An Anonymous Member Took Responsibility of Cyberattack on Wikileaks


A Twitter user who claims affiliation to the infamous Anonymous hacktivist collective has claimed responsibility for launching denial of service attacks that floored WikiLeaks on Tuesday night. The attack against the whistle-blowing site occurred at the same time as less high-profile assaults against Pastebin and 4Chan, the anarchic image board and birthplace of Anonymous.
The assaults were reportedly field trials for a new JavaScript-based DDoS tool, dubbed RefRef, designed to exploit SQL server flaws on targeted websites. RefRef is the successor to the notorious LOIC attack tool, which discloses users' IP address by default, as many arrested hacktivists now know only too well.


"As we returned from our days of hibernation, we have noticed that some may have took claim of developing #RefRef. We have seem the blatantly fake www.RefRef.org, and some more accounts that have taken claim to #RefRef – They are simply not true.
RefRef will be released to the public on September 17th. 2011, and any code you may have stumbled upon is strictly false. It is JavaScript, not Perl.
And to prove the fact that #RefRef is still in the works, we tested it again, not on (@Pastebin) – sorry we still owe you for that one, but on (@WikiLeaks) www.WikiLeaks.org . This was a #RefRef test, and again, it worked flawlessly."

Anonymous began with attacks against the Church of Scientology three years ago, but only gained mainstream fame when it launched denial of service attacks in support of WikiLeaks and against financial service firms that shut down accounts maintained by the whistle-blowing websites.
A Twitter account (@AnonCMD) linked to an Anonymous activist refers to a "personal vendetta against WikiLeaks" adding that "we are sorry we took you down. We are even"

-News Source (The Register)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Railway Website of Srilanka is SQL-i Vulnerable (DB Hacked By Zero)

The official website of Srilankan Railway railway.gov.lk is vulnerable to SQL-i said Zero. He also hacked into the database and exposed secretes information like DB name, DB Table, admin details & other online user details.


Vulnerable Website:- 
http://www.railway.gov.lk/

To see the hacked DB click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Judge Nicholas Loraine-Smith : Ryan 'LulzSec Hacker' is Banned From seeing His Girlfriend Alone

On the face of it, teenager Ryan Cleary appears the archetypal computer geek who retreated from the real world into a digital one. When he was charged with hacking into the website of the Serious Organized Crime Agency, observers branded him a recluse who needed to 'get a girlfriend'. But he was already dating Amy Chapman, 19, - and now a judge has refused his request to see her alone. The Aspergers sufferer is said to be a key member of the computer hacking network LulzSec, which has been blamed for attacks on the Serious Organised Crime Agency, the CIA, Sony and News International. He is alleged to have controlled a 'botnet' of up to half a million compromised computers which he used to launch 'denial of service' attacks against websites. He was charged in June and bail conditions imposed in court stipulate that he can only leave his home address with a parent.
Addressing London's Southwark Crown Court, his defence barrister Ben Cooper asked for this to be changed so Cleary could see Miss Chapman without his parents being present.

Refusing the application, Judge Nicholas Loraine-Smith said: 'I will not consider making a variation until the police have interviewed her and that they are satisfied that she is responsible enough to take on the duty.’ Cleary and fellow alleged LulzSec member Jake Davis, 18, were not required to attend the hearing. Davis is said to have operated from his bedroom in the Shetland Islands and used the online name Topiary.
The judge issued a stark warning to both defendants to comply with their bail conditions as he fixed their plea and case management hearing for January 27, 2012. 'First of all bail has to be on the same stringent terms for both of these defendants and I reiterate, as I did to one of them who has appeared before me, that if they breach any of these conditions they can be arrested and brought before the court and almost certainly remanded in custody,' he said.
Cleary, of South Beech Avenue, Wickford, Essex, is charged with five offences under the Computer Misuse and Criminal Law Acts.
He is alleged to have taken part in a denial of service attack - which cripple websites by overwhelming them with requests for data – that briefly brought down SOCA's site.
Cleary is also accused of involvement in two similar attacks on the websites of both the International Federation of the Phonographic Industry and its British counterpart on November 28 and October 29 respectively. A further charge alleges that he 'made, adapted, supplied or offered to supply' access to a 'botnet' - a network of computers, hijacked without their owners' knowledge - for use in the attacks.
Each of the three charges relating to DoS attacks carry a maximum jail sentence of 10 years, while the botnet charge could result in up to two years imprisonment. Davis, of Hoofields, Lerwick, Shetland, is alleged to have played a leading role in LulzSec, a group that was said to have been disbanded after being linked to attacks on a number of high-profile sites.
He is charged with gaining unauthorized access to a computer system, encouraging or assisting offences and two counts of conspiracy to commit offences.
He also faces a charge of conspiring to carry out a distributed denial of service attack - where a website is flooded with traffic to make it crash - on the Serious and Organised Crime Agency website.

