Showing posts sorted by date for query CIA. Sort by relevance Show all posts
Showing posts sorted by date for query CIA. Sort by relevance Show all posts

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Facebook Donates $250,000 to University of Alabama at CIA|JFR to Fight Against Cybercrime

Facebook Donates $250,000 to University of Alabama at CIA|JFR to Fight Against Cybercrime 

All of us, who are associated or directly involved in this cyber domain know very well that its almost impossible to stand against the rising cyber crime & cyber criminals. Then the very first question will arise and that is, what is the solution? The answer will be tie-up collaboration, unity in diversity. That means if we stand together and help each other, then definitely we can control cyber crime, not only that but also we can have a safe and secure cyber space. While talking about co-operation and collaboration then a live instance is here for you. It is your favorite social network, Facebook who stand against cyber criminals and donate $250,000 to help fight cyber crime. According to UAB NewsThe Center for Information Assurance and Joint Forensics Research at the University of Alabama at Birmingham has received a $250,000 donation from Facebook in recognition of the center’s role in tracking international criminals behind social-media botnet Koobface as well as other spammers. The donation, which comes from money Facebook has recovered from spammers located around the world, will be used to expand the new CIA|JFR headquarters. 
“As a result of numerous collaborations over the years, Facebook recognizes the center as both a partner in fighting Internet abuse, and as a critical player in developing future experts who will become dedicated cybersecurity professionals,” says Joe Sullivan, chief security officer at Facebook. “The center has earned this gift for their successes in fighting cybercrime and because of the need for formal cybersecurity education to better secure everyone’s data across the world.”  
Here we want to remind our readers that 'Koobface' was the most dangerous malware ever made to infiltrate Facebook made by few Russian hacker. The hackers, known as the Koobface gang, sent Facebook users attractive invitations to watch a funny or sexy video. When the unsuspecting users clicked the link, the message appeared saying that their computer’s Flash software needed updating. The “update” was in fact malware that hijacked the user’s clicks and delivered them to advertisers, making the hackers money -to the tune of over $2 million annually. According to Kaspersky Labs the network of infected computers included between 400,000 and 800,000 PC. Earlier in this year the entire Koobface gang was exposed and the C&C server of Koobface has been stopped prenatally by few German Researchers. 

With this story here we, the entire VOGH Team would like to congratulate the team at the University of Alabama at Birmingham on the donation from Facebook. More power to them and similar experts around the world, helping investigate cybercrime and making the online world a safer place! 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Cleary & Jake Davis Plead Guilty at London Court For Hacking CIA & Pentagon

LulzSec Hacker Ryan Cleary & Jake Davis Plead Guilty at London Court For Hacking CIA & Pentagon

Two British LulzSec hacker Ryan Cleary, 20, and Jake Davis, 19 today admitted hacking into the websites of the CIA and the Pentagon as well as the Serious Organised Crime Squad in the UK. Accoridng to an exclusive report of The Guardian both Jake Davies, also known as "Topiary" and Ryan Cleary, known under the names "Anakin," "hershcel.mcdooenstein", "George hampsterman" and "ni"  have confessed attacks on the Serious Organised Crime Agency (SOCA), National Health Service, News International, Sony, Nintendo, Arizona State police, and other sites in distributed denial-of-service (DDoS) attacks designed to cause the sites to cash. Cleary also confessed to four separate charges including hacking into US Air Force Agency computers at the Pentagon.
Cleary and Davis plotted to carry out the attacks with other unknown members of internet groups Anonymous, Internet Feds, and LulzSec. Other websites targeted by the pair were Westboro Baptist Church, Bethesda, Eve Online, HBGary, HBGary Federal, PBS Inc, and Infragard. Cleary also confessed today to four separate charges, including hacking into US Air Force Agency computers, based at the Pentagon.
Both men appeared in the dock at Southwark Crown Court to enter guilty pleas to a series of charges brought against them.
But both Cleary and Davis denied allegations they posted 'unlawfully obtained confidential computer data' to public websites including LulzSec.com, Pirate Bay, and PasteBin, in order to encourage offences contrary to the Serious Crime Act.
Alleged co-hackers Ryan Ackroyd, 25, and a 17-year-old A-level student, from south-London, deny their involvement in the DDoS attacks and will stand trial on April 8, 2013.








