Showing posts sorted by relevance for query SOCA. Sort by date Show all posts
Showing posts sorted by relevance for query SOCA. Sort by date Show all posts

Serious Organised Crime Agency (SOCA) Under DDoS Attack

Serious Organised Crime Agency (SOCA) Under DDoS Attack 
Hacker performed massive denial of service attack to take down the official website of UK's Serious Organised Crime Agency (SOCA). Last night cyber criminals sent large number of data packets by which they managed to send SOCA offline. SOCA authority confirmed that they have suffered a DDoS attack which interrupts  their services. A spokesman said the site was taken offline at 22:30 on Wednesday, but that the attack did not "pose a security risk to the organisation". The exact reason of this attack is unclear but it can be predicated that either Soca's movement  on closing down 36 websites believed to be selling stolen credit card information may caused this DDoS attack. “The SOCA DDoS attack is probably related to the carder site takedowns last week,” F-Secure’s Chief Research Officer Mikko Hypponen wrote on Twitter.Experts are also highlighting another reason which may have influenced hacktivist to engage this cyber attack and that is the Supreme Court's decession on blocking The Pirate Bay in UK . What ever this is the second time in less than a year that SOCA's website has found itself the target of malicious attackers, having previously suffered from a DDoS attack at the hands of the notorious LulzSec gang in June 2011.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SpyEye Trojan found in Virgin Media



SOCA detected the virus created to steal bank details The SpyEye trojan virus, which is designed to steal online bank accounts information, has infected over 1,500 PCs of Internet service provider Virgin Media. The malicious virus infections were detected by the Serious Organised Crime Agency (SOCA), which alerted Virgin Media. SOCA is investigating the matter. Virgin Media has sent letters to its broadband customers which have instructions on how to remove the virus, which usually affects Microsoft Windows systems, and avoid  escalation of security threats. The SpyEye trojan virus was first detected in 2009.
SOCA cyber chief Lee Miles said he welcomed "steps taken within industry to utilise the information and resources provided by law enforcement and raise awareness of online safety". A Virgin Media spokesman said the response of its customers about the infection had been "generally positive". The company's executive director of broadband Jon James said, "Cybercrime is on the rise and the increasing sophistication of malware infections mean that all Internet users could be at risk with devastating effects."  

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Lulzsec Spokesman Jake Davis Get Bail


An 18-year-old British man Jake Davis arrested on suspicion of being a spokesman for hacking groups LulzSec and Anonymous was granted bail when he appeared in a London court on Monday. Jake Davis is charged with hacking into websites, including that of Britain's Serious Organized Crime Agency (SOCA), which was out of service for several hours on June 20 after apparently being targeted.
Davis was arrested on Wednesday at his home on the Shetland Islands, north of the Scottish mainland. He faces five charges, including conspiring to carry out a distributed denial of service attack on SOCA, the British equivalent of the FBI. Such attacks flood websites with traffic to make them crash.
Davis wore a grey-blue shirt and a black T-shirt and clutched a book as he appeared in the dock at the City of Westminster Magistrates Court in London.

He appeared relaxed and spoke only to confirm his name and date of birth. District Judge Howard Riddle told the teenager he will have to appear in Southwark Crown Court in London on August 30 and granted him bail with stringent conditions and a curfew attached.

