Showing posts sorted by relevance for query hacktivist. Sort by date Show all posts
Showing posts sorted by relevance for query hacktivist. Sort by date Show all posts

McAfee Threats Report: Second Quarter 2011


McAffee released its security threat report  today, announcing that 2011 has seen spikes in several different types of online security threats. “The second quarter of the year was clearly a period of chaos, changes, and new challenges,” according to the report.

The Report Contents:-

  • Hacktivism
  • Mobile Threats
  • Cybercrime
  • Malware Threats
  • Adobe outpaces Microsoft in Attracting Exploits
  • Messaging Threats
  • Web Threats

According to McAffee:-

"The threat landscape of 2011 is undergoing a year of chaos and change. We see chaos in the major challenges that hacktivist groups such as LulzSec and Anonymous pose, and change in the shifts in new malware classes and targeted devices. This quarter McAfee Labs saw major hacktivist activity—but in a very different way. The group Lulz Security, LulzSec for short, differs from other hacktivist groups in that they had no specific goals. They were in it, as they claimed, for the “lulz” (LOLs in text messagespeak, or “laugh out loud’s” ) but
showed an agility at compromising networks and servers, and stealing usernames, passwords, and other data. LulzSec committed multiple intrusions against a wide variety of companies, as well as attacks against police departments and intelligence agencies, and many other compromises. Although many of the outcomes and uses of these compromises are still in play (and we provide a helpful overview of the quarter’s activity) one thing has become clear: Many companies, both large and small, are more vulnerable than they may have suspected. Further, the security industry may need to reconsider some
of its fundamental assumptions, including “Are we really protecting users and companies?” Although LulzSec may have ceased its operations during this quarter, the questions they and other hacktivist groups have raised will be debated for a long time.
One significant change in the first quarter of 2011 was Android’s becoming the third-most targeted platform for mobile malware. This quarter the count of new Android-specific malware moved to number one, with J2ME (Java Micro Edition), coming in second while suffering only a third as many malware. This increase in threats to such a popular platform should make us evaluate our behavior on mobile devices and the security industry’s preparedness to combat this growth.
We also saw an increase in for-profit mobile malware, including simple SMS-sending Trojans and complex Trojans that use exploits to compromise smartphones. We offer an update of cybercrime “pricebooks” as well as some changes to toolkit and service prices. “Crimeware as a service” and the burgeoning “hacktivism as a service” continue to evolve as interests and targets change. On the positive side, there were some significant victories against cybercriminals this quarter.
Continuing the change theme, we observed a considerable decrease in both AutoRun and Koobface malware, offset by a strong rise in fake-anti-virus software that targets the Mac. Apple’s OS X has been mostly ignored by malware writers for years, so this represents a significant change of target
for cybercriminals. Malware continued its overall growth during the quarter as did rootkit malware. Rootkits, used primarily for stealth and resilience, makes malware more effective and persistent; its popularity is rising. Rootkits
such as Koutodoor and TDSS appear with increasing frequency. The amount of malware that attacks vulnerabilities in Adobe products continues to overwhelm those in Microsoft products.
Botnets and messaging threats, although still at historic lows, have begun to rise again. We expected this recovery after some recent botnet takedowns. Users and enterprises must plan for this growth and prepare their defenses and responses accordingly. We again examine social engineering subjects by both
geography and subject and botnets by geography and type.
We saw several spikes in malicious web activity this quarter as well as some serious growth in blogs and wikis with malicious reputations. Sites that deliver malware, potentially unwanted programs, and phishing sites also increased.
The second quarter of the year was clearly a period of chaos, changes, and new challenges."

To Download The Full report Click Here

-News Source (McAffee)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpPhilippines - Anonymous Hacked & Defaced Several Philippine Govt Sites

#OpPhilippines -Anonymous Hacked & Defaced Several Philippine Govt Sites 

When the topic or act of Internet surveillance or Internet privacy rises its head, every time the Hacktivist group Anonymous stand against it. Earlier the world seen not only Anonymous but also hackers from different of the world joined in the protest against controversial act like SOPA, PIPA, ACTA or CISPA. Quit similar scenario happens to Philippines, as soon as the anti-cybercrime law get passed, immediately hackers shown a massive protest against it. The cyber fence of Philippine was heavily disturbed since Wednesday. At the very first stage of the attack the hacker group calling themselves "Anonymous Philippines" targeted several government, civil society and other private websites of Philippine and defaced them. This ongoing cyber attack against Philippine have been dubbed as Operation Philippine (#OpPhilippines)


