Anonymous Leak Trumps “Private” Data

Donald Trump is listed as one of the favourites for winning the run for president this year and while some are behind him others are strongly against his actions. With violence erupting at his rally’s and his claims about “closing up the internet“, some are worried about the steps he may take if he gets into the seat of power. Some of those people are leaders of companies like Apple, Alphabet and even Tesla, it would even seem that Anonymous aren’t too keen on the guy as they leak Trumps “private” data online in an act dox the presidential candidate.

Doxxing is the act of releasing someone’s private data online, often reserved for celebrities and those who then go on and SWAT streamers. As part of their ongoing operation against Donald Trumps presidential campaign, OpWhiteRose, Anonymous have leaked personal information about the presidential candidate, including phone numbers, addresses and even his social security number. Included in the release are details of Trumps personal agents and legal representatives, a move that is sure to attract attention (either positive or negative).

This seems to be the start of something bigger with Anonymous declaring “total war” on the presidential candidate while promising future attacks in April. In early March, the group released voicemail messages from back in 2012 which showed several media groups supporting the billionaire.

With a large group like Anonymous asking for support from everyone who is willing in front of a computer, the group seems to be pushing hard against the candidate who has not only had his details revealed but also had Trump Towers website taken down, alongside a petition within the UK to ban Trump’s entry after his continuous use of “hate speech”.

With the operation seeming to only gain momentum and big actions promised in April, the next stage from Anonymous could see even more damaging information revealed and handicaps placed on Trump’s digital platform for the presidency.

Hacker Releases 17.8GB of Data From Turkish Police Server

A hacker going by the online alias ROR[RG] has released a large amount of data that belonged to a Turkish National Police database and is thought to contain large amounts of sensitive private information. ROR[RG] is aligned with the Anonymous hacktivist group and has leaked the data that was supposedly stolen from Turkish General Directorate of Security (EGM) onto a number of peer-to-peer sites for anyone to download and examine.

The data was released through The Cthulu website, which has been a host of a number of leaks by members of Anonymous in the past, including a serious hack against a US Police union last month. A statement released with the data explains that the data was taken from the EGM and that “the source has had persistent access to various parts of the Turkish Government infrastructure for the past 2 years.” It went on to explain that “in light of various government abuses in the past few months, has decided to take action against corruption by releasing this.”

Based on examination of the files in the leak, they appear to originate from a MySQL database, which Reddit confirms. A number of users on the world news subreddit (including some Turkish posters) loaded up the leaked database, finding that it was from the MERNIS system and contained a directory of an enormous amount of Turkish citizens, including ID numbers and full addresses. Exactly how much of the Turkish population this data covers is currently unknown, but this looks to be a disastrous breach for the Turkish government.

It is worrying for the information security of the Turkish government that such a leak was allowed to take place. Not just this, but the fact that the hacker had supposedly had continuous access to government systems for at least two years prior to the leak. The potential consequences of this leak are huge too, as it provides a treasure trove of personal data for criminals to use. Hopefully, the Turkish government will have an answer for this leak, however, it may be too-little-too-late for those whose personal data is already in the public domain.

Nissan’s Main Websites Knocked Offline by Anonymous

Anonymous have struck once again, the target this time: car manufacturer Nissan. Two of Nissan’s main websites were affected by the attack, with their global and Japanese sites being suspended after a barrage of traffic was received by both sites. While both of those sites remain offline, both the US and European sites remain online.

The basis for this attack is part of another of Anonymous’ operations, OpKillingBay, addressing Japan’s advocacy of whaling and the killing of hundreds of whales every year by the country. This operation has been indiscriminate in its attack on Japanese corporations on Twitter, with the #OpKillingBay being full of tweets telling people not to buy Japanese products such as cars and citing their attacks as punishment for their crimes. Nissan has stated that they have no view on Japanese whaling activities.

The attack on Nissan’s sites is not the first cyberattack made to protest whaling. Japanese Prime Minister Shinzo Abe’s website was taken down last month with an Anonymous-affiliated hacktivist claiming responsibility for the attack. The targets are not limited to Japan either, as in November a number of government websites in Iceland, including the prime minister’s and those of a number of ministries were hit.

A member of Anonymous claiming responsibility for the attack on Nissan stated that they were attacking large corporations in Japan as it is the best way to raise awareness for the issue, with the widespread censorship of it amongst Japanese domestic news outlets. They did mention that they wished no harm to Nissan’s customer or system data.