-News Source (Mail Online)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Quadrant Televentures Ltd. (Aka HFCL Infotel) Media Centre Hacked By Hitcher


The official website of Quadrant Televentures Limited of India (Aka HFCL Infotel) Media Centre Hacked By Hitcher

Hacked Site:-
http://billview.infotelconnect.com/aspnet_client/hitcher.html

Mirror Link:-
http://k0-ka.in/attack/?id=38996

Company Profile:- 

Quadrant Televentures Limited operates in the Telephone communications, exc. radio sector. Quadrant Televentures Limited, formerly HFCL Infotel Limited, is a Unified Access Services Licensee in Punjab Telecom Circle of India It provides voice telephony, both wireline and fixed wireless, code division multiple access (CDMA) and global system for mobile communications (GSM) based mobiles, Internet services, broadband data services and a range of value added service namely, centrex, leased lines, virtual path number (VPNs), voice mail, video conferencing 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyberattack On Wikileaks Website


The Wikileaks website was yesterday hit by a cyberattack, as it continued with the release of tens of thousands of secret State Department cables. The company warned on its Twitter feed that the site was unavailable because of a DDoS attack. It remained down for some three hours; the site was back around eight hours ago for most, although some users say they are still experiencing problems.
"WikiLeaks.org still down for some. You will need to wait 10 minutes or so until DNS cache timeout. Until then, http://wikileaks.lu/ etc," it says on its Twitter feed. Nobody appears to have claimed responsibility for the attack. It follows a statement from the State Department criticizing WikiLeaks for its latest release of cables, and claiming it's a threat to the personal safety of a number of individuals.
"The United States strongly condemns any illegal disclosure of classified information," said State Department spokeswoman Victoria Nuland.
"In addition to damaging our diplomatic efforts, it puts individuals’ security at risk, threatens our national security, and undermines our effort to work with countries to solve shared problems."
over the last week, WikiLeaks has published over 125,000 State department cables, which the New York Times claimed contain hidden within them the names of sources who had asked for protection. This is "Totally false that any WikiLeaks sources have been exposed or will be exposed. NYT drooling, senile, and evil," says Wikileaks. it says all releases were vetted to remove any names prior to release.


-News Source (TG-Daily, Wikileaks)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Red Entertainment Pvt. Ltd. Hacked & Defaced By ZHC


The official website of Red Entertainment Pvt. Ltd. a leading Artist management company is based in Mumbai (India) with an international presence in Australia hacked and defaced by ZHC Dropper Gen to spread message.

Hacked Site:-
http://redentertainment.in/


Mirror Link:-
http://k0-ka.in/attack/?id=38928

Message:- 

"Free Kashmir .. Freedom is our goal..// End the Occupation. . . .

This institutionalised impunity with which the killings of civilians by military and police forces in Jammu and Kashmir continues should be a source of shame for India which propagates to be a democracy!

Kashmir does not want militarized governance - STOP killing children, raping women and imprisoning the men! They just want freedom! Freedom from the evil of the Indian Military!

You will never kill the Kashmiri spirit and remember one thing India; Ghandi himself said - Freedom is never dear at any price. It is the breath of life. What would a man not pay for living?

Everyday 100s of innocent people are abused, raped and even killed in kashmir by the indian army, a third of the deaths are children, - we dont want war, take back your men, your tanks and your guns and go back to where you came from, all we ask is for freedom, you can kill us but you cant kill us all, we shall not give up, giving up is not an option.

who are the real soldiers? the childs holding stones or the Army men holding guns?"

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Star Wars Galaxies Fan Site Hacked (21,000 Email-id & 23,000 Passwords Stolen)


A Star Wars Galaxies fan site got hacked today and thieves stole 21,000 email addresses and 23,000 passwords. And judging from an analysis of the passwords, most of them were weak. The site SWGalaxies.net is a fan site owned by LFNetwork, an independently owned network of LucasArts fan sites. Hackers from the group ObSec, a small hacking collective with apparent sympathies for the LulzSec and AntiSec hacktivist groups, broke into the site’s security and posted the addresses and passwords on the web. While a compromised forum login isn’t itself a big deal, the threat from this kind of smaller breach is that it can lead to further identity theft that could be devastating for individuals — particularly if they’re reusing the same passwords at other, more critical websites.
Jeff Moeller, editor of LFNetwork, said that the site that got hacked is not actively maintained any more. The fan site targets males 18 to 34 years old, and evidently none of the other UGO or IGN sites were targeted.

According to the identifier Report:-

“It’s unfortunate,” said Todd Feinman, chief executive of Identity Finder, in an interview. “It must be so frustrating for someone to see their passwords online, given the amount of online sign-ups we have to do.”

Of the 23,389 passwords stolen, 71 percent were weak. Only 13 percent of the passwords were strong. The average password length was 7.6 characters. About 4.3 percent of the passwords were less than 5 characters, and only 4.7 percent of the passwords were more than 10 characters long.
Hacking a game web site password isn’t too big a deal. But the problem is that users often reuse their passwords on more important sites, like online banks. Studies show that 50 percent of passwords are reused.
Feinman said, “Passwords are a digital identity and password reuse is a serious problem that could lead toward identity fraud.”
One of the users had a password that was 42 characters long. That person took trouble to protect himself or herself. But since the web site stored the passwords in an unencrypted format, the password is out there for everyone to see now.

-News Source (Games Beat & Star Galaxy)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...