As of Wednesday midnight, the website of Bangko Sentralng Pilipinas, Metropolitan Waterworks and Sewerage System, the American Chamber of Commerce, and the Philippine Anti-Piracy Team succumbed to the cyber-attacks. The websites of the anti-smoking campaign unit of the Department of Health and think tank Institute for Development and Econometric Analysis followed suit, bringing to six the number of websites attacked. One hactivist announced the challenge to commit cyber-crime in social networking site Facebook by a user #pR.isOn3r.  The post hinted in its footnote that the BSP website was a target.

“Challenge Accepted,” the hacktivist said. “If speaking up against idiocy in government and unconstitutional amendments is a crime, then I am PROUD TO BE A CYBER CRIMINAL.”
“We are anonymous. We are Legion. United as one. Divided by none,” the hacktivist said. “The corrupt fear us. The honest support us. The heroic join us. Expect us.”

This attack followed by few more Govt sites and they are- National Telecommunications Commission (NTC), Philippine Information Agency (PIA) and the Food Development Center sites. 


Message of the Hacker on Deface Page:- 
“This domain name associated with GOV.PH has been seized pursuant to an order issued by Anonymous Philippines,
“A federal grand jury has indicated several individuals and entities allegedly involved in the operation of this website / department / office charging them with the following federal crimes: Conspiracy, Violations of Human Rights, Corruption, Copyright infringement, Money Laundering, PIRACY, Misuse of Devices, Libel, Plagiarism, and Destruction of Freedom of Speech.”



The attack is yet not over, The government portal of  Philippine also faced cyber attack. A twitter account which is recognized as one of of legitimate of source of hacker collective anonymous, took responsibility of engaging denial of service (DoS) attack against www.gov.ph 

"Anonymous Operation Philippines | Target: DOWN | http://www.gov.ph  | #Anonymous #OpPhilippines #FuckTheCyberCrimeLaw #Freedom  |" said the hacker, in his twitter



-Source (inquirer.net)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Twitter Account of Hacktivist Group Anonymous Hacked By 'Rustle League'

Twitter Account of Hacktivist Group Anonymous Hacked By 'Rustle League'

The scenario of hackers targeting another hacker has became a very common matter, in last two years we have seen many instances of the above matter where a hacker hit another hacker's site, community, blog, forums and so on. Today the story which I will about to discuss is the same matter where infamous hacker community named 'Anonymous' fallen victim. A newly formed hacker group calling them selves "Rustle League" targeted one of the officially recognized twitter account (@Anon_Central) belongs to hacktivist group which have more than 160,000 followers. According to security experts  "the reason Anonymous fell victim is probably human weakness." Or in other word many of twitter accounts get hacked due to choosing week passwords. "Chances are that they followed poor password practices, like using the same password in multiple places or choosing a password that was easy to crack. Everyone should learn better password security from incidents like this - if it can happen to an account run by Anonymous supporters, it could happen to you" said another expert of security firm Sophos. The hack on Anonymous twitter account placed Thursday morning and three hours later, those running the feed tweeted that they had gained back control of their account. 
While talking about attack on Twitter, we would like to remind you that, in this month a sophisticated cyber attack compromised the security system of the social networking giant twitter, where more than 250,000 twitter users have fallen victim. Though the hack of Anonymous twitter account does not resembles to the said matter, but the hack can be considered in the list of twitter hacking, widely known as #twithackery; where hackers gain temporary access of celebrity and famous twitter accounts. If you did the history we will find the following names, WWE champion John CenaStar Rita OraJustin BieberTeyana Taylor,American pop singer KeshaNBC NewsFox News PoliticsUSAToday, Lady Gaga’s Twitter AccountAnders BreivikMahesh Bhatt, Huffington Postthese are the famous names who have fallen victim to twithackery





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Cops Gave Warning To hacktivist Via Twitter


After arresting several suspected members of high-profile hackers’ groups, the UK police issued their latest warning to other hackers – via a tweet.
In a message on its Twitter account, the UK Metropolitan Police reminded people against computer misuse, adding the probe into the criminal activity of hacktivist groups continues.
 