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice

Anonymous Hacker "Havittaja" Bring-down CIA & Department of Justice Website

Hacker from infamous Anonymous claimed to take down the official website of U.S. Department of Justice (DOJ) & Central Intelligence Agency (CIA). Here also hackers followed their older tradition by engaging massive denial of service (DoS) attack to send the target offline. Due to large number of traffic CIA website was inaccessible for 45 mins. A Brazilian hacker code named "Havittaja" took responsibility of this attack by saying saying it was done for the "lulz", which refers to the popular online abbreviation "for laughs".

We have seen similar attack on CIA in last February, there also Anonymous took responsibility of that cyber attack and also claimed that this is yet another biggest denial of service attack of this year. We would also like to refresh your memory while saying not only Anonymous but also a hacker group named "CyberZeist" has revealed some classified information regarding the official website of CIA. He also exposed server details, DNS information, administrator login panel and so on. Even the hacker group leaked certain information about five undercover CIA agent's including real name, age, full postal address, banking details, credit card information, email-id & passwords. If you dig the history we will find that in 2011 Lulzsec hit CIA & SOCA with massive DDoS attack which immediately sent the website offline for a certain period of time.
If you talk about Department of Justice then we need to dig the 1st page of Operation Megaupload where hacktivist shutdown the official website of DOJ & FBI

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hacker Claimed Security Breach in CIA & Exposed Undercover Agent's Details

Hacker Claimed Security Breach in CIA & Exposed Undercover Agent's Details 

An unnamed hacker behind a code name "CyberZeist" has revealed some classified information regarding the official website of Central Intelligence Agency (CIA). He also exposed server details, DNS information, administrator login panel and so on. All the exposure is made available to public in a open pastebin release. Which also contains certain information about five undercover CIA agent's including real name, age, full postal address, banking details, credit card information, email-id & passwords. According to the release of the hacker the mail aim of this breach is stand against online censorship. The hacker also threatened that he will leak more details. Its hard to say whether those exposure are legitimate or not. Still the CIA authority is silent about this breach. We would like to give you reminder that this is not the 1st time earlier in 2011 and 2012 CIA has fallen victim of cyber attack. If you dig the history we will find that in 2011 Lulzsec hit CIA & SOCA with massive DDoS attack which immediately sent the website offline for a certain period of time. Also this year in #Friday rampage hacker collective Anonymous targeted CIA again with DDoS attack.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Sent Back To Prison For Contacting Sabu

LulzSec Hacker Ryan Sent Back To Prison For Contacting Sabu (Violation of His Bail Agreement)

Former Lulzsec hacker Ryan Cleary from Essex, England sent back to jail for violating court's conditions. Few days ago Ryan has been granted bail by Westminster magistrates until a hearing at Southwark Crown Court on 11 May. He has been charged of conspiring with three British teenagers to bring down the websites of the CIA and the UK's Serious Organized Crime Agency. Ryan was also accused of attacks on the NHS and News International, publisher of the Sun, as well as police authorities in the UK and US. Court granted his bail on condition that he does not access or have in his possession any device that could access the Internet. But it has been found that he tried to make contact with none other than LulzSec leader Hector Xavier Monsegur aka "Sabu". That was a direct violation of his bail agreement, which dictated that Cleary was to have no access to the Internet whatsoever. London's Metropolitan Police say they rearrested Cleary on March 5, the day before the FBI revealed Sabu's identity, and that "the party boy of the projects" had been eagerly spilling the beans on his fellow hackers. According to Cleary's lawyer, the teen is being held at Chelmsford Prison north of London, awaiting a court appearance in May. 
Sabu was recently revealed to have betrayed LulzSec members, and associated Anonymous hacktivists, by secretly working for the FBI for many months.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#LulzSec Planned To Back Again On April Fool's Day (#Project Mayhem!)

