Showing posts sorted by date for query cyber-war. Sort by relevance Show all posts
Showing posts sorted by date for query cyber-war. Sort by relevance Show all posts

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Several Twitter Accounts of CBS News (60Minutes, 48Hours & CBSDenver) Hacked

Several Twitter Accounts of CBS News (60Minutes48Hours & CBSDenver) Hacked By Syrian Electronic Army [#twithackery]

Yet again CBS one of the major commercial broadcasting television network of United States faced cyber attack. First it was hacker collective Anonymous who targeted CBS and managed to hack the TV network of CBS in January last year. The attack was done under the banner of Operation Megaupload. And now CBS have fallen victim of what it called twithackery, where hacker managed to gain temporary access of popular twitter accounts and broadcast fake tweets. This Sunday such twithackery targeted and compromised several twitter account of CBS. Infamous hacker community going by the name of Syrian Electronic Army claimed to have hijacked the twitter accounts of CBS, the list of the hijacked accounts include "60 Minutes" and "48 Hours" which is maintained by CBS news program. Later it has been reported that another twitter account @CBSDenver has also been hacked, during this ongoing cyber attack. CBS acknowledged the whole phenomena and later a CBS spokeswoman confirmed that the accounts had been compromised. "PLEASE NOTE: Our Twitter account was compromised earlier today. We are working with Twitter to resolve." - said the CBS spokesman. Another message from CBS said, "A message that was posted earlier to this account was not written or sent by @60Minutes or its staff."

Here is the list of those fake tweets came from the hijacked accounts of CBS:- 
From @60Minutes account we got the following message -
  • "The US government is hiding the real culprit of the Boston bombing"
  • "The US government is sponsoring a coup in Venezuela and a terrorist war in Syria"
  • "Your duty is to protect your nation from the parasites that have taken your government"
  • "Obama wants to destroy the Syrian and American people. We must stop this beast" 

Other messages claimed: "Syrian Electronic Army Was Here via @SyrianCyberArmy" and suggested the action was in response to the suspension of the @Official_SEA account. Tweets sent out on the @48Hours account reportedly included: "General Dempsey calls for #Obama's arrest under new anti-terror laws #48hours" As soon as the issue get spotted, CBS regain those hijacked accounts and immediately deleted those rouge messages. Later the two accounts @60Minutes and @48Hours has been suspended. 
While talking about twitter hacking, widely known as #twithackery; we would like to remind you the following names, WWE champion John CenaStar Rita OraJustin BieberTeyana Taylor,American pop singer KeshaNBC NewsFox News PoliticsUSAToday, Lady Gaga’s Twitter AccountAnders BreivikMahesh Bhatt, Huffington Postthese are the famous names who have fallen victim to twithackery before CBS. 



-Source (BBC & Reuters)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NATO Prepared Tallinn Manual -International Law Applicable to Cyber Warfare

NATO Prepared Tallinn Manual -International Law Applicable to Cyber Warfare

NATO finally published the final version of a document expected to shape cyber warfare policies among Western nations was published last week, clarifying when and how countries can legally conduct online aggression against one another. The International law of Cyber Warfare have been  published by the Cooperative Cyber Defence Centre of Excellence (CCDCOE) set up in Estonia, in 2008, the Tallinn Manual on the International Law Applicable to Cyber Warfare. Spanning 215 pages, the Tallinn Manual makes it clear that a full-scale war can be triggered by network-borne attacks on computer systems and that civilian activists that participate in those are considered legitimate targets. However, the manual specifically rules out state-sponsored attacks on critical civilian infrastructure. Nuclear power plants, hospitals, dams and similar are all out of bounds for cyber war, the manual states.

The Tallinn Manual:-
The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare. The Tallinn Manual pays particular attention to the jus ad bellum, the international law governing the resort to force by States as an instrument of their national policy, and the jus in bello, the international law regulating the conduct of armed conflict (also labelled the law of war, the law of armed conflict, or international humanitarian law).  Related bodies of international law, such as the law of State responsibility and the law of the sea, are dealt within the context of these topics.
The Tallinn Manual is not an official document, but instead an expression of opinions of a group of independent experts acting solely in their personal capacity.  It does not represent the views of the Centre, our Sponsoring Nations, or NATO.  It is also not meant to reflect NATO doctrine.  Nor does it reflect the position of any organization or State represented by observers. 

