Sign up for FREE daily Updates.
Showing posts with label Other Hackers. Show all posts
Showing posts with label Other Hackers. Show all posts

Cambodia Government websites Hacked by NullCrew



The NullCrew have decided to target Military, Education and Governmental systems of the country of Cambodia, After the founder of The Pirate Bay(thepiratebay.se) arrested in cambodia.

"Recently the co-founder of Piratebay was arrested in Cambodia, this seems like the megaupload case." The Hacker Said in the paste.

" As long as the government attempts to censor, then there will be more of this; what happened to 'Freedom.' It is angering, whenever they won't allow us the slightest bit of freedom on the internet, taking all we care for."

"So that is why #OpTPB has come to be, they should have expected it when they did this. Cambodia, we will not stop until you come to your sences.And now, for the leaks!" 

They have started the operation "#OpTPB" by hacking the compromising the database belong to General Department of Taxation Cambodia(tax.gov.kh). They have leaked the user name and password details in the paste. Passwords are in plain text.

The leak also contains the user name ,password data belong to Ministry of Public Works and Transport(mpwt.gov.kh) and Institute Of Standards Cambodia(Isc.gov.kh). 

The have also hacked the Cambodian army and leaked the user name ,email address and hashed password

The Pirate Bay hit by DDoS attack


File-sharing website The Pirate Bay (TPB) has been hit by a Distributed Denial of Service (DDoS) attack.
The site has been largely inaccessible for the last 24 hours, and the service is intermittent in the UK.
The Pirate Bay has confirmed the attack on its Facebook page, saying that it did not know who was behind it, although it "had its suspicions".
A provider of DDoS defence systems said that it was unlikely that the attack came from hacking group Anonymous.
"There will be further attacks, but what's significant about this whole story is that people think that it is the Anonymous attacking a site which is typically a type of site that they defend," said Andre Stewart of Corero Network Security.
"It could be the record labels, or a government somewhere that has had enough of not being able to catch The Pirate Bay, it could be just one person who had rented some cloud power from Amazon and is sitting in a cafe, and is able to launch an attack."

Although some users may have attempted to access the site using proxies, TPB itself warned them against doing so.
Illegal file sharing "Use proxies at own risk. Don't login unless you trust the proxy supplier. Don't freak out. You'll get your TPB fix tomorrow," said the site.
TPB allows users to illegally obtain copyrighted songs, films and other content for free.
Copyright holders argue this causes a significant loss in revenue.
However, others say that it is very difficult to assess the impact of downloading on sales.

"If they're losing money and seeing that the government is not being able to stop it, there's a real monetary value reason for them to try and bring it down," said Mr Stewart.
"And if they can do it in the name of Anonymous then it's great for them.
"Equally the governments that protect these industries are frustrated as well because they haven't been able to see it close down, unlike a number of other torrent sites."
Open and free Virgin Media began preventing access to the file-sharing site following a High Court order last week.

Some time later the Virgin Media website suffered a hack attack that many thought was organised to protest against efforts to block access to TPB.
Twitter feeds associated with the Anonymous collective wrote: "Virgin Media - Tango Down #OpTPB".
But TPB criticised Anonymous for the attack, writing on its Facebook page that it did not "encourage these actions".
"We believe in the open and free internets, where anyone can express their views," wrote TPB.
"Even if we strongly disagree with them and even if they hate us. So don't fight them using their ugly methods. DDoS and blocks are both forms of censorship."


OpFreeAssange :Nullcrew hack more websites

The Hacker group NullCrew continue to show their support for Operation Free Assange by breaching into number of high profile sites.

Yesterday, they hacked into the following sites:
  • www.africacollege.leeds.ac.uk
  • data.gov.uk
They have compromised the database from those sites and leaked in separte pastes.  The leak contains database details, email address, password hashes and usernames.

The only statement they posted next to the data dump was a quote from the founder of WikiLeaks: Intelligence agencies keep things secret because they often violate the rule of law or of good behavior.

This isn’t the only website allegedly penetrated by NullCrew in support for Assange. They also claim to have breached lada-auto.ru – a website dedicated to Lada, the trademark vehicle of Russian car manufacturer AutoVAZ.