He is barred from using the Internet or having access to any computer or mobile phone and must remain indoors from 10:00 pm to 7:00 am at his mother's home in Lincolnshire, eastern England. The alleged hacker is said to use the online nickname "Topiary" and present himself as a spokesman for LulzSec and Anonymous.
LulzSec has claimed responsibility for a 50-day rampage earlier this year against international businesses and government agencies, including the Central Intelligence Agency and Senate in the United States and electronics giant Sony. Another alleged British member of the group was released by a court on bail in June after being diagnosed with autism. 
Ryan Cleary, 19, has been charged with offences including hacking into the SOCA website.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)
Two days ago an alleged  hacker has appeared in court accused of conspiring with three British teenagers to bring down the websites of the CIA and the UK's Serious Organized Crime Agency. Ryan Ackroyd, 25, appeared at Westminster Magistrates court in London on Friday charged with computer hacking offences for the so-called “hacktivist” group, LulzSec.
Ryan was also accused of attacks on the NHS and News International, publisher of the Sun, as well as police authorities in the UK and US. The Doncaster man is the last of four British males to appear in court in the UK in connection with attacks by LulzSec, a spin-off group linked to the hacking collective Anonymous.
He faces two counts of conspiring with Jake Davis, 18, Ryan Cleary, 19, and a 17-year-old boy, who cannot be named for legal reasons, to do “an unauthorised act with intent to impair or with recklessness as to impair the operation of a computer” between 1 February and 30 September 2011. 
He made no plea and was granted bail by Westminster magistrates until a hearing at Southwark Crown Court on 11 May. Mr Ackroyd is the last of four alleged members of LulzSec to appear in court. District judge Howard Riddle granted him bail until a plea and case management hearing at Southwark crown court on 11 May, on condition that he does not access or have in his possession any device that could access the Internet.
Earlier in 2011 Ryan also faced imprisonment and later released on bail. Court ordered him not to use Internet even Ryan was also banned from seeing his girlfriend alone by the court.  



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Top 5 DDoS Attacks of 2011, Exclusive Report By Corero Network Security

Corero Network Security (cns:LN), the leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, named its list of 2011's Top 5 DDoS attacks. Corero's findings show an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify "in the cloud," and often go undetected until it is too late. Corero also found an uptick in attacks against corporations by "hactivists" DDoS-ing sites for political and ideological motives, rather than financial gain. Attacks against Mastercard, Visa, Sony, PayPal and the CIA top Corero's list.
"The cat-and-mouse game between IT administrators, criminals and hactivists has intensified in 2011 as the number of application-layer DDoS attacks has exploded. Coupled with an increase in political and ideological hactivism, companies have to be extremely diligent in identifying and combating attempts to disable their websites, steal proprietary information and to deface their web applications, " said Mike Paquette, chief strategy officer, Corero Network Security.

Corero's 2011 Top 5 DDoS Attacks:-

1. Anonymous DDoS Attacks on WikiLeaks "Censors" Visa, MasterCard and PayPal. The most significant DDoS attack so far this year, the WikiLeaks-related DDoS attacks on Visa, MasterCard and PayPal were both Anonymous' "coming out" party, and the first widespread example of what has been dubbed "cyber rioting" on the Internet, with virtual passersby joining in the attack voluntarily.

2. Sony PlayStation Network DDoS. A shocking wake-up call for many gamers, customers and investors, the Sony Playstation Network DDoS attack began a series of cyber attacks and data breaches that damaged Sony financially and hurt its reputation.

3. CIA and SOCA Hit by LulzSec DDoS Attacks. The appearance of LulzSec on the cyber attack scene, highlighted by bold DDoS attacks on the CIA and the U.K. Serious Organised Crime Agency (SOCA), made us wonder if anyone was safe on the Internet.

4. WordPress DDoS. A massive DDoS attack disrupted one of the world's largest blog hosts--some 18 million websites. The huge attack hit the company's data centers with tens of millions of packets per second.

5. Hong Kong Stock Exchange. This DDoS attack had a major impact on the financial world, disrupting stock market trading in Hong Kong. This was a highly leveraged DDoS attack, potentially affecting hundreds of companies and individuals through a single target.

For all the pain and suffering DDoS attacks have caused, there are a number of best practices that companies can implement to reduce their risk. The most effective defense against DDoS attacks requires expert preparation of defensive resources, ongoing vigilance and a rapid, organized response.

-News Source (Corero Network Security)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hacker Claimed Security Breach in CIA & Exposed Undercover Agent's Details

Hacker Claimed Security Breach in CIA & Exposed Undercover Agent's Details 

An unnamed hacker behind a code name "CyberZeist" has revealed some classified information regarding the official website of Central Intelligence Agency (CIA). He also exposed server details, DNS information, administrator login panel and so on. All the exposure is made available to public in a open pastebin release. Which also contains certain information about five undercover CIA agent's including real name, age, full postal address, banking details, credit card information, email-id & passwords. According to the release of the hacker the mail aim of this breach is stand against online censorship. The hacker also threatened that he will leak more details. Its hard to say whether those exposure are legitimate or not. Still the CIA authority is silent about this breach. We would like to give you reminder that this is not the 1st time earlier in 2011 and 2012 CIA has fallen victim of cyber attack. If you dig the history we will find that in 2011 Lulzsec hit CIA & SOCA with massive DDoS attack which immediately sent the website offline for a certain period of time. Also this year in #Friday rampage hacker collective Anonymous targeted CIA again with DDoS attack.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Guy Ryan gets bail, but he cannot use the Internet