#LulzSec Planned To Back Again On April Fool's Day (#Project Mayhem!)
We have good news for Hacktivist supporters and parallely bad news for corrupt Govt & Industries. Infamous hacker collective group named Lulzsec or Lulz Security promised to back live again on the day of 1st April. According to a You-Tube video - "Several days ago we decided to swiftly bring back our humble hacking group and set sail towards the Interwebz once again, much to the dismay of corrupt governments and corporations across the planet. It's ridiculous to believe that by arresting the six prime members of LulzSec that you've stopped us. You haven't stopped us, you have merely disrupted the active faction". The group announced that it would officially resume attacks on April 1, 2012. The video continued, "Lulzsec will start targeting governments, corporations, agencies, and quite possibly the people watching this video. We are here for the lulz, the fame, the anarchy, and the people." 
Since last 30 days we have seen many key members of Lulz & Anonymous are randomly getting busted by Federal authorities, so it can be suspected that coming April attack will be a tit for tat.  The announcement was previewed one day prior via the FawkesSecurity Twitter channel in a tweet that read, "Expect something BIG and rather Lulzworthy very soon. CIA, FBI, Interpol, you're all on teh (sic) list." Wednesday, meanwhile, tweets from the same Twitter channel promised that "Anonymous will target national infrastructure" and create a "global financial meltdown" as part of what's been dubbed "Project Mayhem." 
One thing is very unclear and that is the Twitter account AnonOps, which has 302,000 followers, has not mentioned Project Mayhem, Project Facebook, Operation Imperva, Operation Restore, or anything else on FawkesSecurity’s YouTube account. Furthermore, the Twitter account LulzSec is still silent and lulzsecurity.com is still down. So now it depends on you that how you will react this one, may be April Fool joke or may be some thing else. 


 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)
Two days ago an alleged  hacker has appeared in court accused of conspiring with three British teenagers to bring down the websites of the CIA and the UK's Serious Organized Crime Agency. Ryan Ackroyd, 25, appeared at Westminster Magistrates court in London on Friday charged with computer hacking offences for the so-called “hacktivist” group, LulzSec.
Ryan was also accused of attacks on the NHS and News International, publisher of the Sun, as well as police authorities in the UK and US. The Doncaster man is the last of four British males to appear in court in the UK in connection with attacks by LulzSec, a spin-off group linked to the hacking collective Anonymous.
He faces two counts of conspiring with Jake Davis, 18, Ryan Cleary, 19, and a 17-year-old boy, who cannot be named for legal reasons, to do “an unauthorised act with intent to impair or with recklessness as to impair the operation of a computer” between 1 February and 30 September 2011. 
He made no plea and was granted bail by Westminster magistrates until a hearing at Southwark Crown Court on 11 May. Mr Ackroyd is the last of four alleged members of LulzSec to appear in court. District judge Howard Riddle granted him bail until a plea and case management hearing at Southwark crown court on 11 May, on condition that he does not access or have in his possession any device that could access the Internet.
Earlier in 2011 Ryan also faced imprisonment and later released on bail. Court ordered him not to use Internet even Ryan was also banned from seeing his girlfriend alone by the court.  



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sabu Former #LulzSec #Anonymous Leader Working As An Informant For FBI (Key-Members of LulzSec Arrested)

Sabu Former #LulzSec #Anonymous Leader Was Working As An Informant For FBI (Key Members of LulzSec Arrested)
Several members of the LulzSec and Anonymous hacking groups were arrested this morning by the Federal Bureau of Investigations. It is reported that the arrests were made possible after turning the group’s "senior leader", Hector Xavier Monsegur aka "Sabu", 28, who is believed to be a cooperative witness after the FBI turned him last June. Monsegur pled guilty to several charges of computer hacking conspiracy, for which he could receive a maximum of 124 years behind bars. Those arrested today included a member of the AntiSec hacking group who is believed responsible for the massive intrusion at security think tank Stratfor last December.
A law enforcement official in New York confirmed the arrests and said that six hackers belonging to the Anonymous, LulzSec and Antisec groups were nabbed in U.S. and overseas locations. The official described those arrested as "principal members" of Anonymous and LulzSec. The five hackers are identified in the report as Ryan Ackroyd, aka "Kayla" and Jake Davis, aka "Topiary" from London, two residents of Ireland, Darren Martyn, aka "pwnsauce" and Donncha O'Cearrbhail, aka "palladium", and Jeremy Hammond aka "Anarchaos," from Chicago, USA. According to the FBI press release, all but Davis face charges of computer hacking conspiracy and various other charges. Each carries a maximum 10 year prison sentence.
According to Anonymous Twitter feed: "We are Legion. We do not have a leader nor will we ever. LulzSec was a group, but Anonymous is a movement. Groups come and go, ideas remain"
It is unclear what to expect from Anonymous in reaction to the arrests. The hacking group is known for revenge cyber attacks. After 25 Anonymous members were arrested on February 29, the group downed Interpol’s main website. The same thing happened when the CIA website became a victim of Anonymous. The group also downed several large music industry, Department of Justice, FBI and many other federal authorities websites in response to the shutting down of Megaupload and the arrest of its founder Kim Dotcom. 
News of Sabu's arrest prompted several tweets from Anonymous this morning, including one that threatened retaliation. "The way Sabu & gang took control of Anonops.. anonops gonna retaliate," the tweet said.
 

