Showing posts sorted by date for query Chinese hacker. Sort by relevance Show all posts
Showing posts sorted by date for query Chinese hacker. Sort by relevance Show all posts

The Washington Post Server Breached! Chinese Hackers Apprehend For This Cyber Attack

The Washington Post Server Hacked! Suspected That Chinese Hackers Are Behind This Cyber Attack 
Last week the story of Chinese eavesdropping on European ministries and diplomats at G20 summit draws the attention of the entire cyber world and made headlines. Yet again another breathtaking issue came in-front where also China found responsible for security breach that effected The Washington Post - the most widely circulated newspaper published in Washington, D.C. Sources reveled that hackers broke into The Washington Post’s servers and gained access to employee user names and passwordsMandiant, a cyber security contractor that monitors The Washington Post’s networks, said the intrusion was of relatively short duration. The extent of the loss of company data was not immediately clear, still the matter of relief is that the company passwords are stored in encrypted form, hackers in some cases have shown the ability to decode such information. although to avoid any further mishap Washington Post have planned to ask all employees to change their user names and passwords on the assumption that many or all of them may have been compromised. Officials at Washington Post said that they saw no evidence that subscriber information, such as credit cards or home addresses, was accessed by the hackers. Nor was there any sign that the hackers had gained access to The Post’s publishing system, e-mails or sensitive personal information of employees, such as their Social Security numbers. Post officials found that this hack is more-recent than the 2011 one. They also said, began with an intrusion into a server used by The Post’s foreign staff but eventually spread to other company servers before being discovered. “This is an ongoing investigation, but we believe it was a few days at most,” said Post spokeswoman Kris Coratti. 
China not only targeted Washington Post,  If you look at the story of major cyber attacks of this year we will find that the name of China has been involved several times for engaging cyber attacks against several high profile news organization of U.S. including New York TimesNBC and so on. So far Chinese Government have not responded to this issue, also none of Chinese hacker community take the responsibility of this breach. For upcoming updates on this story stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chinese Hackers Eavesdropping European Diplomats Before G20 Summit

Researchers At FireEye Found -Chinese Hackers Snitching  Europeans Before G20 Summit 
Story of cyber espionage by Chinese hackers used to remain one of most highest pick of breakneck. Yet again another breathtaking issue of  eavesdropping by Chinese hackers get spot light, when  California-based renounced computer security firm FireEye Inc have figured out that a group of Chinese hackers eavesdropped on the computers of five European foreign ministries before last September's G20 Summit, which was dominated by the Syrian crisis. From the detailed analysis we came to know that the hackers have infiltrated the ministries' computer networks by sending emails to staff containing tainted files with titles such as "US_military_options_in_Syria," which sells virus fighting technology to companies. Whenever the targeted recipients opened those documents, they loaded malicious code on to their personal computers. Researchers of FireEye said that they were able to monitor the "inner workings" of the main computer server used by the hackers to conduct their reconnaissance and move across compromised systems for about a week in the late August. But suddenly they lost access to the hackers after they moved to another server shortly before the G20 Summit in St. Petersburg, Russia
Though the company has declined in open press to identify the nations whose ministries were hacked, although it said they were all members of the European Union. But FireEye informed the FBI about the whole issue in details. FireEye also confirmed that the hackers where from China, but they did not find evidence which may link those hackers to the Chinese government. Not surprisingly and obviously like earlier the Chinese government has distanced itself from any claim that it might have hacked foreign governments for data. FireEye also successfully monitor several dozen hacking groups operating in China, most of which they suspect of having ties to the government. The firms also suspect the hacking groups of stealing intellectual property for commercial gain. The researchers had been following the hackers behind the Syria-related attack for several years, but this is the first time the group's activities have been publicly documented. The company calls the group "Ke3chang," after the name of one of the files it uses in one of its pieces of malicious software"The theme of the attacks was U.S. military intervention in Syria," said FireEye researcher Nart Villeneuv. 
On reaction Chinese Foreign Ministry spokesman Hong Lei said- "U.S. internet companies are keen on hyping up the so-called hacker threat from China, but they never obtain irrefutable proof, and what so-called evidence they do get is widely doubted by experts. This is neither professional nor responsible," 
While talking in this story of Chinese eavesdropping, I also want to dig some points from decent parts where we all became very habituated of seeing Europe & U.S. countries blaming China for engaging cyber attacks; and China also do the same for accusing U.S. like vice versa. I am reviving your memories of last few years where If you look at the story of major cyber attacks of this year we will find that the name of China has been involved several times for engaging cyber attacks against several high profile websites and organization of U.S. including New York TimesTwitterNBC and so on. And if you refresh our memory then then we will find the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power Grid. Also in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSA. Also in 2011 China was responsible behind the attack on US Chamber of CommerceSatellite System of U.SNortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor MitsubishiJapan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible.  