Even though LulzSec has now disbanded and rejoined as part of Anonymous, that doesn’t mean their past hacks have been forgotten about. Early last week teenager and LulzSec member Ryan Cleary was arrested in the UK as it was claimed he is the “mastermind” of the hacking collective. A week later and he is out on bail, but under strict instructions not to access the Internet. That’s becoming quite a difficult thing to do nowadays. He won’t be allowed near a PC unless the Ethernet ports and wireless are disabled. A smartphone is out of the question, as is the Xbox, PS3, Wii, DS, PSP, 3DS. How about watching TV? Sure, as long as his house doesn’t have a new flatscreen with Internet out-the-box.
Cleary may not care much as at least he’s no longer sitting in a cell 24 hours a day. But his troubles are far from over. As well as no Internet access he is electronically tagged and under a curfew each day. He also has to face charges of hacking into several websites including the Serious Organised Crime Agency (SOCA). We’ve also learned that Cleary is a recluse and suffers from Asperger’s Syndrome, just like Gary McKinnon the man who is fighting against extradition for breaking into U.S. military computers.
LulzSec has denied that anyone in their group has been arrested, but we have no evidence to back this up. On the other hand the police have someone they are sure is part of the hacking group, as well as being associated with Anonymous. If Cleary is a member then he could have in his possession detailed accounts of other members and what they got up to as a group. As the police also took his computer hardware we should know soon enough if there’s anything usable as more arrests will be made.

-News Source (geek.com)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Bring Down The Information Commissioner’s Office (ICO)

Anonymous Bring Down The Information Commissioner’s Office (ICO) Official Site
Hacktivist group Anonymous continuing massive denial of service of attack on the data protection watchdog's website. The tweets, which were published by the @UKAnonymous2012 account, claim the attack is part of a protest by the group at the handling of the Leveson Inquiry.  Incidentally, the Leveson Inquiry’s website has also been the target of DDoS attacks by Anonymous this week.
The Information Commissioner’s Office (ICO) has confirmed that it’s still dealing with the fallout from a suspected Distributed Denial of Service (DDoS) attack on its website.In a statement sent to IT Pro, the data watchdog said access to the site has been disrupted over the last several days because of the attack. “The website itself has not been damaged, but people have been unable to access it. We provide a public facing website which contains no sensitive information,” the statement said. “We regret this disruption to our service and we are working to bring the website back online as soon as possible.” 
Like ICO couple of weeks ago we have seen similar attack on the official website of UK's Serious Organised Crime Agency (SOCA) that time also the experts suspected that Anonymous was behind the attack and the reason of that hack was to protest Supreme Court's decession on blocking The Pirate Bay in UK.





-Source (IT Pro)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Judge Nicholas Loraine-Smith : Ryan 'LulzSec Hacker' is Banned From seeing His Girlfriend Alone

On the face of it, teenager Ryan Cleary appears the archetypal computer geek who retreated from the real world into a digital one. When he was charged with hacking into the website of the Serious Organized Crime Agency, observers branded him a recluse who needed to 'get a girlfriend'. But he was already dating Amy Chapman, 19, - and now a judge has refused his request to see her alone. The Aspergers sufferer is said to be a key member of the computer hacking network LulzSec, which has been blamed for attacks on the Serious Organised Crime Agency, the CIA, Sony and News International. He is alleged to have controlled a 'botnet' of up to half a million compromised computers which he used to launch 'denial of service' attacks against websites. He was charged in June and bail conditions imposed in court stipulate that he can only leave his home address with a parent.
Addressing London's Southwark Crown Court, his defence barrister Ben Cooper asked for this to be changed so Cleary could see Miss Chapman without his parents being present.