-Source (FOXNews, Computer World)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Take Down CIA- Central Intelligence Agency Website

Anonymous Take Down CIA- Central Intelligence Agency Website  
The official website of CIA- Central Intelligence Agency faced massive cyber attack on the last Friday. Hacktivist Anonymous took responsibility if the cyber attack. At approximately 3:10 p.m. Eastern time one of twitter accounts related to the hackers' group announced "cia.gov DOWN. #UMAD?#Anonymous."  And also claimed that this is yet another biggest denial of service attack of this year. This attack was the part of Anon's traditional #FuckFriday boom. The last Friday Anonymous released sensitive conference call between FBI & Scotland Yard. Earlier for #OpMegaupload they have bring down Federal Authorities, US Govt, Brazil Govt, Ireland's Dept of Finance & Justice, CBS TV Network, UFC.com and many more.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Top 5 DDoS Attacks of 2011, Exclusive Report By Corero Network Security

Corero Network Security (cns:LN), the leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, named its list of 2011's Top 5 DDoS attacks. Corero's findings show an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify "in the cloud," and often go undetected until it is too late. Corero also found an uptick in attacks against corporations by "hactivists" DDoS-ing sites for political and ideological motives, rather than financial gain. Attacks against Mastercard, Visa, Sony, PayPal and the CIA top Corero's list.
"The cat-and-mouse game between IT administrators, criminals and hactivists has intensified in 2011 as the number of application-layer DDoS attacks has exploded. Coupled with an increase in political and ideological hactivism, companies have to be extremely diligent in identifying and combating attempts to disable their websites, steal proprietary information and to deface their web applications, " said Mike Paquette, chief strategy officer, Corero Network Security.

Corero's 2011 Top 5 DDoS Attacks:-

1. Anonymous DDoS Attacks on WikiLeaks "Censors" Visa, MasterCard and PayPal. The most significant DDoS attack so far this year, the WikiLeaks-related DDoS attacks on Visa, MasterCard and PayPal were both Anonymous' "coming out" party, and the first widespread example of what has been dubbed "cyber rioting" on the Internet, with virtual passersby joining in the attack voluntarily.

2. Sony PlayStation Network DDoS. A shocking wake-up call for many gamers, customers and investors, the Sony Playstation Network DDoS attack began a series of cyber attacks and data breaches that damaged Sony financially and hurt its reputation.

3. CIA and SOCA Hit by LulzSec DDoS Attacks. The appearance of LulzSec on the cyber attack scene, highlighted by bold DDoS attacks on the CIA and the U.K. Serious Organised Crime Agency (SOCA), made us wonder if anyone was safe on the Internet.

4. WordPress DDoS. A massive DDoS attack disrupted one of the world's largest blog hosts--some 18 million websites. The huge attack hit the company's data centers with tens of millions of packets per second.

5. Hong Kong Stock Exchange. This DDoS attack had a major impact on the financial world, disrupting stock market trading in Hong Kong. This was a highly leveraged DDoS attack, potentially affecting hundreds of companies and individuals through a single target.

