Sign up for FREE daily Updates.

Cambodia Government websites Hacked by NullCrew



The NullCrew have decided to target Military, Education and Governmental systems of the country of Cambodia, After the founder of The Pirate Bay(thepiratebay.se) arrested in cambodia.

"Recently the co-founder of Piratebay was arrested in Cambodia, this seems like the megaupload case." The Hacker Said in the paste.

" As long as the government attempts to censor, then there will be more of this; what happened to 'Freedom.' It is angering, whenever they won't allow us the slightest bit of freedom on the internet, taking all we care for."

"So that is why #OpTPB has come to be, they should have expected it when they did this. Cambodia, we will not stop until you come to your sences.And now, for the leaks!" 

They have started the operation "#OpTPB" by hacking the compromising the database belong to General Department of Taxation Cambodia(tax.gov.kh). They have leaked the user name and password details in the paste. Passwords are in plain text.

The leak also contains the user name ,password data belong to Ministry of Public Works and Transport(mpwt.gov.kh) and Institute Of Standards Cambodia(Isc.gov.kh). 

The have also hacked the Cambodian army and leaked the user name ,email address and hashed password

Broadband ISP Hacked by SOG



Defacer:

Soldier of God [SOG]

Group:

No Groups

Message:

Fuck You

Website & Mirror:


The Pirate Bay hit by DDoS attack


File-sharing website The Pirate Bay (TPB) has been hit by a Distributed Denial of Service (DDoS) attack.
The site has been largely inaccessible for the last 24 hours, and the service is intermittent in the UK.
The Pirate Bay has confirmed the attack on its Facebook page, saying that it did not know who was behind it, although it "had its suspicions".
A provider of DDoS defence systems said that it was unlikely that the attack came from hacking group Anonymous.
"There will be further attacks, but what's significant about this whole story is that people think that it is the Anonymous attacking a site which is typically a type of site that they defend," said Andre Stewart of Corero Network Security.
"It could be the record labels, or a government somewhere that has had enough of not being able to catch The Pirate Bay, it could be just one person who had rented some cloud power from Amazon and is sitting in a cafe, and is able to launch an attack."

Although some users may have attempted to access the site using proxies, TPB itself warned them against doing so.
Illegal file sharing "Use proxies at own risk. Don't login unless you trust the proxy supplier. Don't freak out. You'll get your TPB fix tomorrow," said the site.
TPB allows users to illegally obtain copyrighted songs, films and other content for free.
Copyright holders argue this causes a significant loss in revenue.
However, others say that it is very difficult to assess the impact of downloading on sales.

"If they're losing money and seeing that the government is not being able to stop it, there's a real monetary value reason for them to try and bring it down," said Mr Stewart.
"And if they can do it in the name of Anonymous then it's great for them.
"Equally the governments that protect these industries are frustrated as well because they haven't been able to see it close down, unlike a number of other torrent sites."
Open and free Virgin Media began preventing access to the file-sharing site following a High Court order last week.

Some time later the Virgin Media website suffered a hack attack that many thought was organised to protest against efforts to block access to TPB.
Twitter feeds associated with the Anonymous collective wrote: "Virgin Media - Tango Down #OpTPB".
But TPB criticised Anonymous for the attack, writing on its Facebook page that it did not "encourage these actions".
"We believe in the open and free internets, where anyone can express their views," wrote TPB.
"Even if we strongly disagree with them and even if they hate us. So don't fight them using their ugly methods. DDoS and blocks are both forms of censorship."


OpFreeAssange :Nullcrew hack more websites

The Hacker group NullCrew continue to show their support for Operation Free Assange by breaching into number of high profile sites.

Yesterday, they hacked into the following sites:
  • www.africacollege.leeds.ac.uk
  • data.gov.uk
They have compromised the database from those sites and leaked in separte pastes.  The leak contains database details, email address, password hashes and usernames.

The only statement they posted next to the data dump was a quote from the founder of WikiLeaks: Intelligence agencies keep things secret because they often violate the rule of law or of good behavior.

This isn’t the only website allegedly penetrated by NullCrew in support for Assange. They also claim to have breached lada-auto.ru – a website dedicated to Lada, the trademark vehicle of Russian car manufacturer AutoVAZ.

Meanwhile , a hacker reffered as 0x00x00, who is not affilated with Nullcrew, claimed that he hacked the following sites as part of the OpFreeAssange:
  • www.history.knowsley.gov.uk
  • www.nag.co.uk
  • www.dlink.co.uk
  • www.mcc.ac.uk
  • www.tex.ac.uk
  • www.sanger.ac.uk
  • www.gsfc.nasa.gov
  • www.navy.mil
  • www.washington.edu

Canadian News site, CBC.ca hacked by NullCrew



The Hacker group NullCrew, known for dumping the database of high profile sites, have managed to compromise the database belong to Canada's National News Website.

CBC.ca is Canada's Online Information Source. Comprehensive web site for news, entertainment, sports, business, and a complete guide to CBC-TV, CBC Radio and CBC News Network.

"This hack is not for an operation, or anything else. I contacted them about a vulnerability I discovered on their server. They completely ignored it. I tweeted as a warning, and still nothing."Hacker said in the Pastebin release. "So now in return for their pathetic ignorance, the databases are released."

The leak contains username, hashed passwords and email address. It also contains Database details including database name and list of tables. Hacker specified the SQLi vulnerable link  in the paste.