The Tallinn Manual is available in both paper and electronic copies from Cambridge University Press



-Source (IT News & CCDCOE)










SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

‘Pervasive Vulnerability’ Found in The Robotic Aircraft of Drone Fleet

 ‘Pervasive Vulnerability’ Found in  The Robotic Aircraft of Drone Fleet

Unmanned aerial vehicle (UAV), widely known as a drone has always been gone through with several controversies in case of both defense and cyber security. Yet again several question arises regarding the security system and the control algorithms of drone. According to the Pentagon’s premier science and technology division a a “pervasive vulnerability” have been found in the robotic aircraft of drone. The control algorithms for these crucial machines are written in a fundamentally insecure manner, says Dr. Kathleen Fisher, a Tufts University computer scientist and a program manager at the Defense Advanced Research Projects Agency. There’s simply no systematic way for programmers to check for vulnerabilities as they put together the software that runs our drones, our trucks or our pacemakers.
In our homes and our offices, this weakness is only a medium-sized deal: developers can release a patched version of Safari or Microsoft Word whenever they find a hole; anti-virus and intrusion-detection systems can handle many other threats. But updating the control software on a drone means practically re-certifying the entire aircraft. And those security programs often introduce all sorts of new vulnerabilities. “The traditional approaches to security won’t work,” Fisher tells Danger Room.
Fisher is spearheading a far-flung, $60 million, four-year effort to try to develop a new, secure way of coding and then run that software on a series of drones and ground robots. It’s called High-Assurance Cyber Military Systems, or HACMS. For detailed information about this story click Here

While talking about drone and its security we would like to give you reminder that in 2011 we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. Also in 2012 drone was in controversy where researcher have figured out that drone fleets are vulnerable to GPS spoofing and it can be hijacked by any malicious attacker or terrorist. 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NSA Refused to Disclose Obama's Secret Cyber Security Directive

NSA Refused to Disclose Obama's Secret Cyber Security Directive

The cyber security directive of United States President Barack Obama has been twisted a little as the National Security Agency (NSA) has refused to release details of a secret presidential directive document that would establish a broader set of standards that would guide federal agencies in confronting Cyber threats. Several experts are presuming that the cyber security directive could allow the military and intelligence agencies to operate on the networks of private companies, such as Google and Facebook. According to the last week report by Washington Post, cited several U.S. officials saying that Obama signed off on the secret cyber security order, believed to widely expand NSA’s spying authorities, in mid-October. “The new directive is the most extensive White House effort to date to wrestle with what constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyber war and cyber terrorism,” the report states.  
The Electronic Privacy and Information Center (EPIC), filed a Freedom of Information Act (FOIA) request to make the document public because it said the measure could expand NSA’s Cyber security authority. “Transparency is crucial to the public’s ability to monitor the government’s national security efforts and ensure that federal agencies respect privacy rights and comply with their obligations under the Privacy Act,” said EPIC’s request.
EPIC said that NSA denied the request on Nov. 21 arguing that it doesn’t have to release the document because it is a confidential presidential communication and contains information that is classified “Secret” and “Top Secret” by the agency. NSA said disclosure of the order could “reasonably be expected to cause exceptionally grave damage to the national security.” The agency said EPIC could file an appeal with the NSA/Central Security Service denial and EPIC said it plans to do so. The privacy group said it is litigating similar FOIA requests with NSA, including the release of NSPD 54, a 2008 presidential directive setting out the NSA’s cyber security authority. The group called NSA a “black hole for public information about cyber security” in an official statement to Congress earlier this year. National Security Agency whistle blower William Binney said in Mid July that the U.S. government is secretly gathering information “about virtually every U.S. citizen in the country”, in “a very dangerous process” that violates Americans’ privacy.
Former President George W. Bush signed a presidential order in 2002 allowing the National Security Agency (NSA) to monitor without a warrant the international (and sometimes domestic) telephone calls and e-mail messages of hundreds or thousands of citizens and legal residents inside the United States. The program eventually came to include some purely internal controls -- but no requirement that warrants be obtained from the Foreign Intelligence Surveillance Court as the 4th Amendment to the Constitution and the foreign intelligence surveillance laws require.



