Jump to content

Hacking Season - AnonOps / Anonymous / Lulzsec


Kurtis

Recommended Posts

who gives a f*ck if its irresponsible

this is where groups like wikileaks and lulzsec have failed themselves

nothing should be restricted

should just release everything

regardless of the problems it creates on the ground

its best there dont release everything because for all u know if they release everything it may have a negative impact on the economy, relationships betweeen countries,and that can impact me and everyone directly.

Link to comment
Share on other sites

Would be dumb to release every bit of info they acquire.

  • Upvote 1
Link to comment
Share on other sites

Would be dumb to release every bit of info they acquire.

exactly. considering they can hack, seemingly ANYTHING, makes sense to have some sort of strategy

Lulzsec are making 2011 a little bit better for the world

2011 has been the year of the digital revolution

to think

twitter has arguably done more good for the world than any regieme change or foreign intervention orchestrated by the west

a tool for change without the so much money spent or lives lost*

*lives lost yes but more people who chose to make a stand

  • Upvote 1
Link to comment
Share on other sites

Looks like sabu is the last man standing of the main guys, all the rest of them including @Lulzsec have stopped tweeting.

Link to comment
Share on other sites

  • 2 weeks later...
(Reuters) - Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world.

Security company McAfee, which uncovered the intrusions, said it believed there was one "state actor" behind the attacks but declined to name it, though one security expert who has been briefed on the hacking said the evidence points to China.

The long list of victims in the five-year campaign include the governments of the United States, Taiwan, India, South Korea, Vietnam and Canada; the Association of Southeast Asian Nations (ASEAN); the International Olympic Committee (IOC); the World Anti-Doping Agency; and an array of companies, from defense contractors to high-tech enterprises.

In the case of the United Nations, the hackers broke into the computer system of its secretariat in Geneva in 2008, hid there for nearly two years, and quietly combed through reams of secret data, according to McAfee.

"Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators," McAfee's vice president of threat research, Dmitri Alperovitch, wrote in a 14-page report released on Wednesday.

"What is happening to all this data ... is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat."

McAfee learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a "command and control" server that they had discovered in 2009 as part of an investigation into security breaches at defense companies.

It dubbed the attacks "Operation Shady RAT" and said the earliest breaches date back to mid-2006, though there might have been other intrusions. (RAT stands for "remote access tool," a type of software that hackers and security experts use to access computer networks from afar).

Some of the attacks lasted just a month, but the longest -- on the Olympic Committee of an unidentified Asian nation -- went on and off for 28 months, according to McAfee.

"Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors," Alperovitch told Reuters.

"This is the biggest transfer of wealth in terms of intellectual property in history," he said. "The scale at which this is occurring is really, really frightening."

CHINA CONNECTION?

Alperovitch said that McAfee had notified all 72 victims of the attacks, which are under investigation by law enforcement agencies around the world. He declined to give more details.

Jim Lewis, a cyber expert with the Center for Strategic and International Studies who was briefed on the hacking discovery by McAfee, said it was very likely China was behind the campaign because some of the targets had information that would be of particular interest to Beijing.

The systems of the IOC and several national Olympic Committees were breached in the run-up to the 2008 Beijing Games, for example.

And China views Taiwan as a renegade province, and political issues between them remain contentious even as economic ties have strengthened in recent years.

"Everything points to China. It could be the Russians, but there is more that points to China than Russia," Lewis said.

McAfee, acquired by Intel Corp this year, would not comment on whether China was responsible.

STONE AGE

Vijay Mukhi, an independent cyber-expert based in India, says some south Asian governments, including India, are highly vulnerable to hacking from China as it strives to broaden its influence and strategic interests in the region.

"I'm not surprised because that's what China does, they are gradually dominating the cyberworld," he said.

"I would call it child's play (for a hacker to get access to Indian government data) ... I would say we're in the stone age."

An Indian telecommunications ministry official declined to say whether he was aware of the hacking on the government.

The UN said it was aware of the report, and that it has started an investigation to ascertain if there was an intrusion.

But Hwang Mi-kyung, with leading South Korean cyber security firm Ahnlab, cautioned against assuming China was the only one involved.

"I think we're beyond the stage where we should be focusing on the technical aspect of addressing individual attacks and instead we should think more in terms of what we can do policywise. For that, the involvement of Chinese government is very important," she said.

McAfee released the report to coincide with the start of the Black Hat conference in Las Vegas on Wednesday, an annual gathering of security professionals and hackers who use their skills to promote security and fight cyber crime.