Whaling may be a major issue, with the harm that it does to the environment and the fact that the Japanese persistence on the matter being in contradiction with international law, but whether the correct way to protest it is cyberattacks is another matter. Anonymous is hardly a group to do things by half-measures though, so we could expect to see attacks on other Japanese departments or corporations in the near future until Japan addresses the issue.

Anonymous Claims They Are Responsible for Crippling Turkey

Anonymous has made recent news with taking part in and claiming hacks against several large groups, their latest campaign being targeted against ISIS (now more commonly known as ISIL or Daesh), with splinter groups even supporting the FBI with information. Now it would seem that they are not only directly attacking the group but also those that might support it.

According to reports from Radware and a claim from their own twitter stating that they had been part of the an operation that took down some of Turkey’s websites.

The group claims that they are targeting ISIS due to Erdogan’s support of ISIS and directly funding them by purchasing oil from the group.

With several servers working with peaks of 200 GBPS the attack is stated to have left more than 400,000 websites down across turkey and internet traffic throughout the country intermittent at best.

The attack was so bad that eventually all traffic to the country was cut off in an attempt to shut down the attack, however, the attacks was still going on several days later.

The claims are considered strong with Anonymous later posting links to a news site claiming that a telephone found on an ISIS commander contained messages from Turkish Intelligence Services.

One thing can be said for sure, though, Anonymous are known for conducting large-scale cyber attacks and organising something like this would not be out of the ordinary for them.

France Looks to Ban Tor and Public Wi-Fi

In the wake of the Paris terror attacks, French police has submitted proposals to ban anonymous web browser Tor and block Wi-Fi networks in public places to President Francois Hollande (pictured), according to French newspaper Le Monde (via Business Insider). La Monde has acquired documents that show the French government is taking the proposal very seriously and it could be included in France’s new anti-terrorism bill, which could come into effect as early as January.

According to Vice Motherboard, French authorities want “to block or forbid communications of the Tor network” and “Forbid free and shared wi-fi connections” when a state of emergency is declared, similar to mobile phone networks being taken down during such a time.

If France does introduce a ban on the Tor browser, it has two options with which to enforce it: a legal ban, which would outlaw its use at risk of prosecution, and a technological ban, which would require the installation of a China-esque national firewall that blocks Tor entry nodes. The latter is sure to worry free speech and civil liberties activists.

The recently imprisoned Silk Road creator, Ross Ulbricht, operated using a combination of Tor and public Wi-Fi in an effort to make himself more difficult to track and monitor.

Anonymous Claims CloudFlare Protects Pro-ISIS Sites

Anonymous started a new offensive against ISIS following the terrible attacks on Paris and while we all like that part, it’s hard for me to take them serious in any way. They surely have a few talented people with skills and connections in their group, but for the most part, their skills go as far as pressing a button in a pre-built application in order to launch DDoS attacks on a specific target.

We’ve recently learned that their offensive isn’t going all that good and now they’ve come out and accused CloudFlare of protecting pro-ISIS websites. CloudFlare makes software which prevents denial of service attacks which is the preferred method of attack from the Anonymous group, so this doesn’t come as a big surprise. Terrorists might live with a stone-age mentality, but they do know how to use modern technology. CloudFlare faced similar accusation from the group back in 2013 when they launched an offensive against Al-Qaeda websites.

CloudFlare naturally defends itself against the accusation and as they say, it wouldn’t be a good business model for them. Groups like that will most likely pay with stolen credit card credentials and that is not good for a business. The company also stated that they would cooperate with any law enforcement agency when presented with a legal warrant or court order regarding any of their customers. So maybe Anonymous should forward their evidence to those instances instead of whining on social media about a normal service used by thousands of websites and that works as intended.

Anonymous’ “War” Against ISIS Isn’t Going Well

Following the attacks on Paris by the self-proclaimed Islamic State (ISIS), online activist collective Anonymous declared war on ISIS/IS/Daesh (for the fourth time in 18 months, by my count). However, Operation ISIS – which is targeting ISIS’ online presence on Twitter and Telegram – has so far been a bust, with many of the 20,000 Twitter accounts taken down by Anonymous entirely unrelated to the Islamic State.