Before I conclude, I request you to closely look at the above mentioned stories, you will find China majorly responsible for eavesdropping & security breach. On the same side China also been effected by the same way. So in conclusion, we cant put a full stop in this chain of cyber attacks, hackingeavesdropping, as it comes from both end. So this exciting episode will be continued like it does. If you want to stay updated then don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Ambedkar Institute of Telecom Training India (BRBRAITT) Hacked By Hitcher

Ambedkar Institute of Telecom Training India  (BRBRAITT)Hacked By Hitcher

He was noiseless since his last massive attack against Israel, with the banner of #OpIsrael for Muslim Liberation Army. He was mum but not passive, and it shows when well known Pakistani hacker going by the name of "Hitcher" come back again. The name of Hitcher is common to us for defacing high profile websites, his last few high profile hack was HP Training CenterBank of Punjab, Kingfisher AirlinesCentral Statistical Agency of Ethiopia & 100+ Chinese Govt Websites, again ensue the same path. This time the target was the official website of Bharat Ratna Bhim Rao Ambedkar Institute of Telecom Training India (BRBRAITT) also known as India Premier National Level Telecommunication Training Center. As per sources the hacker managed to breach the server security and get administrative access into the BBBRAITT system. He not only hacked and defaced the index page, but also stolen sensitive data like employ details, course curriculum,  student details, several ongoing project information, and few more confidential tidings. Immediately after the hack, webmaster of BBBRAITT noticed the issue and patched those security holes and back doors from which the hacker get in. Also he restored the site to its normal format. But still the deface mirror can be found on an archiving site called Th3Mirror.com, though the reason of this hack is still a mystery. 

Brief About BRBRAITT:- 
BRBRAITT is one of the premier institutes of BSNL India, imparting training in various fields like latest technologies in field of telecommunications, computer networking, accounting, management, providing competency and skills to meet the ever changing needs of esteemed customers. 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Unpatchable Security Hole in PlayStation 3 Leading The "final hack" Also LV0 Cryptographic Keys Revealed

Unpatchable Security Hole in PlayStation 3 Leading The "final hack" Also LV0 Cryptographic Keys Revealed

We all are very much aware that Sony along with its product's were always been a very hot favorite target of hackers. But here there are few twists, so the word 'Hack' will be be the appropriate one to describe of what happened to Sony. According to a report on Eurogamer Sony's PlayStation 3 is facing a new security threat - one it hasn't seen since the system was cracked via the PSJailbreak in 2011. The PS3 has been hacked before, but Sony was able to inhibit the hack with an update to its own firmware. This is much like the history of jailbreaking on Apple's iOS. But the latest PS3 break is being dubbed unpatchable and the final hack. That's because this hack isn't giving you an exploit to use against a programming hole. It's giving you Sony's so-called LV0 (level zero) cryptographic keys
A decryption key that is reported to be circulating on the net is said to remove the final protective barrier on some models of Sony's PlayStation 3 consoles. In the long run, the release of the key will probably allow unsigned software such as homebrew games, Linux distributions, or pirate copies of software to run on some PS3 consoles. Allegedly, the private key can be used to modify and sign the "LV0" (Level 0), for example to disable its security checks. When the PS3 system boots, from version 3.60 of the PS3's firmware, the LV0 is directly launched by the bootloader (bootldr) that is built into the system's hardware – which means that the chain of trust is broken at a very early stage. As Sony won't be able to update the bootloader with a software update, the hacker community considers this the "final hack" of the PS3 in its current forms. Eurogamer says that these keys may not have been released at all if not for a Chinese hacking outfit called "BlueDiskCFW," who gained access to the keys and planned to charge for new custom firmware updates it would create. The original group that created the LV0 had no plans on releasing them, but eventually they were leaked onto the Internet in some limited fashion. Seeing that someone was going to profit on them, the group known as "The Three Tuskateers" decided to release them into the wilds of the Internet. 
In a statement the hacker group says that "You can be sure that if it wouldn't have been for this leak, this key would never have seen the light of day, only the fear of our work being used by others to make money out of it has forced us to release this now," 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chinese Hackers Breached Telvent's Corporate Network & Gained Control of US Power Grid