-Source (GSN Magazine & Press TV)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"Project Blackstar" Team Ghostshell Leaks 2.5 Million Records From Russian Govt & Individual

"Project Blackstar" Team Ghostshell Leaks 2.5 Million Records From Russian Govt & Individual 

A hacker group calling them selves "Team Ghostshell" who was recently behind the attack several top universities called an open operation declaring war on Russia's cyberspace. The operation is dubbed “Project Blackstar”. In the first phase of the operation  the hacking collective Team Ghostshell posted approximately 2.5 million accounts/records leaked, from governmental, educational, academical, political, law enforcement, telecom, research institutes, medical facilities, large corporations (both national and international branches) in such fields as energy, petroleum, banks, dealerships and many more. The hacker group also claimed to have access "to more russian files than the FSB and we are very much  eager to prove it." - said Ghostshell. The rest of the Pastebin post goes on to call out the Russian government and is littered with references to corruption, capitalism and social injustice. Judging by some of the records released, the Russian Police, along with Novatek, Russia's largest independent natural gas producer, the Alfa Group, an investment consortium and JINR, the country’s Joint Institute for Nuclear Research, all appear to have been implicated in the alleged leak. Some records appear to include individuals’ usernames and passwords while other documents almost read like resumes, complete with individuals’ names, IP addresses, education and job history.
Above I have discussed the last hack by Team Ghostshell where they had published 120,000 records from some of the world’s top universities. That leak, dubbed “Project WestWind,” sought to “raise awareness towards the changes made in today’s education,“ spilling student and faculty email addresses, passwords and IDs. Now this “Project Blackstar” with a leak of 2.5 million records from several Russian cyber space,  again arising a big doubt, that how much secure our cyber world is? 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Several Bangladeshi Govt Sites Along With Uninor Bangladesh & Few College Sites Hacked

Several Bangladeshi Govt Sites Along With Uninor Bangladesh & Few College Sites Hacked By Sen Haxor

After a long time yet again Bangladeshi cyber fence is facing cyber attacks from India. This time a young Indian hacker named Sen Haxor targeted several high profile Bangladeshi websites. Among them there are four Bangladeshi Govt sites which have fallen victim to this cyber attack. Those sites are National Mushroom Development & Extension Centre, Bangladesh Film Development Corporation (BFDC), Govt. Bangla College & Rangpur Zonal Settelment Official Web-portal. Not only Govt website, also the hacker hit  the official website of many Bangladeshi Colleges and defaced the index page. Those colleges are Comilla Victoria Govt. College, Shaikh Burhanuddin Post Graduate College, Ashuganj Sar Karkhana College, CHITTAGONG MODEL SCHOOL & COLLEGE, Birganj College & Panchbari Mahabiddyalay. The story is not over yet, in this phase of cyber attack also penetrated Uninor Bangladesh GPCIC. In a pastebin note the hacker has released the full database, including usernames, password hash & other several login credentials. Though the reason of this hack is not relevant but still in the deface page the hacker represented this hack as a payback of the last Indo-BD cyber war which took place in February this year.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The US military Calls Julian Assange & WikiLeaks 'Enemy of State'


The US military Calls Julian Assange & WikiLeaks 'enemy of state'