The Twitter accounts alleged to be associated with the Islamic State were posted to pastebin, with the majority of them now down. But a blog post by hacker th3j35t3r, a vocal critic of Anonymous and its methods, claims on his Jester’s Court blog that a “comedy of errors” led Anonymous to taking down accounts with no affiliation to ISIS as part of a publicity stunt, which was then seemingly confirmed in a report by The Daily Dot.

The @OpParisOfficial Twitter account even admitted as such in a now-deleted tweet (courtesy of Ars Technica):

On top of that, the FBI said of a supposed proposed attack on US soil by ISIS – a WWE event in Atlanta, Georgia last night – that “we do not have specific or credible information of an attack at this time.”

While Anonymous’ most famous previous declaration of war against ISIS came after the Charlie Hebdo attacks in Paris in January this year, it did so again two months later, and even the previous year, following an IS attack in Baghdad. At this rate, Anonymous declares war on ISIS at an average of around every six months, so we should “expect” them again around April next year.

Major ISIS Messaging Forum Taken Down by Anonymous

It seems that Anonymous’ recent pledge of action against ISIS on the online front was honored, as in the wake of the attacks on Paris, the infamous mask-wearing hacktivists have taken down ISIS’ main forum, one of the central hubs of communication used by the terrorist group.

For a time now Anonymous have been bringing the fight to ISIS online, taking down over 5000 ISIS-associated Twitter accounts as well as hitting websites distributing the extremist propaganda. Quilliam Foundation researcher Rachel Bryson, who specializes in Islamic State messaging, admits that while the takedown will affect ISIS’ communication systems, the long-term effects are small. And even if all of ISIS’ digital systems were taken down my Anonymous, ISIS would simply rebuild them again. Hopefully, the material posted on the site, such as guides on how to plan and perpetrate terrorist attacks will be lost however.

The risk with attacking ISIS’ online presence, is that it risks forcing them to resort to methods harder to uncover and track in order to avoid the attacks of Anonymous and others. The results include driving ISIS to move their operations to the dark web, which is only accessible by connecting through the computer software Tor and other similar programs. The use encrypted messaging, such as WhatsApp or Telegram, are also increasing in popularity with ISIS, the latter of which recently suspended 78 public channels potentially promoting terrorism. Despite this, there are likely countless private chats that are used by the group. Bryson put credence to this, stating “We keep seeing them migrating across different platforms, I don’t think by shutting down a current means of communication will mean the Islamic State fails. It’s not key to defeating them.”

Regardless of their long-term effectiveness, I appreciate the efforts of the hacktivists taking action against the threat of terrorists, and even if the fight can’t simply be won on the cyber-front, if their attacks make ISIS less capable of committing even one more attack, it will be worthwhile.

Anonymous Splinter Cell Supplies FBI With Hacked ISIS Information

Earlier today we could report that Anonymous offensive against the ISIS had taken down over 5000 twitter accounts among other things, something that seems insufficient and somewhat low for what the group usually does. Their recent campaign was only really started after the horrific attack on Paris, but part of the group have been working on these attacks for quite some time.

The splinter group calling itself Ghost Security Group has been on an offensive for quite some time and reports suggest that they already took down over hundred thousand twitter accounts and close to 6000 propaganda videos. However, they don’t stop there as we learn via the German news outlet Focus. There were quite a few people asking on our previous post whether they also supplied the official law enforcement and anti-terror agencies with what they learned, and they do. Micheal S. Smith, a US Congress advisor, has now officially confirmed the he acts as a middleman between the Ghost Security Group and the FBI. The group first contacted the advisor in June and the information they have provided has been categorized as very helpful. They’ve helped the FBI agents by identifying terror acts both online and offline and they two stay in regular contact.

Where something good happens, something bad happens too. The Ghost Security Group has been split where one part is trying to sell off the information to the highest bidder, which the rest of the group isn’t very pleased about. It goes directly against what hackers do, provide free information on everything instead of holding back and selling out. That said, let us hope that the group will be successful in the future and help the officials track down those terrorists where the official channels might have trouble reaching them.

Anonymous to Start OpKKK

The internet is a place where lots can happen. People can have their details exposed, like those that were taken in the latest breaches at TalkTalk or they could have them misused in SWAT’ings. Some people believe though that this means that not only can the internet be misused, it can also be used for good. To represent and defend the common people, one such group is Anonymous.