Chinese Hackers Breached Telvent's Corporate Network & Gained Control of US Power Grid

Telvent - the maker of power-grid control systems and smart meters and whose software and services remotely administers and monitor large sections of the US energy industry has began warning its customers about a sophisticated hacker attack originated from China. Telvent, a division of Schneider Electric, has admitted hackers breached its corporate network, implanted malicious software and lifted sensitive project files. The raid spanned Telvent systems in the US, Canada and Spain, according to a letter sent to the company's customers this month. Criminals can now study the documents for vulnerabilities in the systems, and potentially devise attacks to sabotage nations' electricity distribution networks. It looks like the hackers managed to get past the company firewall and security systems. In letters sent to customers last week, Telvent Canada said the attack happened on September the 10th.
The attackers installed malicious software and stole project files related to one of its core offerings — OASyS SCADA — a product that helps energy firms mesh older IT assets with more advanced “smart grid” technologies. The company said it was disconnecting the usual data links between clients and affected portions of its internal networks. Meanwhile it is looking for virus or malware files. Telvent has cut data links between at-risk portions of its internal network and clients' systems as a precaution while it probes the breach. Police have been called in to investigate the attack. 
In a report The Register said -Dale Peterson, founder and chief of industrial control security specialist Digital Bond, spelled out the kinds of information present in the lifted documents. "Some project files contain the 'recipe' for the operations of a customer, describing calculations and frequencies at which systems run or when they should be turned on or off," He told press. "If you're going to do a sophisticated attack, you get the project file and study it and decide how you want to modify the pieces of the operation. Then you modify the project file and load it [onto a company's control system], and they're not running what they think they're running." 

While talking about US power grid, we would like to remind you that, earlier researcher have warned about several security holes in power which could even allow an attacker to shutdown the entire system. Soon after  this story made public, National Security Agency (NSA) suspected that hacktivist Anonymous may target the Entire U.S. Power Grid. What ever such massacre did not happen, and Anon said they are not interested to hit power industry. 

Chinese Hackers Behind Some Biggest Cyber Espionage:- 
Couple of months ago we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 

The above phenomena are clearly indicating that hackers from China was directly linked and responsible for all those biggest cyber espionage. Still it is not clear that whether these cyber criminals are supported by the Govt. or not!!









SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Issues 'fix it' To Close Internet Explorer 0-day Vulnerability