The US military has designated Julian Assange and WikiLeaks as enemies of the United States - the same legal category as the al-Qaeda terrorist network and the Taliban insurgency. Declassified US Air Force counter-intelligence documents, released under US freedom-of-information laws, reveal that military personnel who contact WikiLeaks or WikiLeaks supporters may be at risk of being charged with "communicating with the enemy", a military crime that carries a maximum sentence of death. The documents, some originally classified "Secret/NoForn" - not releasable to non-US nationals - record a probe by the air force's Office of Special Investigations into a cyber systems analyst based in Britain who allegedly expressed support for WikiLeaks and attended pro-Assange demonstrations in London. The counter-intelligence investigation focused on whether the analyst, who had a top-secret security clearance and access to the US military's Secret Internet Protocol Router network, had disclosed classified or sensitive information to WikiLeaks supporters, described as an "anti-US and/or anti-military group".
The suspected offence was "communicating with the enemy, 104-D", an article in the US Uniform Code of Military Justice that prohibits military personnel from "communicating, corresponding or holding intercourse with the enemy". The analyst's access to classified information was suspended. However, the investigators closed the case without laying charges. The analyst denied leaking information. Mr Assange remains holed up in Ecuador's embassy in London. He was granted diplomatic asylum on the grounds that if extradited to Sweden to be questioned about sexual assault allegations, he would be at risk of extradition to the US to face espionage or conspiracy charges arising from the leaking of hundreds of thousands of secret US military and diplomatic reports.
US Vice-President Joe Biden labelled Mr Assange a "high-tech terrorist" in December 2010 and US congressional leaders have called for him to be charged with espionage. Sarah Palin and Mike Huckabee - both once involved in presidential campaigns - have both urged that Mr Assange be "hunted down".
Mr Assange's US attorney, Michael Ratner, said the designation of WikiLeaks as an "enemy" had serious implications for the WikiLeaks publisher if he were to be extradited to the US, including possible military detention. US Army private Bradley Manning faces a court martial charged with aiding the enemy - identified as al-Qaeda - by transmitting information that, published by WikiLeaks, became available to the enemy. Mr Ratner said that under US law it would most likely have been considered criminal for the US Air Force analyst to communicate classified material to journalists and publishers, but those journalists and publishers would not have been considered the enemy or prosecuted.
"However, in the FOI documents there is no allegation of any actual communication for publication that would aid an enemy of the United States such as al-Qaeda, nor are there allegations that WikiLeaks published such information," he said.
"Almost the entire set of documents is concerned with the analyst's communications with people close to and supporters of Julian Assange and WikiLeaks, with the worry that she would disclose classified documents to Julian Assange and WikiLeaks. "It appears that Julian Assange and WikiLeaks are the 'enemy'. An enemy is dealt with under the laws of war, which could include killing, capturing, detaining without trial, etc."










SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacked Trinamool Congress Website & Posted A Fake Message

Anonymous Hacked Trinamool Congress Website & Posted A Fake Message

Just few hours before the 66th Independence day of India, the official website of AITMC- All India Trinamul Congress, current ruling party of West-Bengal get hacked and the Archive page which records important announcements made by chief minister of West Bengal & Party Chairman Mamata Banerjee get defaced. Infamous hacker collective group Anonymous took responsibility of this hack. 
One of the hacker announced the hack publicly on twitter while saying- "At last a world leader listens to anonymous and decides to make great changes Mamata Banerjee Confesses : aitmc.org/chairperson_ar… WE LOVE DIDI". As per sources the hacker broke into the TMC's server, gained access on the website and posted a fake announcement :-
“I AM A MAOIST at heart and  always have been, It always pained me to speak and act against the ideology that I myself loved so much. I also appologize to the people whom I have hurt, The artist who tried to speak the truth, the writers who saw the right thing and every and any person who  tried to tell me I was going in the wrong direction, I am at your feet asking you to forgive me for the misguided acts I have done In life,”

Team VOGH took the above screen shot was taken from TMC's website, at the time when it was hacked. 
The hacker group also made the effort of giving a link to a morphed image of Mamata Banerjeeand a link to another document. For privacy reason we can't mention the link here. Trinamool's cyber team removed the offensive post within few minutes. According to the party's spokes man -"TMC website was hacked at 7.30 pm and detected within six minutes by the party's cyber team that works round-the-clock , updating the site every 15 minutes." Also the Party have lodged a complaint, immediately after the mishap. 
This hack is not the very first attack on TMC, earlier in this year (At the time of Indo-BD Cyber-War)  Bangladeshi hackers have hacked and defaced the index page of TMC's official website. We would also like to give you reminder that, Mamata Banerjee is not the first victim, In 2011Pak Hacker named KhantastiC haXor penetrated the official site of Indian Congress and defaced the Profile page of Party President Sonia Gandhi Also few other Pakistan hackers in early 2011 have hacked the official website of All India CongressBharatiya Janata Party (BJP) and so on. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