Meanwhile , a hacker reffered as 0x00x00, who is not affilated with Nullcrew, claimed that he hacked the following sites as part of the OpFreeAssange:
  • www.history.knowsley.gov.uk
  • www.nag.co.uk
  • www.dlink.co.uk
  • www.mcc.ac.uk
  • www.tex.ac.uk
  • www.sanger.ac.uk
  • www.gsfc.nasa.gov
  • www.navy.mil
  • www.washington.edu

Canadian News site, CBC.ca hacked by NullCrew



The Hacker group NullCrew, known for dumping the database of high profile sites, have managed to compromise the database belong to Canada's National News Website.

CBC.ca is Canada's Online Information Source. Comprehensive web site for news, entertainment, sports, business, and a complete guide to CBC-TV, CBC Radio and CBC News Network.

"This hack is not for an operation, or anything else. I contacted them about a vulnerability I discovered on their server. They completely ignored it. I tweeted as a warning, and still nothing."Hacker said in the Pastebin release. "So now in return for their pathetic ignorance, the databases are released."

The leak contains username, hashed passwords and email address. It also contains Database details including database name and list of tables. Hacker specified the SQLi vulnerable link  in the paste.

#BankOwnage : Bank websites Hacked by the Hacker 0x00x00



In the past few days, The Hacker called as 0x00x00, have been busy in dumping the database belong to high profile websites. Today, he hacked and leaked the database belong to Narayani National Finance(www.nationalbanklimited.com) and Standard Chartered (www.standardchartered.com)

"I am not a member of Anonymous !" The Hacker said in the paste. "Do what ever you want with this i don't care ! "

The paste contains database details ,passwords.The paste also contains two dropbox link that allegedly contains the full database belong to those hacked sites. The Hacker has also tweet a screenshot of the hack which shows the banks back end.

"knowledge is power & security is an illusion " The Hacker said.

The hacker also compromised and leaked the database of norexassociate.co.uk, hand2hand-recruitment.co.uk and bhakkarpolice.com, as part of the operation called "#OpFreeAssange"

Qatar's LNG producer RasGas infected by computer virus



The second biggest liquefied natural gas (LNG) producer , Qatar's RasGas has been infected by unidentified malware that has taken down its website and e-mail servers. On Monday, RasGas identified the presence of malware in the company's office computers.

“Our IT department is facing technical difficulties, we have been affected by an 'unknown virus’, our operational systems onsite and offshore are secure and this does affect nor impact our production as a Ras Laffan Industrial City plant or scheduled cargoes," An official RasGas spokesperson said in a Pipeline Magazine report.

“In response to that we have a specialist RasGas IT team working in collaboration with ICT Qatar to resolve this issue as soon as possible," the spokesperson added.

The attack follow the Shamoon malware attack on on 30,000 machines belonging to Saudi Aramco.It was not clear whether Rasgas has been victim of the same malicious software.

At the time of writing, the site displays the following alert message " "RasGas website is currently being updated.Default template is loading.Please stay tuned"

#OpIsrael : Anonymous Hackers deface Israeli websites



The Anonymous hacker group have defaced a number of Israeli websites as a form of protest against the actions of the country’s government.

The Hackers defaced the main page of falcon.co.il, a website owned by a company that offers surveillance cameras. 

“This is for the loving memory of Rachel Corrie. An Israeli court has ruled in a civil case that the Israel army was not at fault in the bulldozer death of American pro-Palestinian activist Rachel Corrie. Israel must be punished for all the killing on innocent people!! #OpIsrael is here to stay until the Zionist State stops the occupation and the killings,” The defacement message reads.

As part of the Operation Israel, they also hacked Letters For Israel (lettersforisrael.com), a service designed to give pro-Israel advocates the chance to make their voices heard.

On the defaced page, the hackers posted a message for Josh Haste, the site’s founder.

“Dear Josh Hasten, You have been guilty in supporting the Zionist State, by writing pro-zionism articles in New York Times, Washington Post, Boston Globe, Time Magazine, and many others. The Zionist State is not innocent, it is killing innocent people, it’s time for you to know the truth. We have taken your website down,” they wrote.