Microsoft Issues 'fix it' To Close Internet Explorer 0-day Vulnerability 

Last few days the whole cyber world have gone through with so many drama of Internet Explorer's security bug, as researchers have unveiled four active exploits of a zero-day vulnerability in the browser. As expected the software giant Microsoft has released an emergency fix to get rid of these major security issues. Microsoft released a “fix it” tool for a critical security flaw in most versions of Internet Explorer 6, 7, 8 and 9  that hackers have been exploiting to break into Windows systems. The company said it expects to issue an official patch (MS12-063) for the vulnerability on Friday, Sept. 21. "While we have only seen a few attempts to exploit this issue, impacting an extremely limited number of people, we are taking this proactive step to help ensure Internet Explorer customers are protected and able to safely browse online," said Yunsun Wee, director of Microsoft Trustworthy Computing in a statement. The zero-day in IE 6-9 is a use-after-free memory corruption vulnerability, similar to a buffer overflow, that would enable an attacker to remotely execute code on a compromised machine. The original exploit payload dropped the PoisonIvy remote access Trojan (RAT) via a corrupted Flash movie file. The latest payload discovered dropped the PlugX RAT via the same corrupted Flash movie, Blasco said. He also said the new exploits are the work of the Chinese hacker group Nitro, the same group behind a pair of Java zero-day exploits disclosed in August.

Blasco also said the new exploits appear to be targeting defense contractors in the United States and India.
Microsoft recommended several workarounds Tuesday morning before announcing its intention to send out a FixIt.
  • Setting Internet and local Internet security zone settings to high, which would block ActiveX Controls and Active Scripting in both zones
  • Configure IE to prompt the user before running Active Scripting, or disable Active Scripting in both zones
  • Use of Microsoft's Enhanced Mitigation Experience Toolkit provides mitigations as well, and would not impact website usability, as both of the first two options might.
Microsoft also said that IE running on Windows Server 2003, 2008 and 2008R2 runs in a restricted mode that mitigates the vulnerability. Outlook, Outlook Express and Windows Mail also open HTML messages in a restricted zone, mitigating the vulnerabilty but should a user click a link in a message, they could still be vulnerable to exploit.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

HP Training Center Official Website Hacked & Defaced

HP Training Center Official Website Hacked & Defaced 
Official website of Hewlett Packard Training center also known as HP training center get hacked. Here again well-known Pakistani hacker known to as 'Hitcher' from a hacker collective group named Pak Cyber Force (PCF) took responsibility of this hack. His last hack take down the official website of NIOS, and here also he followed the same mechanism & that is in-spite of having full privilege on the HP server, the hacker did not harm the main index. He just uploaded his deface page as shown in the above picture. This hack also compromised three sub-domain of HP among them there are Designjet - Sales Training and Development Center, HP Indigo Training Center & one more. As expected Hitcher has also created deface mirror on Zone-HackThis cyber attack took place yesterday & still the deface page uploaded by the hacker exist on the web-server. Such kind of carelessness or irresponsibility is not at all expected from a company like HP. Hitcher is widely known for defacing high profile websites, his last few high profile hack was Bank of Punjab, Kingfisher AirlinesCentral Statistical Agency of Ethiopia & 100+ Chinese Govt Websites. The hacker's message on the deface page is clearly indicating that the hack was motivated due the cause of Palestine. Though it is not clear that why he targeted HP, because there is no relation between HP and the inhuman torture in Palestine. 

Message of the Hacker:- 
"Free Palestine . . . We will not go down..Freedom is our goal. .// End the Occupation. . . . .
You the Zionist Government of Israel have been murdering thousands and thousands of innocent Palestinian people for years and enough is enough! The land you call Israel is occupied illegally and is not and will never be yours and the fight to free the Palestinian people and their land from your evil clutches will continue! You continue to try and play the victim in all this bloodshed, yet we have all seen and know you are the murderers, suppressors, rapists and terrorists in this bloody war!
You have NO Israeli culture, NO history in Gaza, nor in the West Bank or in Great Palestine. The only history you the Zionist Terrorist Israel are leaving for your future children is of BLOODSHED, TEARS and LOSS OF LIFE and that is not something to be proud of. To call the land you illegally occupy "Israel" is not only misguided, it is tragic and leaves a very foul taste in the mouths of millions of people who stand against you.
Israel your idea of the peace process is surrender or war and we will not surrender! This is not a war against race, religion nor sex, but a fight against the suppression, murders, and rapes of millions of Palestinians that occurs on a daily basis by you the Zionists. 
To the people of Palestine we have not forgotten you, nor will we ever forget you and as long as we are still breathing we will continue to grow stronger and will fight for your freedom!
LONG LIVE PALESTINE.."