Refusing the application, Judge Nicholas Loraine-Smith said: 'I will not consider making a variation until the police have interviewed her and that they are satisfied that she is responsible enough to take on the duty.’ Cleary and fellow alleged LulzSec member Jake Davis, 18, were not required to attend the hearing. Davis is said to have operated from his bedroom in the Shetland Islands and used the online name Topiary.
The judge issued a stark warning to both defendants to comply with their bail conditions as he fixed their plea and case management hearing for January 27, 2012. 'First of all bail has to be on the same stringent terms for both of these defendants and I reiterate, as I did to one of them who has appeared before me, that if they breach any of these conditions they can be arrested and brought before the court and almost certainly remanded in custody,' he said.
Cleary, of South Beech Avenue, Wickford, Essex, is charged with five offences under the Computer Misuse and Criminal Law Acts.
He is alleged to have taken part in a denial of service attack - which cripple websites by overwhelming them with requests for data – that briefly brought down SOCA's site.
Cleary is also accused of involvement in two similar attacks on the websites of both the International Federation of the Phonographic Industry and its British counterpart on November 28 and October 29 respectively. A further charge alleges that he 'made, adapted, supplied or offered to supply' access to a 'botnet' - a network of computers, hijacked without their owners' knowledge - for use in the attacks.
Each of the three charges relating to DoS attacks carry a maximum jail sentence of 10 years, while the botnet charge could result in up to two years imprisonment. Davis, of Hoofields, Lerwick, Shetland, is alleged to have played a leading role in LulzSec, a group that was said to have been disbanded after being linked to attacks on a number of high-profile sites.
He is charged with gaining unauthorized access to a computer system, encouraging or assisting offences and two counts of conspiracy to commit offences.
He also faces a charge of conspiring to carry out a distributed denial of service attack - where a website is flooded with traffic to make it crash - on the Serious and Organised Crime Agency website.

-News Source (Mail Online)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Cleary & Jake Davis Plead Guilty at London Court For Hacking CIA & Pentagon

LulzSec Hacker Ryan Cleary & Jake Davis Plead Guilty at London Court For Hacking CIA & Pentagon

Two British LulzSec hacker Ryan Cleary, 20, and Jake Davis, 19 today admitted hacking into the websites of the CIA and the Pentagon as well as the Serious Organised Crime Squad in the UK. Accoridng to an exclusive report of The Guardian both Jake Davies, also known as "Topiary" and Ryan Cleary, known under the names "Anakin," "hershcel.mcdooenstein", "George hampsterman" and "ni"  have confessed attacks on the Serious Organised Crime Agency (SOCA), National Health Service, News International, Sony, Nintendo, Arizona State police, and other sites in distributed denial-of-service (DDoS) attacks designed to cause the sites to cash. Cleary also confessed to four separate charges including hacking into US Air Force Agency computers at the Pentagon.
Cleary and Davis plotted to carry out the attacks with other unknown members of internet groups Anonymous, Internet Feds, and LulzSec. Other websites targeted by the pair were Westboro Baptist Church, Bethesda, Eve Online, HBGary, HBGary Federal, PBS Inc, and Infragard. Cleary also confessed today to four separate charges, including hacking into US Air Force Agency computers, based at the Pentagon.
Both men appeared in the dock at Southwark Crown Court to enter guilty pleas to a series of charges brought against them.
But both Cleary and Davis denied allegations they posted 'unlawfully obtained confidential computer data' to public websites including LulzSec.com, Pirate Bay, and PasteBin, in order to encourage offences contrary to the Serious Crime Act.
Alleged co-hackers Ryan Ackroyd, 25, and a 17-year-old A-level student, from south-London, deny their involvement in the DDoS attacks and will stand trial on April 8, 2013.








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Norwegian Teen Hackers of "TeaMp0isoN" Arrested By British Police