In the scorching desert heat, they will meet to talk about a series of recent headline-grabbing hacks, such as on Lockheed Martin Corp, the International Monetary Fund, Citigroup Inc, Sony Corp and EMC Corp's RSA Security.

The activist groups Anonymous and Lulz Security have recently grabbed the spotlight for temporarily shutting down some high-profile websites and defacing others.

But attacks like Operation Shady RAT are far more costly and often undisclosed, as victims fear reputational damage or attention from other hackers. McAfee sees Operation Shady RAT as the tip of the iceberg.

"I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact," Alperovitch wrote in the report.

"In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know."

(Additional reporting from Tom Miles in Geneva, Jack Kim in Seoul and James Pomfret in New Delhi, editing by Tiffany Wu, Martin Howell and Jonathan Thatcher)

http://www.reuters.com/article/2011/08/03/us-cyberattacks-idUSTRE7720HU20110803

Link to comment
Share on other sites

McAfee learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a "command and control" server that they had discovered in 2009 as part of an investigation into security breaches at defense companies.

2009?!?

¬.¬

from what ive read lately its not that the security tools we have are so inadequate

they are often just... not used

Link to comment
Share on other sites

  • 6 months later...

Anonymous's release of Met and FBI call puts hacker group back centre stage

Activist collective's leak of 18-minute discussion embarrasses authorities and raises questions over how security was breached


    • Demonstrator-wearing-Anon-007.jpg

Anonymous' release of a phone call between the Met police and the FBI has embarrassed the authorities. Photograph: Simon Webster/Rex Features

The hacking collective Anonymous has struck deep into the heart of one of its sworn enemies – the police – with the release of the recording of a conference call between the Metropolitan police and the FBI. In it, they discuss ongoing investigations and court cases against alleged British hackers; and now, courtesy of Anonymous, the world can listen in too.

For Anonymous, the posting on YouTube of the 18-minute audio from the call was a particular triumph, indicating that it can worm its way even into the most powerful organisations in the land. "The FBI might be curious how we're able to continuously read their internal comms for some time now," said one account controlled by the group on Twitter.

The call reveals British police and the FBI discussing the delay of court proceedings against two alleged members of the LulzSec hacking group, which attacked a number of sites in 2011 including the US Congress and UK Serious Organised Crime Agency.

It's worrying for anyone to discover that their email has been hacked – but when it happens to the police in not one but two countries, and to the two most sensitive arms of those forces, dealing with hackers, it becomes a source for deep concern.

For Anonymous, though, it is a return to prominence after it burst into worldwide attention with its attacks on PayPal and Visa in January 2011 after those sites stopped allowing payments to WikiLeaks. Anonymous has no leaders and no clear membership, and forms decisions collectively. Its general ethos is to defend what members see as the "free" internet from repression and restriction of freedom of speech.

After a series of arrests in spring 2011, and a number of arrests relating to other hacking attacks through the year, the group seemed to have lost direction. But the rise of the "Occupy Wall Street" movement, and now its attacks on far-right and authority figures, appears to have revitalised it.

The police call, recorded on 17 January ahead of arraignment hearings for two Britons accused of a number of offences related to hacking, includes two British and two FBI police officers discussing the members of the groups and another British hacker who they describe as a "wannabe", and who is alleged to have leaked details of 32,000 users of the online game platform Steam.

"He's doing it for attention," one of the Met officers says. "He got arrested for DDOSing [knocking out the computers at] his school and then he hacked a credit union in Jamaica." The hacker, whose identity is known to the Guardian, denies having been arrested, and says he attended a police interview voluntarily.

For Anonymous, though, it is the latest in a run of triumphs over those it sees as its enemies. Early in January, the group targeted the leader of Gemany's far-right NPD party. Then they hit websites belonging to the US Department of Justice, Universal Music and the Motion Picture Association of America (MPAA) as part of a protest over the closure on criminal charges of the MegaUpload filesharing site.

The latest embarrassment for the authorities was recorded after someone hacked the email of at least one of the 44 recipients on an email headed "Anon-Lulz International Coordination Call" sent on 13 January by Timothy Lauster of the FBI. It detailed the conference call number and dial-in code to "discuss the on-going [sic] investigation related to Anonymous, LulzSec, Antisec and other associated splinter groups".

With the message having gone to police forces in the UK, Ireland, France, Germany, Sweden and the US, tracking down the hacked account – or accounts – will be a serious headache. Security experts said the interception is unlikely to have required a highly complex operation.

"Clearly looks like someone on that list has had their email compromised. It's very serious," a security expert, Graham Cluley, told the Guardian. "It is one thing taking down a website but to actually be listening in on the conference call where police are discussing charges ... there must be a lot of questions being asked right now."