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Alleged Anonymous Member Arrested By Hong Kong Police Over Facebook Threat

Alleged Anonymous Member Arrested By Hong Kong Police Over Facebook Threat

This Sunday Hong Kong police had arrested a 21-year-old man after he reportedly said on social networking site Facebook that he would hack several government websites. Police said the man, who was later released on bail, was held on suspicion of "access to a computer with criminal or dishonest intent" after he allegedly threatened to hack seven government websites between June and August this year. It has been found that the he man is a active member of the infamous hacker collective group Anonymous. The group is said to have 20 members in the semi-autonomous Chinese territory, which guarantees civil liberties not seen on the mainland, including freedom of speech. Though the police spokesman declined to confirm his link to Anonymous. The last posting on the "Anonymous HK" Facebook page on July 22 urged authorities to show "respect" to citizens.
It seems that the time is not going good for hacker collective Anonymous. Few days ago key members ofLulzsec and Anon get busted by FBIIt is reported that the arrests were made possible after turning the group’s "senior leader"Hector Xavier Monsegur aka "Sabu", 28, who is believed to be a cooperative witness after the FBI turned him last June. Earlier in this month Interpoll arrested 25 suspected Anonymous hacker as part of Operation Unmask. In February three Greek teenagers have been arrestedfor hacking into the Ministry of Justice website, also in January a 22 year aged student arrested in south-western Poland for allegedly hacking the prime minister's website and local authority said that he was a part of Hactivist Anonymous. We would also like to remind you the very decent past when few hackers from another hacker collective group named TeaMp0isoN get busted by MI6. Later the authority send the leader of TeaMp0isoN  named TriCK behind bars. So after reviewing all the scenario, one summary is coming out and that is, not only Federal Authorities but also Governments from several parts of the world are no longer showing any mercy to hackers. Stay tuned with VOGH for all the cyber security related stories. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Israel Ministry of Finance Unit (Lehava) Hacked By Hitcher

Israel Ministry of Finance Unit (Lehava) Hacked By Hitcher To Protest Against Mr.Badoo's Arrest By FBI

The official website of Governament of Israel's Ministry of Finance Unit (Lehava) get hacked. According to sources a Well-known Pakistani hacker code named Hitcher from a hacker collective group Pak Cyber Force (PCF) was behind this attack. Though the hacker did not change the index page but he managed to gain access on the Lehava's web-server and uploaded his page which is clearly showing the reason of this hack. The hacker has also created a deface mirror on Zone-Hack. We also like to give you reminder that earlier in this year Hitcher also hacked Amitec- one of the top IT innovative company of Israel

Message of the Hacker:- 

"Site is Defaced In Protest of Ali Hassan aka Mr.Badoo Arrested By FBI 
His Chargers was hacking into PC of Andy who create any event of drawing Prophet Muhammad’s(SAW).
He hacked Andy account and remove that event from facebook
His Protest of Hack was Postive Just to Stop That events and His Message was clear That Respect each other and Each other Religion Too He neither Public Andy Data and personal info ..."

Hitcher also vows to engage more cyber attack while saying "This Hack is just A Protest We want Him Free, and Its Just a trailer..". Hitcher is widely known for defacing high profile websites, Here I am mentioning a few of  his activities & high profile hack wasOfficial website of one of KingFisher Airline, United Bank of IndiaIDBI PaisabuilderCentral Statistical Agency of Ethiopia & 100+ Chinese Govt Websites & many more. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Official Website of "Bank of Punjab" (Well-known Pakistani Bank) Hacked By Hitcher

Official Website of "Bank of Punjab" (Well-known Pakistani Bank) Hacked By Hitcher