For all the pain and suffering DDoS attacks have caused, there are a number of best practices that companies can implement to reduce their risk. The most effective defense against DDoS attacks requires expert preparation of defensive resources, ongoing vigilance and a rapid, organized response.

-News Source (Corero Network Security)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Lulzsec Member Recursion Might Have to Face 15 Years of Imprisonment

The FBI has arrested a member of the LulzSec hacking group over its attacks on Sony Pictures earlier this year. Cody Kretsinger, who goes by the name ‘Recursion', was arrested during a raid on his home in home in Arizona. Kretsinger has been charged with conspiracy and the unauthorized impairment of a protected computer, and faces a statutory maximum sentence of 15 years in prison.
An FBI statement alleges that Kretsinger was involved in the hack on Sony Pictures, and the distribution of information stolen from the company. The statement said that he posted the stolen information on the LulzSec site, and announced the attack via Twitter. He is also alleged to have erased the hard drive of the computer used to attack Sony, in a bid to avoid detection. Four other raids were conducted looking for members of Anonymous, which has loose affiliations with LulzSec.
LulzSec embarked on a string of high profile attacks between May and July this year, targeting the US Senate, the CIA, the NHS, and Sony, but the group claimed to have disbanded.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Special Offer From Lulzsec: Catch Me If You Can


"Catch Me If You Can" yes you all are right the famous Hollywood  Movie of Leonardo Wilhelm DiCaprio on Social Engineering, one of the Un-patched vulnerability ever.  Now Lulzsec one  of the most wanted hacker group  over the whole spectrum is exactly saying or we can say repeating the same words Catch Me If You Can LulzSec‘s tracks are still under observation by US authorities to get over this catch-me-if-you-can hacking group. Traversing through the hackers, left marks in Scotland Yard, authorities have trapped total of four suspected targets.
The LulzSec is also thought to be behind the Federal LLC (a U.S.-based security company) attack. The operational hacking strategies, used in this attack, were given a pseudonym-“Kayla.”
According to the US law enforcement agencies, 2011 has been entitled the year of hackers and security violation. Series of prestigious security breaches, by Anonymous (The hacking group), included breaches of agricultural company Monsanto and NATO, U.S. military contractor, Booz Allen Hamilton. Whereas the LulzSec group was involved in setting targets to take down, especially U.S. Senate, PBS, the CIA, sites and many more.
Though, searches and efforts were being carried out by the authorities worldwide to fight against this blatant LulzSec group, but still it seems challenging to trace them out. During these searches, sixteen people were eventually arrested by US officials for their cyber attacks on PayPal.
The streak of security breaches continues regardless of whatever efforts are being put by the authorities, it looks like as the group tends to play hide and seek on long term basis. Later on, a law enforcement site belonging to Texas Police Chiefs Association got hit by unusual malicious acts of Anonymous group.
Unlike the better-known Anonymous hacking group, LulzSec cyber attacks are not launched on the basis of political motivation, but the hacking group has strong connections with “antiSec” movement and do consider political reasons as their foundation to hit the specified target. The malicious acts of LulzSec are definitely entertaining them at one side, but a big loss of sensitive information on other.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DigiNotar Certificate Venerability Patched on Firefox 6.0.2