HP Training Center Official Website Hacked & Defaced

HP Training Center Official Website Hacked & Defaced 
Official website of Hewlett Packard Training center also known as HP training center get hacked. Here again well-known Pakistani hacker known to as 'Hitcher' from a hacker collective group named Pak Cyber Force (PCF) took responsibility of this hack. His last hack take down the official website of NIOS, and here also he followed the same mechanism & that is in-spite of having full privilege on the HP server, the hacker did not harm the main index. He just uploaded his deface page as shown in the above picture. This hack also compromised three sub-domain of HP among them there are Designjet - Sales Training and Development Center, HP Indigo Training Center & one more. As expected Hitcher has also created deface mirror on Zone-HackThis cyber attack took place yesterday & still the deface page uploaded by the hacker exist on the web-server. Such kind of carelessness or irresponsibility is not at all expected from a company like HP. Hitcher is widely known for defacing high profile websites, his last few high profile hack was Bank of Punjab, Kingfisher AirlinesCentral Statistical Agency of Ethiopia & 100+ Chinese Govt Websites. The hacker's message on the deface page is clearly indicating that the hack was motivated due the cause of Palestine. Though it is not clear that why he targeted HP, because there is no relation between HP and the inhuman torture in Palestine. 

Message of the Hacker:- 
"Free Palestine . . . We will not go down..Freedom is our goal. .// End the Occupation. . . . .
You the Zionist Government of Israel have been murdering thousands and thousands of innocent Palestinian people for years and enough is enough! The land you call Israel is occupied illegally and is not and will never be yours and the fight to free the Palestinian people and their land from your evil clutches will continue! You continue to try and play the victim in all this bloodshed, yet we have all seen and know you are the murderers, suppressors, rapists and terrorists in this bloody war!
You have NO Israeli culture, NO history in Gaza, nor in the West Bank or in Great Palestine. The only history you the Zionist Terrorist Israel are leaving for your future children is of BLOODSHED, TEARS and LOSS OF LIFE and that is not something to be proud of. To call the land you illegally occupy "Israel" is not only misguided, it is tragic and leaves a very foul taste in the mouths of millions of people who stand against you.
Israel your idea of the peace process is surrender or war and we will not surrender! This is not a war against race, religion nor sex, but a fight against the suppression, murders, and rapes of millions of Palestinians that occurs on a daily basis by you the Zionists. 
To the people of Palestine we have not forgotten you, nor will we ever forget you and as long as we are still breathing we will continue to grow stronger and will fight for your freedom!
LONG LIVE PALESTINE.."




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Drone Fleets Are Vulnerable to GPS Spoofing & Can Be Hijacked By Terrorist

Drone Fleets Are Vulnerable to GPS Spoofing & Can Be Hijacked By Terrorist

Spying drones have always gone through with several controversies along with a lots of technical & security issues. Yet again a team at the University of Texas has managed to find a vulnerability in drones that allows an attacker to gain control of the unmanned vehicle and change its course. Professor Todd Humphreys and the team spoof GPS receivers in order to take control of the drones
According to an exclusive report of Fox News - A small surveillance drone flies over an Austin stadium, diligently following a series of GPS waypoints that have been programmed into its flight computer. By all appearances, the mission is routine. Suddenly, the drone veers dramatically off course, careering eastward from its intended flight path. A few moments later, it is clear something is seriously wrong as the drone makes a hard right turn, streaking toward the south. Then, as if some phantom has given the drone a self-destruct order, it hurtles toward the ground. Just a few feet from certain catastrophe, a safety pilot with a radio control saves the drone from crashing into the field.