"The investigation into the criminal activity of so-called ‘hacktivist’ groups #Anonymous and #LulzSec continue(s)," it said.

 
A link on the tweet led to a longer statement, where the Metropolitan Police reiterated anyone considering accessing a computer without authority risk imprisonment.
Hacker groups had taken to using Twitter to inform the public of their latest acts.
Under UK law, “it is an offence if a person acts from within the UK upon a computer anywhere else in the world. It is also an offence if someone anywhere else in the world to criminally affect a computer within the UK," the police tweet said.
The tweet also said UK law penalizes unauthorized access to personal accounts, Distributed Denial of Service (DDOS) Attacks and intrusive hacks where data is taken or systems changed.
"Other jurisdictions have similar law," it said in the extended tweet.
In past weeks, UK police had arrested “Topiary," the suspected spokesman of hacker group Lulz Security, which had joined forces with Anonymous to hack government and corporate sites.
But “Topiary" a.k.a. Jake Davis, 18, was released on bail after he was charged with five offenses relating to computer attacks and break-ins by LulzSec and Anonymous.
Anonymous had issued a press release to free “Topiary" and hinted at getting back at those who led to his arrest.
It called on its Anons in the UK "to revolt and wash this shame brought upon them by a band of traitors and bandits who sold out to Anonymous’ enemies and disparaged the sentiment of this noble, lulzy people."

The group also called on Anons "to revolt altogether to cleanse the world of the ProSec filth who spread mischief in the land."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Gave Warning To Hacktivists: You're Breaking The Law


FBI official in charge of cybercrime speaks for the first time with the media specifically about hacktivism. Last July, the FBI executed what is arguably its most public campaign against hacktivists—individuals who breach computer systems to make a political or ideological statement. On Tuesday, July 19, the G-men cuffed 12 men and two women allegedly associated with hacktivist group Anonymous for their supposed involvement in a dedicated denial of service (DDoS) attack against PayPal's website in December 2010. The July raid appeared to be the largest public indication that the FBI was finally making headway in its investigation of hacktivist activity during a year when groups including Anonymous and LulzSec made a mockery of public- and private-sector computer systems. Between December 2010 and August 2011 alone, they broke into dozens of corporate and government networks with outrage, defiance and glee. In fact, hacktivist activity had long been on the FBI's radar, according to Shawn Henry, executive assistant director of the FBI's Criminal, Cyber, Response and Services Branch. He first noticed it in the late 1990s, when he was working as a supervisory special agent at FBI headquarters on computer intrusion cases. At the time, hacktivism consisted mostly of website defacements, he says. Today, it's more menacing. Consider the outcomes of just three data breaches launched in the name of hacktivism.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sony blames hacktivist group Anonymous for Playstation Network intrusion


File this one under “things not to do when dealing with massive network outages.” Sony has kicked the hornet’s nest today by blaming Anonymous, a massive network of hackers that regularly takes up activist causes, for indirectly causing a breach of security in its PlayStation Network (PSN) online gaming network that led to the attack that brought PSN down.
While the company isn’t blaming Anonymous for the attack itself, it said the hackers that stole gobs of sensitive data about PSN users were able to break into the network while it was defending itself from denial of service attacks orchestrated by Anonymous. Anonymous took on Sony after the company went after famed PS3 hacker George Hotz, who reverse engineered the PlayStation 3 to run unauthorized programs.
When the PlayStation Network crashed on April 21, Anonymous said it was not behind the attack. Instead, the hacktivist group said, “Sony is incompetent.” But an observer of the IRC forum used by members of Anonymous said the attackers behind this current Sony outage appear to have learned their methods from Anonymous’ activities of two weeks ago.
This really is not the time for Sony to start playing with fire. Anonymous doesn’t regularly respond to blame and threats, but because the network of hackers has taken on Sony before, there is no guarantee Sony’s latest accusation won’t spark some kind of retaliation. Anonymous has proven time and again that it is a force to be reckoned with. Sony has to focus on beefing up its network, not trying to shift blame around and incite more attacks against the already feeble network.
Hackers attacked the PSN on April 19, forcing the Japanese company to bring down the network, which has more than 77 million registered users. The nightmare then continued after hackers broke into the company’s Station.com site, which serves as a host for its PC games like Everquest. Hackers were able to steal information from as many as 24.6 million accounts on that site, according to Sony. In all, more than 100 million accounts might have been compromised.
The PSN breach was a massive security gaffe that has caused the U.S. government to get involved and demand answers — such as who attacked the network and what users were affected. Sony has sent warnings to PSN users about the possible credit card theft. The whole ordeal spawned an apology from Sony that lasted more than an hour and a half.
The network has been down for more than a week, denying 77 million registered gamers the ability to play online games, watch movies, listen to music or download other entertainment to their PlayStation 3 consoles and PlayStation Portable handhelds. The PlayStation Network is a critical service that competes with Microsoft’s Xbox Live online gaming service — as well as other online gaming services. There are also 948 games now available in the PlayStation Network store, as well as 4,000 pieces of add-on content for games.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hacktivist Group Anonymous Targeted Pope in Mexico