Cluley said it was unlikely that the hacker collective had interfered with the systems of the company that hosted the conference call. The FBI said that its computer systems were not breached as part of the incident.

The solicitor for Ryan Cleary, who is charged with five offences of hacking websites, told the Guardian that the recording raises concerns that US authorities are seeking to extradite the Essex teenager. "My concern is whether the co-operation between officers [in the US and UK] was to assist them in an extradition request," said Karen Todner, the managing director of solicitors' firm Kaim Todner.

She warned that future breaches of security on this scale have the potential to "blow apart" criminal charges against those arrested in connection with previous hacks. "This is the FBI and the Met's e-crime unit [that have been breached] and the Crown Prosecution Service are in April about to go completely digital and the whole cases could be blown apart on it."

In the call the detectives can be heard discussing various members of the LulzSec group, and the progress of cases against Ryan Cleary, who has been charged with five offences relating to hacking websites, and Jake Davis, who has been charged over the hacking of the Soca website. Two people who are alleged to be members of LulzSec, who have previously been arrested and bailed by UK police, are also discussed in the call. Their names have been bleeped out by the person who uploaded the call to YouTube.

guys are fucked :lol:

  • Upvote 1
Link to comment
Share on other sites

Question everything. cos Thun's god Alex Jones is one who popped onto the world stage with so called "exposures" and he has later been found out to be part of them, hence the inside info.

Order out of chaos, these daemonz have infiltrated everything....and could just be some pseudo set up.

Link to comment
Share on other sites

posted on here few times. you can check for yourself

it wont be on the BBC or CNN so 'credible' will have to be as you define it

in a nutshell... all you need to do is follow the money trail.. his wife is jewish from an uber zionist hollywood/banking family

all the adverts on his page at one point were from jewish owned companies

the director of those his false flag "exposure" movies is a business partner of some jewish hollywood exec edgar bronfmann or something like that

yet he has never linked or been able to see that America's thirst for blood and evil around the world to is all linked to Zionism

he uses words like Neo-con and the 'World elite' as a distraction to who showing who 90% of these people really are and the rest 10% that arent Zionist jews are pro zionists anyway.

it was when he started to cut people off or refuse to have the discussion about zionism that people started to clock on and his exposures began to unfold.

yes he has spoken about zionism but never with the same vigour as he does when he talks about so called "elites" as if we f*ck*ng dont know who these are.

about he snuck into the Bilderberg group meetings....with all the security around the place some fat c*nt with a camera will "sneak" in and film all that.he once said its not the jews that run and own hollywood but the arabs :/

  • Upvote 2
Link to comment
Share on other sites

solid evidence itt

not gona happen with him is it

all evidence would suggest alex jones is the biggest disinformation c*nt goin tho, talks about valid stuff but avoids alot

there are pages of criticism of him

depending on who you ask people will tell you he supports/avoids talkin about a variety of groups, jews, jesuits etc

if he was exposing anythin any1 cared about too much then he wouldn't be allowed such a platform

he's a millionnaire whos been on bare major tv networks (fox, bbc etc) expressin his views, don't sound like any enemy of the state, whilst plenty of truthsayers have their youtube accounts deleted this guy is all over it

if you believe in any NWO related conspiracy then the elites having controlled opposition seems an obvious tactic

steer people away from the truth, also deliberately act like a typical nutjob to scare off any potentials

Link to comment
Share on other sites

from when people who really had information to expose have all been killed off

or former CIA man who's one of the US govt's biggest whistleblowers now called the man a joke

let alex jones draw in his sheeple while he rakes in $5m a year talking about "rich elites"

he's got your backs

Link to comment
Share on other sites

im not your researcher. thats what ive found out, if you oppose it tell me why. believe what you want,

this is not how life works why are you always doin this

if you care about anyone believing the copy and pasted bullshit you constantly spout, then you back up your points with relevant evidence, if you don't care then no need to post, and if you insist on still posting, once someone challenges you don't always reply with this sh*t nonsense

socially awkward gay c*nt

Link to comment
Share on other sites

listen you d*ckhead ginger fat c*nt..

me and thun have done this time and time before and ive posted evidence and information

nothing stops you from doing a simple google search.

gone are the days when information will be posted that wont be read OR any counter evidence presented

if you dont believe it then go f*ck yourself..

yes i have to copy and past because its not my information nor can anyone on here provide any personal information on him

so its always going to be 'copy and pasted' information.

socially useless rejected prick

Link to comment
Share on other sites

  • 1 month later...