Famous for their operations against governments and controversial groups, Anonymous are already acting on their next operation, titled Operation KKK. Designed to target the Klu Klux Klan, who are listed as a hate group by the Anti-Defamation league and is said to have anywhere between 5,000 and 8,000 members. Anonymous wants to unmask around 1,000 of these in the next phase of their operation, an action called Hoods Off on November 5th.

Not one to shy away from the public, Anonymous have been updating their twitter reporting already that many sites related to the KKK have already been taken offline, and that more will come.

A hacker going by the name of Amped Attacks has already helped out with this by taking down the Westboro Baptist Church’s website as well as several KKK websites. In doing so they have apparently also gained access to a list of identifying information for a range of people including Mayors and Senators.

Anonymous Attacks The Canadian Government and Leaks Classified Data

In the real world, the establishment counteracts instances of criminality by an extensive array of resources and a structured organisation. In cyberspace, groups such as Anonymous are organised, well versed in operational hacking activities and are able to use tools which are inexpensive, perhaps this is why governments and companies have yet to get a grip on data which has metaphorically walked out the door, hitched a plane and ended up on someone else’s computer.

The fore mentioned Anonymous have looked to be using techniques to again prise open the gates to documents, as reports have begun to circulate over the leaking of yet another high-level federal document concerning the redevelopment of Canada’s key diplomatic centres in Britain. This alleged leak is the second in a campaign against the Canadian government with the information purporting to include budgetary deficits and the “selling, relocating and refurbishing of Canada’s diplomatic buildings in London”

The documents belong to the Treasury Board of Canada and are dated 6th February 2014, or if this is as many are believing to be authentic, a now very irritated Treasury Board of Canada. These leaks are an attempt by the Cyber infiltration group “to pressure the government over the fatal shooting of a protester in B.C. and the passing of Bill C-51, the controversial anti-terrorism bill that gave expanded powers to police and Canada’s spy agency”.

Meanwhile, sources say that federal authorities are comparing versions of the documents and scanning for discrepancies that may help track down from whose hands it may have slipped.

Have I any sympathy for the Canadian government? Well, you know me don’t you; it demonstrates poor Cyber awareness and a lack of safe practise in the storage of classified documents, remember, the infrastructure has not been breached by a country attacking another state but by a hacktivist group.

Governments are losing the argument when it comes to attacking the criminality of these acts, after all, the actions by this group are against the law, but for me, so are the increased surveillance capabilities of agencies and the implementation and recruitment of external hacking teams, as in the case of, well Hacking Team to be precise.

“Freedom is never more than one generation away from extinction. We didn’t pass it to our children in the bloodstream. It must be fought for, protected, and handed on for them to do the same”. Ronald Regan

Thank you nationalpost for providing us with this information.

Image courtesy of occupycorporatism

Tor Users Beware – You May Not Be As Hidden As You Thought

Tor claims to allow people to connect to the internet and through their network become invisible and untrackable, this has made it very popular in recent years in which privacy online has become a big issue for both companies and home users alike. Scientists from Massachusetts Institute of Technology and Qatar’s Computing Research institute have released a research paper which may change that.

By gathering the network information from a pre-determined list of hidden services in advance, they are able to analyse patterns between the hidden service and the entry guard which helps protect users and make the service “anonymous”. This means that they were able to create a unique fingerprint for each service they came across, and later able to use this to identify the service. It should be noted though that while this means you can be identified on the network, they could not decrypt the network data, that would be a task for a different service.

Quoting an “88 percent accuracy” in determining the services identity. The attacks however must come from an entry guard, which are randomly assigned amongst the many users that use the tor network and therefore reduces the chance that you would have access to the entry guard required to find a particular person. The algorithm used to identify services did so by matching the number of packets (bundles of information sent) in patterns, a technique which Tor’s project leader has openly said could be fooled by simply adding padding to the network communications.

With secrecy and online monitoring becoming publicly known, even when it’s done illegally, tools like Tor are becoming more popular amongst users who feel they might be targeted online (for good or bad reasons). In the modern world, nothing is 100% secret.

Thank you Ars Technica for the information.

Image courtesy of WonderHowto.

ProxyHam Anonymising Router Disappears

A remote router that was to ensure absolute anonymity over Wi-Fi connections has been mysteriously shelved by its developers. ProxyHam, an untraceable “hardware proxy” designed to protect the identity of anyone who used it, was due to be unveiled at the DefCon conference later this month, but has now been pulled from the event after development of the device was ceased.