Hacktivist Group Anonymous Targeted Pope in Mexico 
After Vatican now Anonymous targeted the Mexico Pope. The hacker group in Mexico crashed at least two of the websites for Pope Benedict XVI’s upcoming visit to Mexico on Thursday, claiming the papal visit is a political move to support the conservative National Action party.
The site contained information on the pope’s planned activities starting Friday in the north-central state of Guanajuato, which is governed by President Felipe Calderon’s National Action Party, or PAN. The Anonymous IberoAmerica website, which has been a channel of communication for such hacker “ops” in the past, said the site crashes were the result of Anonymous operations with names such “Pharisee” and “freeloader.”
Anonymous Mexico said in a video posted on social media sites that the pope’s visit will cost Mexicans money that could be better spent on the poor, and is meant to support the PAN in the July 1 presidential election. PAN candidate Josefina Vazquez Mota is trailing front-runner Enrique Pena Nieto of the Institutional Revolutionary Party by at least 10 percentage points in most polls on the race. The official campaign season starts at the end of this month. The pope’s “visit comes precisely at the start of the electoral campaigns,” said the faceless Anonymous figure in the video. “The PAN will take this as a political weapon to win the votes of millions of Catholics in Mexico.”
Earlier this month Anonymous take responsibility of engaging cyber attack on Vatican official website & Vatican Radio System. The hacker group said - "This attack is not against the Christian religion or the faithful around the world but against the corrupt Roman Apostolic Church," said the statement, posted on the Italian-language version of the Anonymous website.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#ProjectWhiteFox -Team GhostShell Hacked 1.6 Million Accounts of NASA, ESA, Pentagon & FBI

#ProjectWhiteFox -Team GhostShell Hacked 1.6 Million Accounts of NASA, ESA, Pentagon & FBI

After the devastating "Project Blackstar" now the hacktivist group calling them selves "Team GhostShell" announced another big hack, where the hackers have targeted several big organizations. This round of cyber attack was going under the banner of #ProjectWhiteFox, in which GhostShell has posted log-in details of 1.6 million accounts they claim are taken from a series of attacks on organizations including NASA, FBI, European Space Agency and Pentagon, as well as many companies that partner with these organizations. The Anonymous subsidiary group has posted the details on Pastebin, while describing the aim of the hack; as part of their #ProjectWhiteFox campaign to promote hacktivism and freedom of information on the internet. The hacker group claimed that the leaked information contained log-in names, passwords, email addresses, CV & several other sensitive information. In their release GhostShell said - "For those two factors we have prepared a juicy release of 1.6 million accounts/records from fields such as aerospace, nanotechnology, banking, law, education, government, military, all kinds of wacky companies & corporations working for the department of defense, airlines and more."
GhostShell members also said that they have messaged security bosses about the insecurity a number of organizations they targeted during attacks throughout 2012, describing it as "an early Christmas present." 
In a Pastebin file, GhostShell features a list of 37 organizations and companies, including The European Space Agency, NASA’s Engineers: Center for Advanced Engineering, and a Defense Contractor for the Pentagon. GhostShell sets itself apart from other hacktivist groups by targeting more than just one company or organization, and then releasing the results of its attack all at once. This set of hacks is spread out across 456 links, many of which simply contain raw dump files uploaded to GitHub and mirrored on paste sites Slexy.org and PasteSite.com.
The uploaded files contain what appears to be user data that looks to have been obtained from the servers of the various firms (likely via SQL injection). The entries include IP addresses, names, logins, email addresses, passwords, phone numbers, and even home addresses. Email accounts include the big three (Gmail, Hotmail, and Yahoo), as well as many .gov accounts. There are also various documents and material related to partnerships between companies and government bodies, as well as sensitive information for the aforementioned industries. 
Furthermore, the group says it has sent an email to the ICS-CERT Security Operations Center, Homeland Security Information Network (HSIN), Lessons Learned and Information Sharing (LLIS), the FBI’s Washington Division and Seattle location, Flashpoint Intel Partners, Raytheon, and NASA. In it, they say to have detailed “another 150 vulnerable servers from the Pentagon, NASA, DHS, Federal Reserve, Intelligence firms, L-3 CyberSecurity, JAXA, etc.”





