network outages.” Sony has kicked the hornet’s nest today by blaming Anonymous, a massive network of hackers that regularly takes up activist causes, for indirectly causing a breach of security in its PlayStation Network (PSN) online gaming network that led to the attack that brought PSN down.
While the company isn’t blaming Anonymous for the attack itself, it said the hackers that stole gobs of sensitive data about PSN users were able to break into the network while it was defending itself from denial of service attacks orchestrated by Anonymous. Anonymous took on Sony after the company went after famed PS3 hacker George Hotz, who reverse engineered the PlayStation 3 to run unauthorized programs.
When the PlayStation Network crashed on April 21, Anonymous said it was not behind the attack. Instead, the hacktivist group said, “Sony is incompetent.” But an observer of the IRC forum used by members of Anonymous said the attackers behind this current Sony outage appear to have learned their methods from Anonymous’ activities of two weeks ago.
This really is not the time for Sony to start playing with fire. Anonymous doesn’t regularly respond to blame and threats, but because the network of hackers has taken on Sony before, there is no guarantee Sony’s latest accusation won’t spark some kind of retaliation. Anonymous has proven time and again that it is a force to be reckoned with. Sony has to focus on beefing up its network, not trying to shift blame around and incite more attacks against the already feeble network.
Hackers attacked the PSN on April 19, forcing the Japanese company to bring down the network, which has more than 77 million registered users. The nightmare then continued after hackers broke into the company’s Station.com site, which serves as a host for its PC games like Everquest. Hackers were able to steal information from as many as 24.6 million accounts on that site, according to Sony. In all, more than 100 million accounts might have been compromised.
The PSN breach was a massive security gaffe that has caused the U.S. government to get involved and demand answers — such as who attacked the network and what users were affected. Sony has sent warnings to PSN users about the possible credit card theft. The whole ordeal spawned an apology from Sony that lasted more than an hour and a half.
The network has been down for more than a week, denying 77 million registered gamers the ability to play online games, watch movies, listen to music or download other entertainment to their PlayStation 3 consoles and PlayStation Portable handhelds. The PlayStation Network is a critical service that competes with Microsoft’s Xbox Live online gaming service — as well as other online gaming services. There are also 948 games now available in the PlayStation Network store, as well as 4,000 pieces of add-on content for games.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Federal Judge Opened The Gate For 14 Anonymous Members To Use Twitter

Federal Judge Opened The Gate For 14 Anonymous Members To Use Twitter Freely

A Federal judge in San Jose, Calif. Has opened the gates for 14 alleged members of anonymous to continue using Twitter as one of the "principle tools through which the members of the Anonymous hacking group planned and coordinated their criminal activities," according to prosecutors opposing the decision. The first question came up in January as a motion from Vincent Kershaw, indicted along with 13 other alleged Anon members for attacking PayPal following the arrest of WikiLeaks founder Julian Assange.
Kershaw could have simply argued that preventing him from Tweeting about issues having nothing to do with his legal situation or the charges against him was a violation of his First Amendment right to free speech. Even in court, where current events, fashions and politics are supposed to be banished from legal decisions, requests go over much more easily when they hit the issues that are big today rather than when the Constitution was written.
Despite arguments that the dangerous, subversive hackers of Anonymous use the overly public Twitter to plan their misdeeds, Judge Paul Grewal ruled prosecutors hadn't sufficiently linked specific Twitter accounts to their assumption that every key-press by an Anonymous sympathizer was necessarily a felony or act of treason.
Therefore Kershaw and his fellow defendants are free to Tweet themselves or participate in Twitter Town Halls and other online events. They're not allowed to use IRC, however, which Anonymous actually does use to plan and coordinate its various activities, not to mention gossip about each other, engage in private flame wars that break out into public doxings, swap files, swap pictures and do all the other social things people do online, especially when their physical liberty is limited.
Kershaw is a 28-year-old foreman for a Colorado landscaping company, was arrested along with 15 others for a DDOS attack the DoJ charges they participated in and which was organized by Anonymous. He was released July 2 on a bond of $10,000 on condition he not access the Internet from any computer and that he allow a probation officer to verify he had not done so.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...