Rhino Security Labs, the developers of ProxyHam, announced on Twitter, “Effective immediately, we are halting further dev on #proxyham and will not be releasing any further details or source for the device,” following up with, “Existing #proxyham units will be disposed of and no longer be made available at @_defcon_”.

The circumstances of the device’s demise appear rather shadowy, with Rhino Security refusing to disclose the details of why it has called time on ProxyHam. In response to a concerned Twitter follower, Rhino Security said, “Can’t go into too much more detail, but are immediately shutting down all #proxyham research”.

Only a few weeks ago, Rhino Security’s Ben Caudill, creator of ProxyHam, was waxing lyrical about the hardware, which is based around a Raspberry Pi mini-computer. Caudill told Wired that ProxyHam would be “that last-ditch effort to remain anonymous and keep yourself safe,” boasting that “The KGB isn’t kicking in your door. They’re kicking in the door of the library 2.5 miles away.”

Wired contacted Caudill for more information regarding the project’s closure, to which he responded, “I can’t say much, which is unfortunate. It’s frustrating for me and for the team as a whole.”

Pure speculation, but it sounds as though an external influence has forced ProxyHam into the ground. Whether that’s governmental, legal, or corporate pressure, we’re unlikely to ever know.

Thank you Wired for providing us with this information.

Anonymous Accused of Running Botnet With Thousands of Hacked Home Routers

Haven’t yet changed your router username and password from “admin/admin”? If so, then your router could be part of a massive botnet, possibly run by members of Anonymous, according to cybersecurity experts Incapsula.

The network of hacked routers discovered by Incapsula are mostly located in the US, Brazil, and Thailand – but could affect any router in the world – and were infected by a number of different malware builds that built a botnet responsible for multiple DDoS attacks during December 2014.

Incapsula found that a great number of the hijacked routers were reporting back to AnonOps.com, a site owned and visited by Anonymous activists, “indicating that Anonymous is one of the groups responsible for exploiting these under-protected devices,” according to the report.

The affected “units are remotely accessible via HTTP and SSH on their default ports,” the report continues. “On top of that, nearly all are configured with vendor-provided default login credentials.”

“For perpetrators, this is like shooting fish in a barrel, which makes each of the scans that much more effective. Using this botnet also enables perpetrators to execute distributed scans, improving their chances against commonplace blacklisting, rate-limiting and reputation-based defense mechanisms.”

The botnet, similar to the one used by Lizard Squad for bespoke DDoS attacks since Christmas, used the MrBrick Trojan to insert as-yet-unidentified malware into the affected routers.

The full Incapsula report can be read below:

Thank you The Daily Dot for providing us with this information.

Anonymous Threatens Israel with Electronic Holocaust

Anonymous has been fighting Israel for a couple of years now, and while their attacks have gotten more sophisticated over time, the damage they’re causing is said to be decreasing. Now the group threatens Israel with what they call the electronic holocaust where they vowed to erase it from cyberspace on April 7 for crimes committed in Palestine.

https://youtu.be/5wxzJsBmdd8

The video features an electronic voice as we know from previous Anonymous videos while the background shows images from Israels attacks. The video is in English, but has Arabic subtitles. “We are coming to punish you again. As we did many times, we’ll take down your servers, government websites, Israeli military websites, banks, and public institutions. We’ll erase you from cyber-space as we have every year, 7 April 2015, will be an electronic holocaust,” the video says.

Anonymous will start this year’s attack just a little over a week before the Holocaust Remembrance Day, known in Israel as Yom HaShoah, on April 16. But experts question how much is achieved by these attacks as Israel is pretty much leading in electronic warfare, both offensive and defensive, and Anonymous operates mainly with DDoS attacks.

Thanks to RT for providing us with this information

BBC Website Down, Simple Tech Error or Malicious Attack?

Earlier today the BBC News website went down, and they had one creepy clown image accompanying the error message.

Here is what the error message said:

“This might be because:

We are experiencing abnormal traffic to our network or
the service or servers it is on is not currently available.

Please try the following options instead:

Try again later once we have solved the problem.
Use our site index”

The curious thing about the clown used in the image is its striking similarity to the one used by BBC when the TV station is off air, as seen here.

With all the recent news about Jeremy Clarkson being suspended, and Anonymous‘ threat to take down the site if he wasn’t re-instated, speculations are wild as to what actually happened.