The official website of Bank of Punjab - a well known Pakistani Bank get hacked. Here also Pakistani hacker code named "Hitcher" took responsibility of this hack. Earlier he had defaced two high profile Indian bank sites and they are United Bank of India and IDBI. This time along with the official website another sub-domain of the Bank get hacked. This attack took place almost 5 days ago but still the hacker has managed to keep his access on the bank server and those two hacked pages are still there. As expected here also Hitcher has created a deface mirror on Zone-H. Hitcher is widely known for defacing high profile websites, his last three high profile hack was Kingfisher Airlines, Central Statistical Agency of Ethiopia & 100+ Chinese Govt Websites.
Not only Bank of Punjab, IDBI & UBI, this year we have seen such attacks hacker collective group named Teamgreyhat has rooted the server of Islami Bank Bangladesh & maintain their access for more than 2 days & another Pakistani calling himself "GiRl-RiD3r-H3x()r" successfully carried out an attack on the official website of Pune Urban Bank



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'The Unknowns' Claimed to Breach NASA, European Space Agency, French & Bahrain Ministry of Defense, US Air Force

'The Unknowns' Claimed to Breach NASA, European Space Agency, French & Bahrain Ministry of Defense & Many More
A new group of hacker collective group calling themselves 'The Unknowns' had claimed to breach the security system of a range of government agencies, organizations & many high profile sites. According to a PasteBin release The Unknowns said that they hacked into ten different organizations and published documents and other data alleged to have originated from the servers. Among them there are NASA - Glenn Research Center, US military, US AIR FORCE, European Space Agency, Thai Royal Navy, Harvard, Renault Company, French ministry of Defense, Bahrain Ministry of Defense and Jordanian Yellow Pages
NASA has confirmed that an attack did take place on 20 April, but noted that no "sensitive or controlled information" was compromised. The ESA also admitted to having suffered an attack, which it said made use of SQL injection. 
The hacker group claims that their mission is not malicious, but rather to help. "Victims, we have released some of your documents and data, we probably harmed you a bit but that's not really our goal because if it was then all of your websites would be completely defaced but we know that within a week or two," said the groups post, "the vulnerabilities we found will be patched and that’s what we're looking for."  In other word they are pretending to be 'White Hat'.
If you dig the history you will find that previously NASA was hit many times by the hackers from different part of the world Such as Spamers targeted NASA, TeaMp0isoN hacked NASA official forum, Chinese Hackers hit NASA satellites, Indian hacker minhal stole secrete  information from NASA, Code Smasher has found CSRF vulnerability in the official website of Virtual Heliospheric Observeatory NASA and so on.
 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Kingfisher Airlines Official Website & 3 Other Domain of Kingfisher Hacked By Hitcher

Kingfisher Airlines Official Website & 3 Other Domain of Kingfisher Hacked By Hitcher 

Official website of one of KingFisher Airline - one of the best airline in India and central Asia get hacked. Well-known Pakistani hacker code named Hitcher from a hacker collective group Pak Cyber Force (PCF) took responsibility of this hack. Not only the official website but also three other domain of KingFisher get hacked. Among them there are kingfisherxpress, kingfisher-travel & kingfishercargo. The hacker has also created a deface mirror on Zone-H. This cyber-attack took place in the evening of 1st May and still the hacker managed to establish his access on the KingFisher web-server. Hitcher is widely known for defacing high profile websites, his last three high profile hack was United Bank of India, IDBI Paisabuilder & Central Statistical Agency of Ethiopia & 100+ Chinese Govt Websites.

Brief About KingFisher & It's Achievement:- 
Kingfisher Airlines Limited is an airline group based in India. Its head office is in Andheri (East), Mumbai and Registered Office in UB City, Bangalore. Kingfisher Airlines, through its parent company United Breweries Group, has a 50% stake in low-cost carrier Kingfisher Red. The airline has been facing financial issues for many years. Best Airline in India and Central Asia’, ‘Best Economy Class Seats’ and ‘Staff Service Excellence Award for airlines in India and Central Asia’ in World Airline Awards,2010. STAR AIRLINE' award by Skytrax for 3rd consecutive year, 2010. India’s Favourite Airline' in HT MARS Consumer Satisfaction Survey , 2009. Best Airline in India and Central Asia', 'Best Cabin Crew-Central Asia' for Kingfisher Airlines and 'Best Low-Cost Airlines in India and Central Asia' for Kingfisher Red services in SKYTRAX World Airline Awards, 2009. Bonus Promotion' (Japan, Pacific, Asia, Australia) and ‘Best Customer Service’ (Japan, Pacific, Asia, Australia) in Freddie Award, 2009. Kingfisher Airlines frequent flyer programme, King Club has won Top Honors at the 21st Annual Freddie Awards in the Japan, Pacific, Asia and Australia region & so on. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Govt Sites, DBM, Radio Network & Universities of Philippine Hacked By Chinese Hackers