Last year we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. But spoofers are a new problem for GPS-guided drones, allowing hackers to trick navigation systems with false information. Humphreys and the team have designed a device costing less than $1,000 that sends out a GPS signal stronger than the ones coming down from orbiting satellites. At first, the rogue signal mimics the official one in order to trick the drone, and once it’s accepted new commands can be sent to the UAV. US government says its aware of the potential dangers of spoofing, and officials from the FAA and Department of Homeland Security have seen Humphreys’ demonstration first hand. The Department of Homeland Security reportedly has a program in place to try and solve the problem of GPS interference, but it’s aimed at trying to deal with jammed signals, not spoofed ones.


-Source (FOX News, Slashgear)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

U.S. Navy With American Defense Contractor Raytheon Will install Linux on its Drones

U.S. Navy With American Defense Contractor Raytheon Will Install Linux on its Drones

Last year we came to know that a stealthy key-logger has hit the U.S. Drone logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones. Later Iran took responsibility of that cyber attack. So keeping those attack in mind now U.S. govt is enhancing more security, as per resources U.S. Navy has signed a reported $28 million deal with major American defense contractor Raytheon to install the Linux operating system on its vertical take off and landing drones. The U.S. Navy’s contract with Raytheon will call for a Linux transition on the tactical control system software of the MQ-8B Fire Scout. The Navy’s MQ-8B Fire Scout has already been deployed in the Caribbean to detect illegal drug shipments. The Navy reportedly has plans of duplicating the Fire Scout to a fleet of around 168 drones. The Navy also said that the drones has also be fitted with 70mm rockets for special missions.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Greece Under Cyber-Attack, Ministry & Telecom Service Provider Hacked By KHS

Greece Under Cyber-Attack, Ministry & Telecom Service Provider Hacked  By KHS

Now a days Greece is facing several cyber attacks, first it was hacker collective Anonymous who carried denial of service attack on Greece Ministry to bring down Ministry of Justice. Now another infamous hacker group named Kosova Hacker Security (KHS) engaged massive cyber attack on Greek fence. This attack also dubbed "Operation Greek" which causes serious damage for Greek Ministry of Education, Lifelong Learning and Religion, OTE- Greek Telecom Service and so on. The hack on OTE exposed more than 10K user credentials along with the Admin details. All the hacked databases can be found on the official forum of KHS named Cyber-Hell. According to KHS this attack is a counter attack or in other word tit for tat of Greek hackers who hacked few Albanian websites. KHS also vows to engage cyber-war while saying "if Greece don't stop their activity then they will see the worst day in the Internet..."
Earlier this group has carried several cyber attack on Ukraine, Israel and so on






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Worse Than SOPA- CISPA Will Allow Monitoring Any Online Communication (#Censorship)

Worse Than SOPA- CISPA Will Allow Monitoring Any Online Communication #Censorship
In the wake of SOPA and PIPA, there is yet another terrifying bill on the table. The Cyber Intelligence Sharing and Protection Act (or CISPA for short) which is currently being discussed by Congress. The title of this controversial act is H.R. 3523 and it has been dubbed the Cyber Intelligence Sharing and Protection Act. It is feared that CISPA is far worse than SOPA and PIPA in its possible effects on the Internet.
While this paper has been created under the guise of being a necessary weapon in the U.S. war against cyberattacks, the wording of the paper is vague and broad. It is thought that the act could allow Congress to circumvent existing exemptions to online privacy laws and would allow the monitoring and censorship of any user and also stop online communications which they deem disruptive to the government or to private parties. CISPA is described as a “cybersecurity” bill. It proposes to amend the National Security Act of 1947 to allow for greater sharing of “cyber threat intelligence” between the U.S. government and the private sector, or between private companies. The bill defines “cyber threat intelligence” as any information pertaining to vulnerabilities of, or threats to, networks or systems owned and operated by the U.S. government, or U.S. companies; or efforts to “degrade, disrupt, or destroy” such systems or networks; or the theft or “misappropriation” of any private or government information, including intellectual property. CISPA has also been condemned by the Electronic Frontier Foundation, an online advocacy group. The Electronic Frontier Foundation (EFF) adds that CISPA’s definition of “cybersecurity” is so broad that “it leaves the door open to censor any speech that a company believes would ‘degrade the network.’” Moreover, the inclusion of “intellectual property” means that companies and the government would have “new powers to monitor and censor communications for copyright infringement.” According to both CDT and EFF, this means some of the largest corporations in the country, including online service providers like Google, Twitter, Facebook or AT&T could, if pressured, copy confidential information from a user and send this information to the Pentagon, as long as the government believes there is a reason to suspect wrongdoing.
Critics warn that CISPA gives private companies the ability to collect and share information about their customers or users with immunity — meaning we cannot sue them for doing so, and they cannot be charged with any crimes.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bangladeshi Prime Minister's Email-id Hacked By Teamgreyhat