Source: Mirror

Anonymous Threatens to Take down BBC If Jeremy Clarkson Isn’t Reinstated

Hackers from the self-proclaimed online activist group Anonymous have threatened to bring down the BBC website unless Jeremy Clarkson is reinstated. Anonymous new operation that reminds us more of a toddler that doesn’t get its way than anything else is dubbed #OpBringBackClarkson and is now in effect.

“Dear BBC, you don’t wanna piss off 300 million people,” said Anonymous. “You are warned: DDOS cannons will fire if you don’t comply. Bring back Clarkson!”

So now we know what the hackers watch when they aren’t using the DDoS tools, Top Gear. Anonymous is a fairly disparate group and they have no centralized leadership, so it might just be a couple rogue elements in the group and not all of them. But the threat is out there and it will be interesting to see how BBC reacts to it.

Social Media Users Can Find Almost Anyone, including the ‘Anonymous M25 Hero’

Social media users have great power when it comes to spreading news and they’ve done so once again by making sure that the anonymous M25 hero got to know how much his help was appreciated.

Gemma Elsey-Kail’s car had broken down on Friday on the M25 at the worst possible place – one without a hard shoulder. The woman was quite panicky as she tried to save herself and her baby from possible dangers of incoming vehicles.

That was when the anonymous Argos van driver pulled in behind her and blocked her and her car from other drivers, allowing her to get to safety. When the police arrived on the scene to secure the area, the driver continued his own tour. With everything that was going on, the woman totally forgot to thank the man properly and get his name – so she reached out over Facebook.

“I broke down on the M25 today in an area with no hard shoulder. I rushed to get my baby and 4-year-old onto the verge while cars and trucks were swerving all around us,” she wrote. “An Argos delivery driver pulled behind us using his visible lorry as a way of preventing anyone going into our car… I didn’t get his number in all the panic so hopefully this can somehow reach him. He was our hero today.”

The post was shared almost 20 thousand times and liked more than 130 thousand times. It also had plenty of praise for the Argos driver in the comments. The post also reached the Argo who managed to track down the driver to let him know about the massive social engagement over his actions.

The humble driver declined any interviews and didn’t want any further attention for his goodwill, while wishing to stay anonymous. Just one of those guys that restores a little bit of faith in humanity.

Thanks to BBC for providing us with this information

Anonymous’ Strike against ISIS Has Begun

Well known hacktivist group Anonymous may attract split opinions about their actions, but I think we can agree that their latest campaign is a good one. A couple of weeks ago the group announced that they would use their abilities to strike against the terrorist group ISIS and their online presence. Today Anonymous announced the beginning of such and posted a new video online. They also listed a lot of Twitter and Facebook accounts they had taken down, accounts used to spread their propaganda and recruit followers; this information is available at the source below.

The video starts out with a clarification, that they are made up from all sorts of people and that the ISIS doesn’t represent Muslims as they want to make us all believe.

“We are Muslims, Christians, Jews alike.” … “hackers, crackers, Hacktivist, phishers, agents, spies, or just the guy next door … students, administrators, workers, clerks, unemployed, rich, poor.” … “young, or old, gay or straight… from all races, countries, religions, and ethnicity. United as one, divided by zero.” … “the terrorists that are calling themselves [the] Islamic State (ISIS) are not Muslims,” the video states.

“This is just the beginning,” the video continues. “We will hunt you, take down your sites, accounts, emails, and expose you… From now on, no safe place for you online… You will be treated like a virus, and we are the cure… We own the internet… We are Anonymous; we are Legion; we do not forgive, we do not forget, Expect us.”

Source: AnonHQ

Tor Reassures Users After Hack Attempt

 

The Tor Project, victims of an attempted hack by a group known as Lizard Squad, has reassured users that the threat is being dealt with and that users’ anonymity remains intact.

It seems that Lizard Squad launched what is known as a Cybil attack, creating new relays in the hope of saturating the network, as opposed to taking control of existing relays. But, despite reports, the hackers only controlled 1% of the total number of relays within the Tor network. Tor confirmed this in a statement to Business Insider:

“This looks like a regular attempt at a Sybil attack: the attackers have signed up many new relays in hopes of becoming a large fraction of the network. But even though they are running thousands of new relays, their relays currently make up less than 1% of the Tor network by capacity. We are working now to remove these relays from the network before they become a threat, and we don’t expect any anonymity or performance effects based on what we’ve seen so far.”