2 Norwegian Teen Hackers of "TeaMp0isoN" Arrested By British Police (PCeU)

Earlier in last month MI6 arrested the leader of TeaMp0isoN code named "TriCk" along with few other active members who ware directly involved behind the Denial of Service attack on MI6. Now two Norwegian teenagers, aged 18 and 19, have been arrested in connection with the distributed denial-of-service (DDoS) attack on the web site for the UK's Serious Organised Crime Agency (SOCA) and for swamping British intelligence agency (MI6) hotline with automated Skype calls. These two hackers ware the active members of hacker collective TeaMp0isoN and MLT. These two suspects are arrested in Newcastle on Wednesday evening, and is being questioned about offences under the Computer Misuse Act. Computer equipment has been seized for forensic analysis - and no doubt investigators are hoping that they may find digital clues which could help uncover other suspected hackers. Erik Moestue, a Norwegian prosecutor, said "We have arrested the two we think were most important in these attacks, but we still want to talk to more people". The offence that the two stand accused of carries a maximum jail sentence of six years. "The case is still under investigation," added Moestue, noting that "It is still too early to say anything about the motive for the actions"
The authorities, no doubt, will be hoping to confirm that they have arrested the correct man. Certainly, MLT's Twitter account has been silent since 6:27pm on Wednesday evening. According to the authorities these arrest is part of an ongoing investigation by the Police Central e-Crime Unit (PCeU) division of the Metropolitan Police into various hacking gangs who have made headlines in the last year or so. 
Earlier TeaMp0isoN was directly involved with Anonymous in #OpRobinHood #OpCensorThis. Also they have found SQL-i vulnerability on the Official NASA forum, and like this attack TeaMp0isoN also hacked English Defence League (EDL) ,T-Mobile USA, BlackBerry blog and many more





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Breached The Security System of Ministry of Defence (MoD)

Hackers Breached The Security System of Ministry of Defence (MoD) 

Couple of days ago we have seen  Serious Organised Crime Agency (SOCA) had become the victim of denial of service attack. And now its the turn of MoD. The military's head of cyber-security has revealed that hackers have managed to breach some of the top secret systems within the Ministry of Defence (MoD). Major General Jonathan Shaw told - "The number of serious incidents is quite small, but it is there," he said. "And those are the ones we know about. The likelihood is there are problems in there we don't know about." Government computer systems come under daily attack, but though Shaw would not say how or by whom, this is the first admission that the MoD's own systems have been breached.
A former director of UK special forces, Shaw, 54, said he thought the military could learn a trick or two from firms such as Facebook. The company has a "white hat" programme in which hackers are paid rewards for informing them when they have found a security vulnerability.
Nine people in the UK have been paid a total of $11,000 for working with Facebook. Shaw said this was the kind of "waacky idea we need to bring in".
Shaw has spent the last year reviewing the MoD's approach to cyber-security, and the kind of cyber-capability the military will need in the future.
He says next year's MoD budget is expected to include new money for cyber-defence – an acknowledgment that even during a time of redundancies and squeezed budgets, this is now a priority.
The general said the MoD wasn't "doing badly … but we could do a hell of a lot better. We will get there, but we will have to do it fast. I think it was a surprise to people this year quite how vulnerable we are, which is why the measures have survived so long in the [budget] because people have become aware of the vulnerabilities and are taking them seriously." 
Shaw said the number of attacks was "still on an upward curve … and the pace of change is unrelenting". In his last interview before retiring, Shaw said the UK had to develop an array of its own cyber-weapons because it was impossible to create entirely secure computer systems.



-Source (Guardian)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice Website

Hacker from infamous Anonymous claimed to take down the official website of U.S. Department of Justice (DOJ) & Central Intelligence Agency (CIA). Here also hackers followed their older tradition by engaging massive denial of service (DoS) attack to send the target offline. Due to large number of traffic CIA website was inaccessible for 45 mins. A Brazilian hacker code named "Havittaja" took responsibility of this attack by saying saying it was done for the "lulz", which refers to the popular online abbreviation "for laughs".

We have seen similar attack on CIA in last February, there also Anonymous took responsibility of that cyber attack and also claimed that this is yet another biggest denial of service attack of this year. We would also like to refresh your memory while saying not only Anonymous but also a hacker group named "CyberZeist" has revealed some classified information regarding the official website of CIA. He also exposed server details, DNS information, administrator login panel and so on. Even the hacker group leaked certain information about five undercover CIA agent's including real name, age, full postal address, banking details, credit card information, email-id & passwords. If you dig the history we will find that in 2011 Lulzsec hit CIA & SOCA with massive DDoS attack which immediately sent the website offline for a certain period of time.
If you talk about Department of Justice then we need to dig the 1st page of Operation Megaupload where hacktivist shutdown the official website of DOJ & FBI

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...