Govt Sites, DBM, Radio Network & Universities of Philippine Hacked By Chinese Hackers

Chinese hackers plan to attack more Philippine government websites, according to their discussions on the Internet.  An online forum of Chinese hackers belonging to the "Silic Group" tagged the Philippine Institute of Development Studies (PIDS) and Bulacan provincial government websites that are next in their firing line.
One forum user even posted usernames and passwords of Bulacan provincial government website administrators. The Bulacan website remained intact as of 8 p.m. Wednesday. Its log-in page for administrators has a time-lock security feature that prevents people logging in outside regular office hours. On Wednesday night, a purported hacker from China claiming to be a member of the "Honker Union" also published on Facebook the alleged usernames and passwords of administrators of websites belonging to Radio Mindanao Network (http://www.rmn.ph), the University of the Philippines College of Arts and Letters (http://kal.upd.edu.ph), and the People Management Association of the Philippines (http://www.pmap.org.ph). The website of the Philippine National Police (http://www.pnp.gov.ph) also seemed to be in error  as it showed only a raw index page. However it was not confirmed if the police website has been hacked.
An administrator of the Chinese hackers' forum at bbs.blackbap.org also boasted about "first-hand" details about the attack that crippled the Department of Budget and Management (DBM) website on Wednesday afternoon. The message indicated that those who defaced the DBM website are the same ones who attacked the Vietnamese government's website, gov.vn. The hackers allegedly discussed their attack on the DBM website in a chat hub for several minutes.
Details about the DBM server webshell address, administrator and publisher accounts were posted online. While the Philippine government has yet to publish full details about the DBM attack, the Chinese hackers apparently turned the DBM website into a chat room. The hackers also post racist comments  in  the forum, referring to Filipinos as "maids who are going up against the Chinese government."


-Source (ABS-CBN News)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Trade.Gov.Cn Hacked By Anonymous, Database Dumped

Trade.Gov.Cn Hacked By Anonymous, Database Dumped 

China Unit of hacktivist Anonymous still continuing their China Rampage. Earlier this hacker collective group took responsibility of hacking into thousand of high profile, commercial & Govt websites of China. But the game is yet not over, at least their activity is proving that. In their twitter account Anonymous China tweeted their latest activity and that is as expected another big attack on Chinese cyber space. This time the victim was Trade.Gov.Cn & ec.shandongbusiness.gov.cn financial transaction market of China Govt. In a public note on Pastebay the hacker group leaked the entire database of those said sites which includes credentails like username & passwords hash of more than 750 users, admin details, and many more. In short the full database has been dumped by the hacker group. Several twitter accounts of Anonymous re-twitted about this data breach. Immediately after the hack, authorities sent the site offline for a certain period but now it came back to its normal format. 




 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Central Statistical Agency of Ethiopia & 100+ Chinese Govt Websites Hacked By Hitcher

Central Statistical Agency of Ethiopia & 100+ Chinese Govt Websites Hacked By Hitcher

Not only Anonymous but also a well know hacker from Pakistan Cyber Force (PCF) named Hitcher joined the China rampage. Today he has blown more than one hundred of Chinese Govt. websites. The list of all those hacked sites with deface mirror can be found on a pasie release by the hacker. Not only China Govt but also the official website of Central Statistical Agency of Government of Ethiopia (CSA) get compromised in this attack. The hacker has also created a deface mirror in Zone-Hack. Hitcher is widely known for defacing high profile websites, his last two hack was United Bank of India & IDBI Paisabuilder.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...