Firefox 6.0.2 has just come out, adding more protection to that provided by Firefox 6.0.1, which was necessitated by the mess caused by disgraced Dutch web security company DigiNotar.
Firefox 6.0.1 fixed Mozilla Foundation Security Advisory 2011-34, which simply pulled everything to do with DigiNotar from its list of trusted certificates. Loosely speaking, any certificate signed by DigitNotar, or any certificate signed by someone with a certificate signed by DigiNotar, and soad infinitum, was blown out of the water.
Any website with a certificate bought through DigiNotar therefore become untrusted at once. As Mozilla quite bluntly explained in the 6.0.1 update, "sites using certificates issued by DigiNotar will need to seek another certificate vendor." And that's how it should be. A Certificate Authority isn't supposed to make mistakes of this sort - not at all, let alone to this extent.
However, Firefox 6.0.1 exempted from its blockade any certificates signed by the Dutch State itself using its STAAT DER NEDERLANDEN ROOT CA signing certificate. Although tainted by association with DigiNotar, the Dutch public service was apparently convinced that none of the certificates it had issued were affected by any signing irregularities at DigiNotar.
It turned out that the Dutch authorities had not one, but two, Certificate Authorities of its own, and its second root certificate - imaginatively named STAAT DER NEDELANDEN ROOT CA - G2 was not exempted in Firefox 6.0.1. This was reported as a bug, and Mozilla set about adding an additional exemption for certificates signed by this CA. This would have reduced the impact of the Firefox certificate blockade on the web services provided by the Dutch authorities.
In the interim, however, the Dutch government abandoned trust in any of its own certificates, so the Firefox bugfix changed from "exempt the government CA we left out last time" to "remove the exemption for the government CA we exempted last time."
Let's see whether this fiasco causes the Dutch authorities to reconsider modern public service buzzwords such as "cloud" and "outsourcing"!
This sort of step - vigorously disowning everything tainted by DigiNotar - is aggressive but, in my opinion, necessary. Getting into a certification relationship with company X is like buying shares in company X. If the price goes down, all shareholders lose out simultaneously. If the company goes down, you go down with it.  
Brief About DigiNotar :- 
DigiNotar is the former Certificate Authority - or so-called "authority" - which managed to issue more than 500 bogus digital certificates in the name of major web properties such as Facebook, Twitter, Microsoft and Google; in the name of intelligence agencies such as the Mossad and the CIA; and even, it seems, in the name of other certifying authorities.

To Download Firefox 6.0.2 Click Here

-News Source (Naked Security & Mozilla) 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Suspected LulzSec and Anonymous Members Got Busted

Four men have been arrested in separate parts of the UK by police investigating the hacker groups Anonymous and LulzSec. The suspects - from Doncaster, Warminster, Northampton and London - are being questioned by Scotland Yard's e-Crime unit. Their arrests are part of a wider operation involving UK law enforcement and the FBI. At the same time, 14 suspected members of Anonymous appeared in a US court.
Authorities around the world have been rounding up suspects following a wave of attacks by both groups on major corporations and government institutions.
Amazon, PayPal, the CIA, US Senate and the UK's Serious Organised Crime Agency have all suffered either intrusions or denial of service attacks, designed to take their websites offline.


Mass arrests:-

In the latest round of British arrests, police detained 20-year-old Christopher Weatherhead from Northampton and 26-year-old Ashley Rhodes from Kennington, near London. The pair are due to appear at Westminster Magistrates Court on 7 September. Detectives also arrested a 24-year-old man from Doncaster, and a 20-year-old from Wiltshire for conspiring to commit offences under the Computer Misuse Act 1990. In the United States, a mass court appearance saw 14 suspected Anonymous members appear before a judge in San Jose, California. All of them denied being involved in a denial of service attack on PayPal's website in December 2010. Anonymous had publicly declared its intent to target both PayPal and Amazon for, what the group perceived as, their complicity in isolating whistle blowing website Wikileaks. Following the leaking of confidential US State Department memos, PayPal stopped processing donations to Wikileaks, while Amazon kicked the site off its web hosting service.

-News Source (BBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Judge Nicholas Loraine-Smith : Ryan 'LulzSec Hacker' is Banned From seeing His Girlfriend Alone

On the face of it, teenager Ryan Cleary appears the archetypal computer geek who retreated from the real world into a digital one. When he was charged with hacking into the website of the Serious Organized Crime Agency, observers branded him a recluse who needed to 'get a girlfriend'. But he was already dating Amy Chapman, 19, - and now a judge has refused his request to see her alone. The Aspergers sufferer is said to be a key member of the computer hacking network LulzSec, which has been blamed for attacks on the Serious Organised Crime Agency, the CIA, Sony and News International. He is alleged to have controlled a 'botnet' of up to half a million compromised computers which he used to launch 'denial of service' attacks against websites. He was charged in June and bail conditions imposed in court stipulate that he can only leave his home address with a parent.
Addressing London's Southwark Crown Court, his defence barrister Ben Cooper asked for this to be changed so Cleary could see Miss Chapman without his parents being present.

