Syrian Ministry of Defence Hacked & Defaced By Anonymous (#Op-Syria)


Famous Hacker group Anonymous declared #Op-Syria. They hacked and defaced the official website of  Syrian Ministry of Defence

To see the post on pastebin click here

To join the IRC chat room of #Op-Syria cheek the following link:-
http://irc.lc/AnonOps/opsyria

Anon released a video to give message about #Op-Syria:-



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Websites Hacked by SeeKeR (Official Pak Cyber Army)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

5 Govt and 13 Other Website Hacked by Rudr0 (BCA)

Multiple vulnerability found in University of Ghana's website



Multiple vulnerability found in University of Ghana's website By Zero. According to him there are non-persistence XSS vulnerability and also SQL-i vulnerability.

Vulnerable Website:-



Vulnerable link :-

The Hacker also exposed the Database including Admin credentials (User Name & Password Hash) and other users login details.

Database :-


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Willysy Malware Infects More than 6 Million WeSites

 
In less than two weeks, a malware injection that targets e-commerce Web pages has ballooned from 90,000 infected pages to more than 6 million. Malware willysy The malware, called willysy, exploits a vulnerability in a popular online merchant platform, osCommerce, according to Web application security provider Armorize, of San Francisco.
When the company initially reported the injection on July 24, it found 90,000 infected pages. When it took another look at the malware on August 3, it found the injection had spread to some 6.3 million pages.

Although the identity of the perpetrators of the attacks by the malware could not be identified by Armorize, the company did trace the forays to eight IP addresses, all located in the Ukraine.
Armorize explainedthat the attacks exploit three known vulnerabilities in version 2.2 of osCommerce. The exploits allow the attackers to place an invisible frame (iFrame) on the page and then inject malicious code (JavaScript) into the page, where it will infect visitors to the online store.
Once the infection makes it to shopper's computer, it targets vulnerabilities in Java, Adobe Reader, Windows Help Center and Internet Explorer. Although the flaws in those programs targeted by the infection are known and have been patched, the attackers are betting that the user hasn't patched all the programs.
Even the exploitation of osCommerce itself depends on lax patch management by the shopping site, since the holes in the program used by the attackers were patched in version 2.3 of the software released in November of last year. Since that time, two versions of the offering have been released, 2.3.1 and 3.0.1.

According to osCommerce, the open source software is used by some 249,000 store owners, developers, service providers and enthusiasts.
Attacks like the one discovered by Armorize can be especially harmful to small and medium-size businesses (SMB), asserts Frank Kenney, a former Gartner analyst and vice president of Global Strategy at Ipswitch, a file transfer security company in Lexington. Malware willysyWillysy's progress Those companies typically don't have the financial resources of larger firms so they're attracted to open source programs like osCommerce and use off-the-shelf software in their operations. "Whenever you use off-the-shelf software, you have to understand there are data issues and all types of security vulnerabilities that exist," he told
While the makers of off-the-shelf software patch their programs often, he continued, the business still has to invest in the resources to insure that proper patch work is done. "That requires an outlay of capital that SMBs are not willing to deal with or don't have within their margins," he says.
Such lack of diligence can hurt a business in the long run, because security breaches can invite scrutiny from credit card companies, he explained. A credit card company may refuse to allow the business to use its services until it shows a certain level of security compliance that is out of the reach of the business from a financial or time and resource point of view.
That would have dire consequences for an SMB, he maintains. "The ability to process cards is the difference between a small business or a chain of mom-and-pop stores being open today and being closed tomorrow," he says.
 
-News Source (PC World)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

More than 70 Police Websites Hacked in Response to #Op-Topiary (#Antisec)


AntiSec, the hacker group made of members from Anonymous and LulzSec, said Saturday that it has hacked more than 70 law enforcement agency websites in the U.S. in retaliation of recent arrests of alleged AntiSec members in the U.S. and the U.K.
The group, which has previously lodged attacks against law enforcement in Arizona, also said it was able to access 10 gigabytes of emails, credit card details and other sensitive data from the agencies.


And in a move that will infuriate law enforcement further, AntiSec called this cyber attack "ShootingSheriffsSaturday."
"A week after we defaced and destroyed the websites of over 70 law enforcement agencies, we are releasing a massive amount of confidential information that is sure to embarass, discredit and incriminate police officers across the US," AntiSec said in a statement posted on the website PasteBin, which has become a favorite place for the hackers to post the information they've stolen.

"Over 10GB of information was leaked including hundreds of private email spools, password information, address and social security numbers, credit card numbers, snitch information, training files, and more. We hope that not only will dropping this info demonstrate the inherently corrupt nature of law enforcement using their own words, as well as result in possibly humiliation, firings, and possible charges against several officers, but that it will also disrupt and sabotage their ability to communicate and terrorize communities."

Many of the agencies had no immediate comment on the hackings, while others expressed confusion as to what information was hacked.
In Mississippi, the Tunica County Sheriff's office was aware that their website was down, but did not know much beyond that, said Lt. Persundra Jones

“We don’t what’s really going on,” Jones said. “We have no idea.”

In Tishomingo County, sheriff’s officials alerted the FBI and the company that oversees the website, who promptly shut it down, said dispatcher Edric Parish.
AntiSec said in its statement that it was "doing this in solidarity with Topiary and the Anonymous PayPal LOIC defendants as well as all other political prisoners who are facing the gun of the crooked court system. We stand in support of all those who struggle against the injustices of the state and capitalism using whatever tactics are most effective, even if that means breaking their laws in order to expose their corruption.

"You may bust a few of us, but we greatly outnumber you, and you can never stop us from continuing to destroy your systems and leak your data."


The most recent arrest of suspected hackers affiliated with Anonymous and LulzSec, was that of 18-year-old Jake Davis. England's Metropolitan Police Service, better known as Scotland Yard, has said it believes Davis is the "Topiary," a hacker who has acted as a spokesman for the groups.

Davis was released on bail Monday, but a London court ordered that he be prohibited from using the Internet.

"We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information," AntiSec said in its statement. "For too long they have been using and abusing our personal information, spying on us, arresting us, beating us, and thinking that they can get away with oppressing us in secrecy. Well it's retribution time: we want them to experience just a taste of the kind of misery and suffering they inflict upon us on an everyday basis. Let this serve as a warning to would-be snitches and pigs that your leaders can no longer protect you: give up and turn on your masters now before it's too late."
In a bit of a departure from the Arizona-targeted cyber attacks, the law enforcement agencies AntiSec says it hacked were mainly in the central and southern parts of the U.S., including agencies in Arkansas, Kansas, Louisiana, Missouri and Mississippi.

-News Source (LANT)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

8 GB Data of Federal Police Exposed By Lulzsec Brazil (#Antisec)


LulzSec Brazil leaks 8 Gigabyte Data of Federal Police including various Documents and photographs related to Federal Office and so on. They posted those data on their website. For more information and to see those click here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...