-Source (TNW)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

President of Guyana Official Site Hacked By Tha Disastar


President of Guyana under cyber attack. Well known Pakistani hacker named from Tha Disastar from The Hackers Army hacked the official website of Office of the President of Guyana. Few days before Tha Disastar has hacked and defaced the anonyops.com. It was one of the important site of Hacktivist Anonymous. Not only that he also performed a massive DDoS attack on Hacktivist site and as a result the site was remain offline. Also earlier The Hackers Army has hacked lots of high profile websites inlcuding ESET antivirus site and many more.

Hacked Site:-
Mirror Link:-



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Australian Govt. Site Hacked By #Antisec Hackers


Hacktivist Anonymous hit the Australian cyber fence. Anonymous has been busy recently with many different things going on, one of them is the ever on going battle of censorship with governments. As a result an Australian government website has been defaced and left in fairly messed up state. Previously Anonymous hacked and releases government records including Australian council data.
Recently Anon hacked and defaced the The CLGCA (Casino, Liquor and Gaming Control Authority) Govt. of Australia. The message on the deface page contains:-
"This domain has been seized by Exphin1ty and #Antisec For Australia's decision to censor the internet. Consider this a warning as what is yet to come. We encourage all of our #Antisec friends to aim your canons at any Gov.Au address and flaunt the tag #Antisec on any defecement, leak or database dump. "
The CLGCA site is still unavailable. Site restoration and maintenance is going on.


Also the message of the hacker is clearly indicating that the Govt. of Australia might have to face massive cyber attack form the Hacktivist.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonyops.com Hacked By Tha Disastar (Hacktivist Group Anonymous Under Cyber Attack)


Yesterday we have covered the recent operation declared by On-line "hacktivist" group Anonymous. The operation was named #Op-Brotherhood and there Anon threatens to Destroy The Muslim Brotherhood. In counter attack A Pakistani Hacker called Tha Disastar has Hacked and defaced the official website of AnonyOPS. The DDoS specilist has also faced massive denial of service attack on the anonyops.com and the site is still off-line. In the message hacker said that "Anonymous should stay in limits,and must not go out of there limits to others peoples religion"

Hacked Site:-
http://anonyops.com/anonnews/uploads/
Mirror Link:-
http://www.zone-hack.com/defacements/?id=5822


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

PlayStation 3 Italy Hacked & Database Exposed By THA

PlayStation 3 Italy Hacked & Database Exposed By SoveReign & Shad0wfiend (THA)
Two hackers named SoveReign & Shad0wfiend from The Hackers Army has breached the security PlayStation 3 Italy server. The y have the hacked the official website (later restored) and also exposed the database. In a open post on pasti the hacked database made available by the hacker where they have included several credentials like server details, db tables, columns, admin IP and other user credentials.
Earlier hackers of THA has hacked the official website of Bharatiya Janata Party (BJP) of Karnataka, President of Guyana, Several Indian Embassy Site and so on. Before that Tha Disastar has hacked and defaced the anonyops.com. It was one of the important site of Hacktivist Anonymous. Not only that he also performed a massive DDoS attack on Hacktivist site and as a result the site was remain offline for a long time.  


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Declared Operation Facebook on 5th November, 2011

 
It’s time again for us to hear from Anonymous, that rather well-known yet hacker group whose members remain largely, well, anonymous. The announcement made today makes clear that whichever member(s) of the hacktivist group have created said call to action are preparing to take down Facebook, one of the most popular and well-travelled social networks and indeed websites on the internet.
This newest attack is said to be directed at Facebook for at least two specific cases where  Facebook has been accused of wrongdoing:

1. ACLU objects to Facebook’s Privacy Settings
2. Facebook Stealing Numbers and Data from your iPhone
In short Facebook has became a spying machine, and Fb is giving all the private information of their users to the Govt. and violating privacy

According to Anonymous:-

Operation Facebook

DATE: November 5, 2011.