Another LulzSec hacker arrested over Sony hack

A Second suspected member of the LulzSec hacker group was arrested on charges he took part in an extensive computer breach of Sony Pictures Entertainment, the FBI said.

Raynaldo Rivera, 20-year-old, is accused of being involved in hacks on Sony Pictures in May and June last year, in which thousands of personal details were published online.

Rivera, of Tempe, Arizona – who allegedly used the online nicknames of "neuron", "royal" and "wildciv" – surrendered to police in Phoenix six days after a federal grand jury in Los Angeles produced an indictment charging him with conspiracy and unauthorised impairment of a protected computer.

The indictment, unsealed on Tuesday, accuses Rivera and co-conspirators of stealing information from Sony Corp's Sony Pictures' computer systems in May and June 2011 using an "SQL injection" attack against the studio's website, a technique commonly employed by hackers.

The indictment says that after the break-in occurred, Rivera was part of a team that posted the data onto LulzSec's website and then announced the attack through the group's Twitter account. 

Rivera is now being held in custody in Phoenix. If convicted, he could face up to 15 years in prison.

US spymaster urges hackers to help “secure cyberspace”


LAS VEGAS: US spymaster Keith Alexander on Friday courted hackers at an infamous Def Con gathering rife with software tricksters wary of police and ferociously protective of privacy.

National Security Agency (NSA) director Alexander was the latest, and perhaps the most controversial, federal official to attend the annual hacker conference in Las Vegas to recruit warriors for battles being fought on the Internet.
“I am absolutely impressed with some of the stuff going on here,” Alexander said during a keynote presentation to a packed auditorium.
“In this room is the talent our nation needs to secure cyber space.”
His Def Con visit came after he was quoted by the New York Times as saying that between 2009 and 2011 there was a 17-fold increase in cyber attacks on critical US infrastructure such as power grids and mobile phone networks.
Along with being boss of the NSA, Alexander is an Army general and head of US Cyber Command created to defend against Internet-based attacks.
“My concern is destructive attacks with serious consequences on critical infrastructure (and key government systems),” Alexander said.
He displayed a list of major companies including banks; credit card firms; videogame and car makers, and even computer security outfits, successfully hacked in the past two years.
“There are a lot of companies with tremendous cyber security expertise getting hacked,” Alexander said.
“The reality is that this is the community that who builds many of these tools,” he continued with an apparent reference to software weapons wielded by cyber attackers.
“This community, better than anyone, understands where this is going and what we can do to fix that.” He referred to Def Con as “the world’s best cyber community.” Alexander, who sprinkled humor and personal stories into his talk, displayed a website for NSA job seekers.
“We need great talent,” he said. “We don’t pay as high as some of the others, but we are fun to be around.” Reaction in the audience ranged from stone-faced silence to grumbling that if federal official want hackers to be their friends they should stop arresting them.
“Some will go for it and some won’t,” one hacker said of the potential for peers to be one over to Alexander’s cause.
Alexander did not take questions directly from the audience but did answer queries that Def Con founder and organizer Jeff Moss, whose hacker name is Dark Tangent, received via Twitter or other channels.
First, Moss said, he wanted to know whether the NSA keeps files on everyone and, if so, how he could see his.
Moss has gone on to head security at the agency responsible for the world’s website addresses since starting Def Con as a young hacker 20 years ago.
“Absolutely not,” Alexander said, noting that the humorous question deserved a serious answer. “The people who are saying we are doing that should know better.” Alexander held firm that the Internet defenses could be ramped up without sacrificing privacy or civil liberties. A “perfectly secure” Internet is in the nation’s best interest and would help revive the staggering economy, he argued.
“Look at all the intellectual property we’ve lost over the past decade,” Alexander said. “It’s huge. If we could fix that it would help our economic growth.”