Refusing the application, Judge Nicholas Loraine-Smith said: 'I will not consider making a variation until the police have interviewed her and that they are satisfied that she is responsible enough to take on the duty.’ Cleary and fellow alleged LulzSec member Jake Davis, 18, were not required to attend the hearing. Davis is said to have operated from his bedroom in the Shetland Islands and used the online name Topiary.
The judge issued a stark warning to both defendants to comply with their bail conditions as he fixed their plea and case management hearing for January 27, 2012. 'First of all bail has to be on the same stringent terms for both of these defendants and I reiterate, as I did to one of them who has appeared before me, that if they breach any of these conditions they can be arrested and brought before the court and almost certainly remanded in custody,' he said.
Cleary, of South Beech Avenue, Wickford, Essex, is charged with five offences under the Computer Misuse and Criminal Law Acts.
He is alleged to have taken part in a denial of service attack - which cripple websites by overwhelming them with requests for data – that briefly brought down SOCA's site.
Cleary is also accused of involvement in two similar attacks on the websites of both the International Federation of the Phonographic Industry and its British counterpart on November 28 and October 29 respectively. A further charge alleges that he 'made, adapted, supplied or offered to supply' access to a 'botnet' - a network of computers, hijacked without their owners' knowledge - for use in the attacks.
Each of the three charges relating to DoS attacks carry a maximum jail sentence of 10 years, while the botnet charge could result in up to two years imprisonment. Davis, of Hoofields, Lerwick, Shetland, is alleged to have played a leading role in LulzSec, a group that was said to have been disbanded after being linked to attacks on a number of high-profile sites.
He is charged with gaining unauthorized access to a computer system, encouraging or assisting offences and two counts of conspiracy to commit offences.
He also faces a charge of conspiring to carry out a distributed denial of service attack - where a website is flooded with traffic to make it crash - on the Serious and Organised Crime Agency website.

-News Source (Mail Online)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NSA (National Security Agency) is Searching For Good Hackers

 
The National Security Agency has a challenge for hackers who think they’re hot stuff: Prove it by working on the “hardest problems on Earth.”
Computer hacker skills are in great demand in the U.S. government to fight the cyberwars that pose a growing national security threat — and they are in short supply.

For that reason an alphabet soup of federal agencies — DOD, DHS, NASA, NSA — are descending on Las Vegas this week for Defcon, an annual hacker convention where the $150 entrance fee is cash only — no registration, no credit cards, no names taken. Attendance is expected to top 10,000.
The NSA is among the keen suitors. The spy agency plays offence and defence in the cyberwars. It conducts electronic eavesdropping on adversaries, and it protects U.S. computer networks that hold super-secret material — a prime target for America’s enemies.

“Today it’s cyberwarriors that we’re looking for, not rocket scientists,” said Richard “Dickie” George, technical director of the NSA’s Information Assurance Directorate, the agency’s cyber-defense side.

“That’s the race that we’re in today. And we need the best and brightest to be ready to take on this cyberwarrior status,” he told Reuters in an interview.
The NSA is hiring about 1,500 people in the fiscal year, which ends Sept. 30, and another 1,500 next year, most of them cybersecurity experts. With a workforce of about 30,000, the Fort Meade-based NSA dwarfs other intelligence agencies, including the CIA.
It also engages in cyber-spying and other offensive operations, something it rarely, if ever, discusses publicly.
But at Defcon, the NSA and other “Feds” will be competing with corporations looking for hacking talent.
The NSA needs cybersecurity experts to harden networks, defend them with updates, do “penetration testing” to find security holes and watch for signs of cyberattacks.
The NSA is expanding its fold of hackers, but George said there is a shortage of those skills. “We are straining to hire the people that we need.”


It might seem to be an odd-couple fit — strait-laced government types with their rules and missions trying to recruit hackers who by definition want to defy authorities.
George said the NSA is an environment where the hacker mind-set fits with “a critical mass of people that are just like them.”
But what about culture rifts?
“When I walk down the hall there are people that I see every day and I never know what color their hair’s going to be,” George said. “And it’s a bonus if they’re wearing shoes. We’ve been in some sense a collection of geeks for a long, long time.”
The agency has long been known for its brilliant, but sometimes eccentric, mathematicians and linguists.
Jeff Moss, a hacker known as Dark Tangent, knows something about bridging the two worlds. He founded Defcon and the companion Black Hat conference for security professionals and is now a member of the Department of Homeland Security’s Advisory Council, which advises the government on cybersecurity.
“They need people with the hacker skill set, hacker mind-set. It’s not like you go to a hacker university and get blessed with a badge that says you’re a hacker. It’s a self-appointed label — you think like one or you don’t,” Moss told Reuters.