Bangladeshi Prime Minister's Email-id Hacked By Teamgreyhat 

After remaining silent for a certain time hacktivist group Teamgreyhat strikes again. The past records says this hacker group is know for hacking large number of sites but this time they did some thing different. Here the target was Sheikh Hasina, Prime Minister of Bangladesh. Teamgreyhat took responsibility for hacking into the official Email-id of Bangladesh PM (pm@pmo.gov.bd). Also they have claimed to have access to rest of other 73 email-id's of Bangladesh Prime Minister Office. Teamgreyhat have submitted the following screen shots- 

The above screen shots ware taken during the hack (submitted by TGH), which is clearly indicating that the hacker group has successfully breached the Web-mail of Bangladesh Prime Minister office and exported all the emails from the pm@pmo.gov.bd. Due to security issue we are not publishing the password of that above mail id. Earlier this group has taken a major role in the past cyber-war between India & Bangladesh while hacking into Bangladeshi Stock Market, Islami Bank Ltd Bangladesh and few other high profile website of BD. We want to give you reminder that in the time of Islami Bank hacking TGH claimed that they have breached the BD Prime Minister Office(PMO) & BD Parliament Network and gained more than 40 GB sensitive data of BD govt. So it can be expected that time they have stolen the passwords of BD PM. Though Teamgreyhat did not specify the reason of this hack.
Few months ago we have seen such similar hack, that time the victim was Syrian President Bashar Assad. Hacker group Anonymous take responsibility of that hack. After exposing the hacked mails we have also seen that many untold histories came from that which could even lead a modern warfare. Now same things repeated by TGH, so lets see what we will get in future.....




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Islami Bank Bangladesh Hacked By Teamgreyhat (Cyber-War 2.0 Continues)

Islami Bank Bangladesh Hacked By Teamgreyhat (Cyber-War 2.0 Continues)
The second phase of Cyber-War or in other word Cyber-War 2.0 is going worse and worse for Bangladesh. Last Saturday hacktivist Teamgreyhat has hacked the Bangladesh Stock Market official website and their they have also vows to destroy the financial sector of Bangladesh. As expected the hackers keep their promise while hacking into another high profile and important Bangladeshi website. Today TGH confirmed that they have hacked into one of the largest Bank of Bangladesh named Islami Bank Bangladesh Ltd. After this hack we must have to say that 1st Stock market then Bank, this cyber-war 2.0 is causing lots of damages for Bangladesh. According to TGH press release they have claimed that they have rooted the Bank server and also during this hack the official site of The Institute of Chartered Accountants of Bangladesh get defaced.
The press release contains a message to BCA to stop the cyber-war immediately. Also TGH claimed that they have breached the BD Prime Minister Office(PMO) & BD Parliament Network and gained more than 40 GB sensitive data of BD govt.  

Hacked Sites:-

Mirror Link:-

If you dig the history you will come to know that TGH is known for executing mass deferments. Couple of months ago they have hacked 7 Thousand Websites while protesting against ACTA & 12K sites for another cause.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bangladesh Stock Market Hacked By Teamgreyhat (Cyber-War 2.0)

Bangladesh Stock Market Hacked By Teamgreyhat (Cyber-War 2.0)
Yesterday we have said that hackers from Bangladesh has restarted the cyber-war between India & Bangladesh. So far all the attacks are coming from the Bangladeshi side but here we have seen a complete different scenario. Hacktivist Teamgreyhat suddenly take part into this burning issue and as a result they have blown the official website of Bangladesh Stock Market. The hackers have broke into the Stock Market server, deleted all the files and uploaded their deface page. Also they have breached the complete database of BD Stock Market and make that available for download. Not only stock market but also five other valuable Bangladeshi sites (Business, Corporate & Financial) get hacked in this attack. In the official press release TGH vows to destroy many financial sites of Bangladesh. They have also said that they have make their decision to take part in this Cyber-War 2.0 for India. Earlier BD hackers targeted Indian Stock market while performing DDoS attack & this hack from TGH seems to be the counter attack of that attack. No need of much explanation that such kind of attack on highly valuable site like Stock Market will surely effect the financial & banking sector of Bangladesh.