Twitter explains new mystery outage

An image of a screen displaying the micro-blogging site Twitter in London. — AP Photo
An image of a screen displaying the micro-blogging site Twitter in London. — AP Photo
WASHINGTON: A freak double failure in its data centres took Twitter down for around an hour Thursday, leaving millions without updates from friends, celebrities and news providers a day ahead of the Olympics.
“We are sorry,” said Mazen Rawashdeh, Twitter’s vice president of engineering, in a message on the company’s support blog.
“Many of you came to Twitter earlier today expecting, well, Twitter. Instead, between around 8:20 am and 9:00 am Pacific Time, users around the world got zilch from us,” he said.
The glitch was fixed by about 19:25 GMT, according to Rawashdeh, but not before the outage had affected users around the world.
In a blog post, Rawashdeh explained that the blackout was triggered by a data centre system and its backup system failing simultaneously.
“I wish I could say that today’s outage could be explained by the Olympics or even a cascading buy,” he said. “Instead, it was due to this infrastructural double-whammy.”
Service was gradually restored and many users posted messages expressing relief in sarcastic terms.
“Wow. Wasn’t sure I’d survive that @twitter outage. I even took to Facebook. Desperate times call for desperate measures. Thankful it’s back,” professional baseball player Michael Schlact tweeted.
Jason Carlin of Toronto tweeted: “Took time during the Twitter outage to explore some self-improvement. I’ve written two novels, learned Esperanto and knitted a sweater,” he added.
Last month, the service was downed for several hours by what the company described as a “cascading bug,” but the company said this time it had fallen victim to the double data centre failure.
“Data centres are designed to be redundant: when one system fails, as everything does at one time or another, a parallel system takes over,” Rawashdeh said in a message to users.
“What was noteworthy about today’s outage was the coincidental failure of two parallel systems at nearly the same time.
But Rawashdeh promised that “we are investing aggressively in our systems to avoid this situation in the future.”
In its early days, Twitter was notoriously unstable and would display a picture known as the “fail whale” on its home page when it experienced one of its frequent outages.
The service has become more reliable over the past couple of years, however, and down time is now infrequent.
At the Olympics, athletes are expected to share their Twitter handles, and tweet their experiences using the site.
Twitter, which allows its members to post brief comments, links or pictures, claims to have more than 140 million active users, with the largest number being in the United States.
A recent survey found one in seven Americans who go online use Twitter and eight percent do so every day.

Sun journalist arrested in hacking investigation

Sun journalist Rhodri Phillips was arrested today by Scotland Yard detectives investigating computer hacking.

A Sun reporter has been arrested as part of Operation Tuleta  Photo: REUTERS
He was held at his home in north London at 6.30am and is the seventh person to be arrested as part of Operation Tuleta.
A Scotland Yard spokesman said: "Officers from Operation Tuleta, the investigation into criminal breaches of privacy which is being carried out in conjunction with the Metropolitan Police Service phone-hacking inquiries, arrested one man at his home in north London at approximately 6.30 this morning."
He said no more information would be released for "operational reasons".
News International sources suggested that the arrest was linked to an incident which occurred more than a year ago when Mr Phillips was working a night shift at the newspaper.
They claimed that he had taken a call from a member of the public who believed he had found a mobile phone belonging to an MP on a train.
Mr Phillips went to meet the man and established that the phone probably had been lost by an MP but that it was not of interest to the tabloid. On his return to the office, he is said to have left a memo for news editors detailing the incident and according to Sun insiders, this was the basis for his arrest.
Colleagues are understood to be particularly incensed by this arrest as they insist he was simply doing his job and is a "professional, straight down the line reporter".
In an email to staff, News International chief executive Tom Mockridge confirmed that he was "afraid that another of our journalists from the Sun has been arrested this morning".
Operation Tuleta was launched in July last year and is running alongside the probe into phone hacking.
It was launched following claims that emails had been intercepted and computer files were hacked by individuals working on behalf of newspapers.
In February, Deputy Assistant Commissioner Sue Akers told the Leveson Inquiry that officers are probing computer hacking and the 'blagging' of medical records under Operation Tuleta.
So far, 24 people have been arrested as part of Operation Weeting, the phone-hacking inquiry, and 41 as part of Operation Elveden, an investigation into alleged corrupt payments to officials.