SMH

Sabu has been working for the FBI and snitchin since summer.

EXCLUSIVE: Infamous international hacking group LulzSec brought down by own leader

Written By Jana Winter

Published March 06, 2012

FoxNews.com

  • Hector%20LulzSec.jpg
    Hector Xavier Monsegur is “Sabu,” the unemployed, 28-year-old father of two who allegedly commanded the loosely organized international hacker team LulzSec.

EXCLUSIVE: Law enforcement agents on two continents swooped in on top members of the infamous computer hacking group LulzSec early this morning, and acting largely on evidence gathered by the organization’s brazen leader -- who sources say has been secretly working for the government for months -- arrested three and charged two more with conspiracy.

Charges against four of the five were based on a conspiracy case filed in New York federal court, FoxNews.com has learned. An indictment charging the suspects, who include two men from Great Britain, two from Ireland and an American in Chicago, is expected to be unsealed Tuesday morning in the Southern District of New York.

“This is devastating to the organization,” said an FBI official involved with the investigation. “We’re chopping off the head of LulzSec.”

Hector Xavier Monsegur, aka "Sabu," pleaded guilty to the following charges on Aug. 15, 2011:

COUNT ONE: Conspiracy to Engage in Computer Hacking—Anonymous

COUNT TWO: Conspiracy to Engage in Computer Hacking—Internet Feds

COUNT THREE: Conspiracy to Engage in Computer Hacking—LulzSec

COUNT FOUR: Computer Hacking—Hack of HBGary

COUNT FIVE: Computer Hacking—Hack of Fox

COUNT SIX: Computer hacking—Hack of Sony Pictures

COUNT SEVEN: Computer Hacking—Hack of PBS

COUNT EIGHT: Computer Hacking—Hack of Infraguard-Atlanta

COUNT NINE: Computer Hacking in Furtherance of Fraud

COUNT TEN: Conspiracy to Commit Access Device Fraud

COUNT ELEVEN: Conspiracy to Commit Bank Fraud

COUNT TWELVE: Aggravated Identity Theft SUMMARY

The offshoot of the loose network of hackers, Anonymous, believed to have caused billions of dollars in damage to governments, international banks and corporations, was allegedly led by a shadowy figure FoxNews.com has identified as Hector Xavier Monsegur. Working under the Internet alias “Sabu,” the unemployed, 28-year-old father of two allegedly commanded a loosely organized, international team of perhaps thousands of hackers from his nerve center in a public housing project on New York’s Lower East Side. After the FBI unmasked Monsegur last June, he became a cooperating witness, sources told FoxNews.com.

“They caught him and he was secretly arrested and now works for the FBI,” a source close to Sabu told FoxNews.com.

Monsegur pleaded guilty Aug. 15 to 12 hacking-related charges and information documenting his admissions was unsealed in Southern District Court on Tuesday.

As a result of Monsegur’s cooperation, which was confirmed by numerous senior-level officials, the remaining top-ranking members of LulzSec were arrested or hit with additional charges Tuesday morning. The five charged in the LulzSec conspiracy indictment expected to be unsealed were identified by sources as: Ryan Ackroyd, aka “Kayla” and Jake Davis, aka “Topiary,” both of London; Darren Martyn, aka “pwnsauce” and Donncha O’Cearrbhail, aka “palladium,” both of Ireland; and Jeremy Hammond aka “Anarchaos,” of Chicago.

Hammond was arrested on access device fraud and hacking charges and is believed to have been the main person behind the devastating December hack on Stratfor, a private company that provides geopolitical analysis to governments and others. Millions of emails were stolen and then published on Wikileaks; credit card numbers and other confidential information were also stolen, law enforcement sources told FoxNews.com.

The sources said Hammond will be charged in a separate indictment, and they described him as a member of Anonymous.

The others are all suspected members of LulzSec, the group that has wreaked havoc on U.S. and foreign government agencies, including the CIA and FBI, numerous defense contractors, financial and governmental entities and corporations including Fox and Sony.

Ackroyd, who is suspected of using the online handle “Kayla,” is alleged to be Monsegur’s top deputy. Among other things, Kayla identified vulnerabilities in the U.S. Senate’s computer systems and passed the information on to Sabu. Kayla was expected to be taken into custody on Tuesday.

A spokeswoman for the Southern District and U.S. Attorney Preet Bharara declined comment.

Monsegur’s attorney did not return FoxNews.com’s repeated requests for comment.

Read more: http://www.foxnews.c.../#ixzz1oMdzhQzz

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...