5 Govt and 13 Other Website Hacked by Rudr0 (BCA)

Multiple vulnerability found in University of Ghana's website



Multiple vulnerability found in University of Ghana's website By Zero. According to him there are non-persistence XSS vulnerability and also SQL-i vulnerability.

Vulnerable Website:-



Vulnerable link :-

The Hacker also exposed the Database including Admin credentials (User Name & Password Hash) and other users login details.

Database :-


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Willysy Malware Infects More than 6 Million WeSites

 
In less than two weeks, a malware injection that targets e-commerce Web pages has ballooned from 90,000 infected pages to more than 6 million. Malware willysy The malware, called willysy, exploits a vulnerability in a popular online merchant platform, osCommerce, according to Web application security provider Armorize, of San Francisco.
When the company initially reported the injection on July 24, it found 90,000 infected pages. When it took another look at the malware on August 3, it found the injection had spread to some 6.3 million pages.

Although the identity of the perpetrators of the attacks by the malware could not be identified by Armorize, the company did trace the forays to eight IP addresses, all located in the Ukraine.
Armorize explainedthat the attacks exploit three known vulnerabilities in version 2.2 of osCommerce. The exploits allow the attackers to place an invisible frame (iFrame) on the page and then inject malicious code (JavaScript) into the page, where it will infect visitors to the online store.
Once the infection makes it to shopper's computer, it targets vulnerabilities in Java, Adobe Reader, Windows Help Center and Internet Explorer. Although the flaws in those programs targeted by the infection are known and have been patched, the attackers are betting that the user hasn't patched all the programs.
Even the exploitation of osCommerce itself depends on lax patch management by the shopping site, since the holes in the program used by the attackers were patched in version 2.3 of the software released in November of last year. Since that time, two versions of the offering have been released, 2.3.1 and 3.0.1.

According to osCommerce, the open source software is used by some 249,000 store owners, developers, service providers and enthusiasts.
Attacks like the one discovered by Armorize can be especially harmful to small and medium-size businesses (SMB), asserts Frank Kenney, a former Gartner analyst and vice president of Global Strategy at Ipswitch, a file transfer security company in Lexington. Malware willysyWillysy's progress Those companies typically don't have the financial resources of larger firms so they're attracted to open source programs like osCommerce and use off-the-shelf software in their operations. "Whenever you use off-the-shelf software, you have to understand there are data issues and all types of security vulnerabilities that exist," he told
While the makers of off-the-shelf software patch their programs often, he continued, the business still has to invest in the resources to insure that proper patch work is done. "That requires an outlay of capital that SMBs are not willing to deal with or don't have within their margins," he says.
Such lack of diligence can hurt a business in the long run, because security breaches can invite scrutiny from credit card companies, he explained. A credit card company may refuse to allow the business to use its services until it shows a certain level of security compliance that is out of the reach of the business from a financial or time and resource point of view.
That would have dire consequences for an SMB, he maintains. "The ability to process cards is the difference between a small business or a chain of mom-and-pop stores being open today and being closed tomorrow," he says.
 
-News Source (PC World)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

More than 70 Police Websites Hacked in Response to #Op-Topiary (#Antisec)


AntiSec, the hacker group made of members from Anonymous and LulzSec, said Saturday that it has hacked more than 70 law enforcement agency websites in the U.S. in retaliation of recent arrests of alleged AntiSec members in the U.S. and the U.K.
The group, which has previously lodged attacks against law enforcement in Arizona, also said it was able to access 10 gigabytes of emails, credit card details and other sensitive data from the agencies.


And in a move that will infuriate law enforcement further, AntiSec called this cyber attack "ShootingSheriffsSaturday."
"A week after we defaced and destroyed the websites of over 70 law enforcement agencies, we are releasing a massive amount of confidential information that is sure to embarass, discredit and incriminate police officers across the US," AntiSec said in a statement posted on the website PasteBin, which has become a favorite place for the hackers to post the information they've stolen.

"Over 10GB of information was leaked including hundreds of private email spools, password information, address and social security numbers, credit card numbers, snitch information, training files, and more. We hope that not only will dropping this info demonstrate the inherently corrupt nature of law enforcement using their own words, as well as result in possibly humiliation, firings, and possible charges against several officers, but that it will also disrupt and sabotage their ability to communicate and terrorize communities."

Many of the agencies had no immediate comment on the hackings, while others expressed confusion as to what information was hacked.
In Mississippi, the Tunica County Sheriff's office was aware that their website was down, but did not know much beyond that, said Lt. Persundra Jones

“We don’t what’s really going on,” Jones said. “We have no idea.”