Press Release of TGH:- 
"Greeting World:-
After seeing many drama of Cyber-War between Bangladesh & India, Finally we TGH have decided to stand against #injustice like earlier we have done for #ACTA #censorship. TGH has been requested many times specially by our Indian brothers to stand for India in that cyber-war, at last we have make our decision to stand against the cyber criminals of BD. The world have seen that what kind of damages India have faced by those bd hackers. So its time to make them fell what our beloved and fellow citizen of India has faced. So we TGH are engaging massive cyber attack and we here by declared that #targetbangadesh engaged.
Message to BD hackers:-
While gaining publicity you have done enough damage and now you have to pay for every thing.
............. we promise that BD will face the biggest cyber attack they have ever seen.
We are here for our Indian brothers, and we will keep our promise.
We are TGH
We are Warriors
We are Achilles of Cyber World
Hackers from Bangladesh you should have expected us......"


If you dig the history you will come to know that TGH is known for executing mass deferments. Couple of months ago they have hacked 7 Thousand Websites while protesting against ACTA & 12K sites for another cause.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber-War 2.0!! Bangladeshi Hackers Again Targeting Indian Cyber Fence

Cyber-War 2.0!! Bangladeshi Hackers Again Targeting Indian Cyber Fence 

Last month almost every media was busy while covering the story of Cyber-War between Bangladesh & India. The readers of VOGH get the full coverage of that issue. Earlier attack caused maximum damage (NIC, BSF, Stock Market, Media, Govt Sites, Political Party's Website & many other important & high profile sites) for India because all the attacks are coming from Bangladeshi side. Later hackers from BD stopped the attack and unofficially postponed the cyber-war. In our Magazine we have exposed the untold story of the entire issue. Being a media we did our job to raise awareness and as expected we get maximum support from all the peace lovers from the both countries. 
But now again Bangladesh Cyber Army restarted the so called cyber war, or you can call it Cyber-War 2.0. In your magazine we did maximum criticism of that very issue but it seems BCA either did not have much time to go through that PDF or just continuing the same bull shit stuff for Negative Publicity (The main object of this entire issue). So yet again they have blown more than 55 Indian sites to resend their message to Indian Govt & Indian Hackers Communities. 

VOGH Review:- 
But like earlier we are again standing against this issue, because we know what these hackers are looking for and what are the main object of engaging cyber attack & that is fake publicity stunt or you can say negative publicity. While fulfilling their bloody object they are just harassing and disturbing the cyber space which indeed causing serious problem for common people 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

VOGH Release III | CYb3r-W4r #Unseen & #Uncut -3rd Magazine Of Voice of Greyhat

VOGH Release III | CYb3r-W4r #Unseen & #Uncut 3rd Magazine Of Voice of Greyhat

Cyber-War Cyber-War Cyber-War!!! I am sure that all of you must be feeling boar of hearing this term for so many times. Since last couple of weeks Cyber-War between Bangladesh & India was on the highest node. Not only security experts, hackers but also those who does not belongs to this world also been aware of what was going on. After seeing so many drama we decided to make the scenario  clear in-front of all of you. So VOGH published their third magazine named "VOGH Release III | CYb3r-W4r #Unseen & #Uncut"

VOGH Release III | CYb3r-W4r #Unseen & #Uncut Contents:- 
  • Introduction
  • Brief Of Cyber-War & Hidden Object of It
  • Redirection
  • An Unexpected  End
  • Summary
  • Responsibility Of Media
  • Responsibility Of Government 
  • VOGH Message to Every Hackers Of the World



 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...