TARGET:
https://facebook.com

Press:-

Twitter : https://twitter.com/OP_Facebook
http://piratepad.net/YCPcpwrl09
Irc.Anonops.Li #OpFaceBook

Anonymous Message about #Op-Facebook:-

"...Attention citizens of the world,
We wish to get your attention, hoping you heed the warnings as follows:
Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.
Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria.
Everything you do on Facebook stays on Facebook regardless of your “privacy” settings, and deleting your account is impossible, even if you “delete” your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more “private” is also a delusion. Facebook knows more about you than your family.

http://www.physorg.com/news170614271.html
http://itgrunts.com/2010/10/07/facebook-steals-numbers-and-data-from-your-iphone/

You cannot hide from the reality in which you, the people of the internet, live in. Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you.
The riots are underway. It is not a battle over the future of privacy and publicity. It is a battle for choice and informed consent. It’s unfolding because people are being raped, tickled, molested, and confused into doing things where they don’t understand the consequences. Facebook keeps saying that it gives users choices, but that is completely false. It gives users the illusion of and hides the details away from them “for their own good” while they then make millions off of you. When a service is “free,” it really means they’re making money off of you and your information.
Think for a while and prepare for a day that will go down in history. November 5 2011, #opfacebook . Engaged.
This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

We are anonymous
We are legion
We do not forgive
We do not forget
Expect us..."


Here is the Official Video of Anonymous on #OP-Facebook:- 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#Op Justice El Salvador By Anonymous


Online "hacktivist" group Anonymous has attacked the websites of El Salvador's presidency and government ministries, forcing several to be shut down, officials said Sunday. The group's "Operation Justice El Salvador" has "tried to attack our website to publicize the private information of internal and external users," the economy ministry said in a statement on the hours-long attack on Saturday.
Presidential spokesman David Rivas told reporters that Anonymous threatened several government websites two weeks ago, including that of the presidency, which on Saturday received at least 30 million hits, saturating the system. The site was temporarily "suspended" to stop the cyber attack, Rivas said.
Websites for the legislative assembly, the National Civil Police and the ministries of justice and labor were also targeted. Anonymous has been involved in scores of hacking exploits, including the recent defacing of a website of Syria's Ministry of Defense to protest a bloody crackdown on anti-government protesters.
Hacktivist group ‘Anonymous’ cancelled their Nov. 5th Operation against the Zeta Cartel, but their attacks on Latin American Governments, Police institutions and Ministries persist. Famous Internet hackers group ‘Anonymous’ cancelled their weekend plans to attack Facebook, and expose the government and police who have links of the Zetas cartel, according to statements published in the “Anonymous Iberoamérica” blog.


 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Took Responsibility For Take down Egyptian Government Sites


The hacktivist group Anonymous claimed this week that it took down a dozen Egyptian government websites using distributed denial of service (DDoS) attacks in retaliation for the government’s treatment of protestors. Egyptian protestors have been demonstrating in Cairo, demanding that the military government that took over after the ouster of President Hosni Mubarak move faster on democratic reforms. The Egyptian military police began a crack down on the protectors last weekend. In response, Anonymous said it launched DDoS attacks against government websites, including the website of the president’s office and the bureau for tourism. The hacktivist group took responsibility for the attack on at least one Brazilian operations page, saying the attacks are in response to the treatment of protesters in Egypt.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vodafone - World's Largest Mobile Telecom Company Under Cyber Attack

Vodafone - World's Largest Mobile Telecom Company Under Cyber Attack 

Hackers have targeted the world's largest mobile telecommunications company  Vodafone. A hacker named THA Disastar from The Hackers Army has breached the security of vodafone Germany, Australia, Italy, Portugal, Denmark, Romania, Turkey, and Czech Republic. The hacker has released a pastebin containing all the credentials which he has stolen such as customer login details, Online portal, Broadband service, web-mail and so on. Here are some screen shots submitted by the hacker:




The above images clearly indicating that the hacker had his access on several Vodafone web portal. Not only Vodafone, earlier THA Disastar has hacked the official website of Bharatiya Janata Party (BJP) of Karnataka, President of Guyana. Before that Tha Disastar has hacked and defaced the anonyops.com. It was one of the important site of Hacktivist Anonymous. Not only that he also performed a massive DDoS attack on Hacktivist site and as a result the site was remain offline for a long time. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

VMWare Source Code Was Stolen at The Time of CEIEC Breach

VMWare Source Code Was Stolen at The Time of CEIEC Breach 

In the official blog VMWare, the visualization software company has revealed that a hacker associated with hacktivist calling himself "Hardcore Charlie" has stolen at least one and possibly many more source files for its software - and has begun posting them on line. VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future. The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers, Said by VMWare official. Earlier we covered that Hardcore Charlie claimed to breach China NationalElectronics Import-Export Corporation (CEIEC), based in Beijing, he got inside CEIEC and posted documents ranging from purported U.S. military transport information to internal reports about business matters on several file-sharing sites, but the authenticity of the documents could not be independently confirmed. Hacker Charlie' claims to have found program files for virtualisation software on CEIEC. In a conversation with Kaspersky Lab, the hacker claimed to have 300MB of VMWare source code. 
The hacker also claimed to have cracked cryptographic hashes on the credentials of hundreds of thousands of sina.com email accounts with the help of another hacker, who goes by the name of @Yamatough and who is thought to have been involved in the distribution of documents suggesting that the Indian government had put in monitoring systems for Nokia, RIM and Apple smartphones. The companies all denied the claim, and the documents were later shown to be faked.
VMWare insisted that the code dated back to 2003-04, though it did not say whether that section of the code had been changed since then. "We will continue to provide updates to the VMware community if and when additional information is available," said Iain Mulholland, director of VMware's security response centre in a statement. VMWare didn't indicate whether its own systems had been breached, and seemed to widen the number of potential targets to include commercial partners.  
Like VMWare, a hacker group named The Lords of Dharmaraja has managed to steal the source code of Norton anti-virus, Symantec. There also hacker leaked the source code and hacktivist Anonymous take the responsibility of the entire phenomena





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker 'Raynaldo Rivera' Arrested Over Sony Pictures Hack

LulzSec Hacker 'Raynaldo Rivera' Arrested Over Sony Pictures Hack

Last year hackers have targeted Sony many times.  Hacktivist AnonymousLulzsec have penetrated Sony's PSN network and stolen millions of user personal information. Later Sony was forced to shutdown its entire network & apologized for the whole massacre. Not only PSN, also Sony Online EntertainmentSony Pictures, Several Sony's official website from different countries fallen victim to the hackers.  But in 2012 all the key members of LulzSec, who was mainly responsible for attack on Sony get busted one by one. Among them we can take the name of Jeremy Hammond, Ryan Ackroyd, Ryan Cleary, Jake Davis & so on. In the last move another hacker from LulzSec has been arrested in connection with an attack on Sony Pictures in June last year. A 20-year-old man 'Raynaldo Rivera' surrendered to FBI agents on Tuesday for his alleged hacking of Sony Pictures. If convicted, he could face up to 15 years in prison.
The arrest comes shortly after a judge postponed the sentencing of LulzSec ringleader Hector Xavier Monsegur, known by his nickname "Sabu," for his continued cooperation in the investigation. Monsegur provided information to the FBI, leading to the arrests of one American man and four in the U.K. in March. 
Rivera allegedly used a proxy server to hide his real IP address and used a SQL injection attack against Sony, according the indictment, which was unsealed on Tuesday. The type of attack involves the input of commands into web-based forms to see if the backend database will yield information. Rivera, who went by the online nicknames "neuron," "royal" and "wildicv," allegedly distributed Sony's information to other LulzSec members, who publicized it on the @LulzSec Twitter account, the indictment said. Damages to Sony exceeded US$5,000.
Prosecutors allege Rivera worked with Cody Kretsinger, who was indicted in Sept. 2011 for the same attacks on Sony. Kretsinger allegedly provided the coupon codes along with email addresses and passwords for an extensive data release by LulzSec on June 2, 2011. Kretsinger pleaded guilty in April and is scheduled for sentencing on Oct. 25, according to the FBI.



-Source (BBC, PCW)







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...