Lizard Squad claimed responsibility for the Christmas attack on Xbox Live and PlayStation Network, explaining that it brought the two online gaming servers down to demonstrate that users were being short changed by a weak, lacklustre network. Its reasoning for attacking Tor is still a mystery but, whatever its motives were, the move has turned the collective head of Anonymous:

On Friday, Anonymous declared war on Lizard Squad, warning the malicious group in a YouTube video, “now you are all going down.”

Source: Business Insider

Lizard Squad Claims Xbox and PSN Hack Was For Our Own Good, Anonymous Declares War

Lizard Squad, the hacker group responsible for taking down Xbox Live and PlayStation Network over Christmas, has claimed it committed the act for the good of gamers. Whatever the motivation, Anonymous has declared war on Lizard Squad, telling the collective that they’ve “made an enemy”.

According to Lizard Squad, a company as large as Microsoft and Sony should have the money and infrastructure to prevent DDoS attacks, and that’s exactly the point, the implication being that users are being short-changed by the two companies not investing in their networks enough.

https://twitter.com/LizardMafia/status/548621930606370816

“If I was working [at Microsoft or Sony] and had a big enough budget I could totally stop these attacks,” a member of Lizard Squad, ‘Ryan Cleary’, told The Daily Dot. “I’d buy more bandwidth, some specific equipment, and configure it correctly. It’s just about programming skill. With an attack of this scale it could go up to the millions. But that’s really no problem for Sony and Microsoft.”

Lizard Squad’s altruistic reasoning hasn’t touched Anonymous, though, as the group has warned Lizard Squad “now you are all going down.” But there seems to be another motive behind Anonymous’ move against the hacker group, as revealed in a YouTube video released on Friday.

“Greetings Gaming Community & Lizard Squad aka Finest, It has come to our attention that despite our continued warnings you have decided to disregard our requests to stop promoting propaganda such as “Anonymous has joined up with the FBI”. The only Anon that ever worked with the FBI is Sabu, the former Lulzsec’s leader and now he’s know as the biggest traitor and scumbag that shopped hes friends to the police in order to save himself among all Anonymous parties. The Leader of Lizard Squad Jord is also the leader of Finest Squad which is in the same position as Sabu (shopped two of hes friends to the police after hacked by Anonymous and, now is struggling to escape from us). Everything that’s happening right now such as “Interview” is a typical brainwashing method of drama in order to save himself. You have made an enemy of Anonymous by saying that we are supporting FBI and now you are all going down!”

http://youtu.be/IwQIhITNTEg

Source: Inquisitr

Anonymous Attacks Ugandan Government Websites to Protest ‘Kill the Gays’ Bill

Uganda is pushing through an Anti-Homosexuality law. It has become nicknamed the ‘kill the gays’ bill. The name is not a misrepresentation: any person in Uganda found guilty of ‘Aggravated homosexuality’- a ‘gay act’ committed by a parent, authority figure, or, in a bizarre conflation, HIV-positive people and paedophiles – will face the death penalty. Embracing the Festive spirit, Rebecca Kadaga, Speaker of the Ugandan Parliament, has promised that this act of discriminate murder will pass by the end of the month as a “Christmas gift”.

There has been global protest; dissent; demonstrations. All fruitless to stop it. But online activist group Anonymous is not resigned to this inevitability. Members have hacked Ugandan Government websites in opposition to the bill. The group says this is just the start. If the bill passes, online attacks against Uganda will escalate. The South Florida Gay Times published the following, including a Twitter conversation with members of Anonymous:

“If they actually do pass the bill id image that itd be free game on the entire Ugandan government,” the group told SFGN via Twitter. “No court would convict anyone of trying to save lives.”

Anonymous New Jersey warned the Ugandan government in a previous Pastebin post to “expect us” if the bill passed.

That post included the names and contact information of members of Uganda’s Committee on Legal and Parliamentary Affairs.

Anonymous promise to fight the bill, and the Ugandan Government, until it is repealed.

Source: Daily Xtra

Anonymous Hacks KKK Twitter Due to Ferguson Threats

As part of their new #OpKKK campaign, the well known internet group ‘Anonymous’ has taken control of the Klu Klux Klans public twitter account in a bid to fight back against some recent actions.

The KKK’s USA branch decided to ‘call out’ Anonymous in a tweet, stating: “We are continuing to read Anonymous threats with much amusement. Still no action taken. #Cowards #HoodsON” in which Anonymous replied by swiftly taking control of the account just mere hours later.