-News Source (Washington Post)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Personal Details of Sun Newspaper Readers Hacked

 
Personal details of Sun newspaper readers - including Miss Scotland applicants - have been stolen by hackers in the latest online security breach.
Britain's biggest selling daily has sent out e-mails warning that information, including addresses, dates of birth and phone numbers, have been accessed. But it added: "No financial or password information was compromised."
News Group Newspapers, which also published the News of the World until it closed last month, said the breach took place on 18 to 19 July, at about the time hackers created a link from the Sun's website to a spoof page that said company owner Rupert Murdoch had been found dead in his garden.
Hacking group LulzSec claimed to be behind that breach but has been silent since alleged spokesman Jake Davis, 18, from Shetland, was arrested on 28 July. Davis faces a string of charges relating to the hacking of organizations such as Sony, the CIA and the UK's Serious Organised Crime Agency, allegedly carried out by LulzSec and another group, Anonymous.
However, a Twitter user, Batteye, has claimed responsibility for taking the Sun readers' details, denied being part of either LulzSec or Anonymous and said the theft took place before 18 July.
Some of the information, including a Scottish students' poll and biographies of Miss Scotland applicants, then appeared on the website Pastebin.
One Miss Scotland entrant said: "I'm not happy at all. I'm kind of worried - because that's everything about me.

"(This data] should have been locked up. This was last year's, so they didn't need to keep my details."
The Batteye post said it was an attempt to expose those who could not be trusted with personal information.

The statement on Pastebin said: "We will begin today by presenting to you various files obtained from the Sun, a company within the News Corp group.
"We will continue, then, by exposing the world for what it is; a less than perfect place where we cannot trust those who we ask to protect our information."
 
On Twitter, Batteye posted a message saying: "OK - Anon and @lulzsec may have carried out their own attack, with defacements, emails, and whatnot. This is different."

The hacking of the Sun's website follows hacking by sister newspaper the News of the World of celebrities, politicians, war widows and victims of crime, including murdered schoolgirl Milly Dowler.
The so-called "hacktivist" code deployed by the likes of LulzSec, combines mischief-making or irony with the aggressive targeting of corporations or large organizations they believe are guilty of wrongdoing.

-News Source (Scotsman)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

14 Guys Arrested By FBI in Operation Targeting Anonymous


The FBI has conducted more than a dozen raids and made more than a dozen arrests across the United States in connection with the Anonymous computer hacking investigation.
The officials described the sweep as a "major" law enforcement operation and say there have been 14 arrests nationwide.
FBI agents conducted raids at four New York residences as well as locations in California, New Jersey and Florida Tuesday in connection with the investigation.
Agents seized computers and computer accessories under search warrants at four homes of suspected hackers in Baldwin and Merrick both on Long island, in Brooklyn and the Bronx. The allegations are that the network of hackers allegedly carried out distributed denial of service attacks on numerous victims including corporations and their websites.
The amorphous, loosely organized group of hackers sympathetic to WikiLeaks has claimed responsibility for numerous attacks against corporate and government websites around the world. The news comes as Anonymous claimed a cyberattack that shut down the website of Rupert Murdoch's Times newspaper.

In addition, Anonymous has been linked to cyber attacks at the CIA, Sony, Fox News, the Arizona Department of Corrections and a well-known consulting firm, Booz Allen Hamilton, among others.

The group is implicated in denial-of-service attacks, in which large amounts of traffic are directed to a website, overloading it and, in effect, shutting it down.
The FBI in New York refused to confirm Tuesday's actions involved Anonymous. "These search warrants are being executed in connection with an ongoing FBI investigation," said FBI spokesman Peter Donald.


-News Source (CBS, CNN)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...