In Tishomingo County, sheriff’s officials alerted the FBI and the company that oversees the website, who promptly shut it down, said dispatcher Edric Parish.
AntiSec said in its statement that it was "doing this in solidarity with Topiary and the Anonymous PayPal LOIC defendants as well as all other political prisoners who are facing the gun of the crooked court system. We stand in support of all those who struggle against the injustices of the state and capitalism using whatever tactics are most effective, even if that means breaking their laws in order to expose their corruption.

"You may bust a few of us, but we greatly outnumber you, and you can never stop us from continuing to destroy your systems and leak your data."


The most recent arrest of suspected hackers affiliated with Anonymous and LulzSec, was that of 18-year-old Jake Davis. England's Metropolitan Police Service, better known as Scotland Yard, has said it believes Davis is the "Topiary," a hacker who has acted as a spokesman for the groups.

Davis was released on bail Monday, but a London court ordered that he be prohibited from using the Internet.

"We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information," AntiSec said in its statement. "For too long they have been using and abusing our personal information, spying on us, arresting us, beating us, and thinking that they can get away with oppressing us in secrecy. Well it's retribution time: we want them to experience just a taste of the kind of misery and suffering they inflict upon us on an everyday basis. Let this serve as a warning to would-be snitches and pigs that your leaders can no longer protect you: give up and turn on your masters now before it's too late."
In a bit of a departure from the Arizona-targeted cyber attacks, the law enforcement agencies AntiSec says it hacked were mainly in the central and southern parts of the U.S., including agencies in Arkansas, Kansas, Louisiana, Missouri and Mississippi.

-News Source (LANT)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

8 GB Data of Federal Police Exposed By Lulzsec Brazil (#Antisec)


LulzSec Brazil leaks 8 Gigabyte Data of Federal Police including various Documents and photographs related to Federal Office and so on. They posted those data on their website. For more information and to see those click here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Eaglesindia.com Hacked By by c7 King h3x0r


Jewellery Manufacturers Website Eaglesindia.com Hacked By c7 King h3x0r

Hacked Site:- 


Mirror Link:- 
http://www.zone-h.com/mirro/id​/14590589

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

10GB of Law Enforcement Data Exposed (#AntiSec)

Hackers associated with the "AntiSec" collaboration between Anonymous and recently disbanded hacker group LulzSec have released more than 10GB of information from 70 different law enforcement agencies across the United States. The leakers called it one of their largest data dumps yet, released as retaliation for recent U.S. and U.K. arrests of alleged AntiSec members.
Nestled within the data dump, posted as both a BitTorrent release and posted on sites accessible via the Tor anonymity network, are more than 300 different email accounts from 56 law enforcement Web sites. Details from the ransacked Missouri Sherriff's Association Web site also appear in the release, including user names and passwords as well as users' home addresses, phone numbers, and Social Security numbers–a move that's sure to infuriate law enforcement officials even before they note the actual name of the hackers' release, "Shooting Sheriffs Saturday."

Also found within the release are various police training files, a list of users who have submitted information to an online "anonymous" crime tip system, and various server-related information and login credentials.

"We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information. For too long they have been using and abusing our personal information, spying on us, arresting us, beating us, and thinking that they can get away with oppressing us in secrecy," reads the hackers' Pastebin-posted. "Well it's retribution time: we want them to experience just a taste of the kind of misery and suffering they inflict upon us on an everyday basis."

The hack was allegedly carried out following an initial breach of a server owned by the company Brooks-Jeffrey Marketing, which hosts various sheriff's association sites. Its server was initially taken offline following confirmation of the first attack, but its subsequent relaunch allegedly kept intact the same backdoor methods the hackers users to access the original server. At that point, the hackers went ahead and started defacing the more than 70 different law enforcement agency domains associated with Brooks-Jeffrey Marketing.
"We lol'd as we watched the news reports come in, quoting various Sheriffs who denied that they were ever hacked, that any personal information was stolen, that they did not store snitch info on their servers. Many lulz have been had as we taunted the sheriffs by responding to their denials by tweeting teasers exposing their SSNs, passwords, addresses, and private emails," reads the hackers' manifesto.

The hackers also used stolen credit card information to make donations to the American Civil Liberties Union, the Electronic Frontier Foundation, and the Bradley Manning Support Network, among other organizations.

-News Source (PC Mag)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...