This fight was originally sparked by the KKK stating they will take “lethal force” against Ferguson protestors in the aftermath of the upcoming grand jury decision regarding Ferguson police officer Darren Wilson. They did so by distributing flyers around the city marking their claims, this being easily completed due their headquarters being based only 75 miles south of the American town.

Reading “Attention: To the terrorists masquerading as “peaceful protestors”! We will use lethal force as provided under Missouri law to defend ourselves”. Now, Anonymous is known for many controversial take-overs and activist actions in their short history, sometimes in we’ve seen them band together for the good of the ‘common man’. This is another example how a bunch of computer-savvy tech enthusiasts can pit their minds together for good, no matter how illegal it may be.

On Wednesday, a KKK leader appeared on MCNBC to back-up their flyers threats, claiming they support the Ferguson locals and that this campaign had greatly boosted their recruitment drives. On Friday, Anonymous began their attack by doxing KKK members residing in the Ferguson/St. Louis region, then later on taking control of KKK’s twitter account in retaliation to the attacks.

Image courtesy of ZDNET

FBI Informant Leads Attacks on Turkish Government

A hacker who turned to being an FBI informant in order to avoid prison has been leading cyber attacks on Turkey.

Hector Xavier Montague, or better know under the alias Sabu, has been working with the FBI since his arrest in 2011 after being charged for cyber crimes. Sabu was looking at getting 20 years in prison but was able to make a deal. During this time Sabu has managed to stop over 300 cyber crimes and also take down 8 of the world’s biggest hackers from anonymous.

Now it seems that he has also been targeting the Turkish government whilst under US supervision. Court documents show that his hacking group, Antisec, teamed up with Redhack, a politically motivated Turkish group. Sabu apparently led the attacks and even recruited Jeremy Hammond who is number one on the FBI cyber crime list. Chat records show Sabu asking Hammond to take down a number of government websites, and to forward any access to Redhack.

When Hammond was able to access the details to more than 10 Turkish government servers, he handed all the details to a Redhack member saying: “Get into the boxes and do what you do”.

The FBI are insisting that all of this was done under the attorney general’s guidelines, but Sabu has been given a one year supervision order for his part and Hammond has been given 10years in prison.

Thanks to Sky for supplying us with this information.

Image courtesy of Tap Scape

A 4Chan Post Sold For $90,900 on eBay… Wait, What?

Everyone can sell literally anything on eBay nowadays. For example, this eBay seller has auctioned a simple 4Chan post and expected to get a lot of money for it.

The really interesting part is that the user actually made a fortune off the post. It is said that Artnet originally caught the post, a vendor known as “Artwork by Anonymous”, who turned the simple Chan post into a $90,900 masterpiece.

The post originally started at $500, which is still a lot of money for a common thing you find on the internet, only to end at the above mentioned bid price. Also, the lucky bidder is said to enjoy free expedite shipping for the product at hand.

Re/Code mentions that the bid reached the five digit count in just 36 hours, confirming that the auction is fake since it is pretty easy to inflate an eBay listing. Even so, people can just bid and not pay for it, a common practice found on the site.

Anyone who has missed the first auction can now enjoy a second listing of the Chan post, which seems to have a starting price of $500 as well. As for the eBay seller, it seems that art doesn’t have to be unique in order to get a heap of money out of it.

Thank you Gizmodo for providing us with this information
Image courtesy of Gizmodo

Tor Attack May Have Unmasked Dark Net Users

Users who have been browsing Tor using The Tor Project might not be as hidden as they thought after developers of the software believe they have been attacked for the past 5 months.

The project have said that they believe the attack was designed to de-anonymise users however are currently unsure how users have been affected.

As Tor is used as an anonymous way to publish websites, keeping websites from search engines and also keeping users identities quiet, this could effectively make using Tor worthless.

The project halted the attacks on the 4th of July and think they might know are behind them.

Two security experts from Carnegie Mellon university have told the project that they had previously found flaws in the software and that these flaws had allowed them to unmask users. The Tor Project have been trying to contact the two experts in hope that the breach is coming from them as if not they do not know where the attacks have originated. The experts are currently keeping quite, not responding to emails.

This comes soon after Russia’s interior ministry had announced a £65,000 prize to anyone who was able to crack users identities saying they want to use the information for their countries ‘defence and protection’

Thank you BBC News for providing us with this information

Image courtesy of wikipedia