The queries on everyone's mind are who is behind these pc attacks and why are they doing it. This FAQ can facilitate answer those queries in a minimum of a number of the cases.
Who is Anonymous?
Anonymous is that the best known of the teams that are currently active and publicly taking credit for, even publicizing ahead, attacks on websites. it is a decentralized cluster that makes a speciality of organizing distributed denial-of-service (DDoS) attacks designed to close up sites, significantly in support of freedom of speech. Past targets have included the Church of Scientology, BMI, the governments of Egypt and Iran, and firms owned by conservative activist billionaires Charles and David Koch. They additionally conducted a colossal compromise of the safety firm HBGary Federal, that had reportedly been operating with the FBI to spot the leaders of Anonymous.
They launched a series of effective DDoS attacks against PayPal, Visa, and MasterCard late last year once the businesses stopped enabling WikiLeaks to receive contributions through those suggests that. Sources told CNET that the cluster has undergone a loss of membership and radical shift in direction and organizational participation since the arrest of a 16-year-old alleged member within the Netherlands late last year, the arrest of 5 individuals (ages 15-26) within the U.K. in January, and therefore the issuing of quite forty arrest warrants within the U.S. Member identities were reportedly leaked on the web additionally. The group's robust anti-establishment and political messages have led some to decision them hacktivists, that refers to activists who hack. It's unclear what number individuals participated in their campaigns, that they decision "operations," as a result of their system is meant to permit for confidential participation.
Who have they targeted recently and why?
Anonymous just about started the recent spate of hackings against Sony, hitting many Sony sites with a DDoS in early April in retaliation for Sony taking many PlayStation three hackers to court. PS3 "modder" George Hotz and Sony eventually settled out of court. however attacks on Sony continued, with a significant breach at the PlayStation Network that exposed seventy seven million client records and at Sony on-line Entertainment where quite twenty four million records were exposed. Sony has steered connections between Anonymous and therefore the breaches. whereas Anonymous was admittedly behind the initial DDoS, it says it wasn't behind the PSN and Sony on-line Entertainment breaches, and hasn't claimed credit for the other Sony attacks. Last week, Spanish police arrested 3 individuals accused of collaborating in Anonymous activities and Anonymous members retaliated by hitting the Spanish National Police net website. This week, Turkish police arrested thirty two individuals, together with eight who were teens, among days of the cluster launching a campaign to close up a Turkish government website in response to new net filtering laws. Yesterday, Anonymous was designing an attack on the positioning of the Federal Reserve for nowadays.
Who is LulzSec?
LulzSec initial popped up in early might seemingly out of nowhere. however sources told CNET that the cluster may be a spinoff from Anonymous ranks, however with no pretense of getting a political message or ethical principle. Indeed, the group's name, LulzSec--a spinoff of LOL (laugh out loud) combined with security--is a robust indication that the group's motivation is to merely hack for kicks and entertainment. The cluster makes plenty of jokes and taunts on Twitter and nowadays said it'd take hacking target requests. "Pick a target and we'll obliterate it. no one desires to mess with The Lulz Cannon - take aim for us, twitter."
Who have they targeted?
LulzSec began publicizing its hacking in might with the compromise of the online website of the Fox TV show "X Factor" and exposed personal data of contestants, followed by unleash of internal Fox information. The cluster additionally has taken credit for hacks of Sony Music Japan, Sony footage, Sony BMG Belgium and Netherlands, Sony pc Entertainment Developer Network (allegedly stealing supply code) and Sony BMG, consistent with this timeline.
LulzSec hacked the positioning of PBS.org late last month, leaked passwords, and pasted a spoof news article on the positioning claiming that deceased rappers Tupac Shakur and Biggie Smalls were alive and residing in New Zealand. The cluster claimed they were punishing PBS for a Frontline program on WikiLeaks that they claimed was biased against the whistleblower website. LulzSec additionally has targeted Nintendo and therefore the net website of FBI partner Infragard in a shot to embarrass the agency. LulzSec said it took the action against Infragard thanks to a concept by the Obama administration to classify cyberattacks as acts of war. Among the passwords on the Infragard website was one employed by the CEO of botnet tracking firm Unveillance. The CEO told CNET that the hackers used the password to scan his e-mails and listen in on conference calls which they threatened to extort cash and botnet information from him. Botnets composed of compromised computers are generally used to send spam and to launch DDoS attacks.
LulzSec recently went public with information stolen from a U.S. Senate net website and released information stolen from the positioning of Bethesda Softworks, a subsidiary of gaming company ZeniMax Media. The cluster additionally recently compromised a website at the U.K. National Health Services. LulzSec failed to unleash the knowledge publicly, however sent an e-mail to the agency warning them regarding the matter and then released a redacted version of the e-mail to the general public.
Who is Idahc?
Another hacker who has taken credit for attacking Sony is understood as Idahc. He has identified himself as a 18-year-old Lebanese pc science student. In an interview in the week with Andy Greenberg at Forbes, Idahc said he began hacking for "justice," then it became a game and currently he is making an attempt to prompt organizations to boost the safety of their websites. "I do not hack for 'lulz' except for ethical reasons," he said within the interview, adding that he considers teams like LulzSec to be "black hat," or criminal, hackers, which he's a "gray hat" hacker.
Who has Idahc targeted?
Idahc claims to possess stolen a pair of,000 records from Sony Ericcson's e-commerce website in Canada, leaked a database from Sony Europe, and compromised a Sony Portugal website. Meanwhile, there are alternative copycat-type attacks on Sony, specifically a hacker with the alias "k4L0ng666" took credit for hacking Sony Music Indonesia and has reported a protracted list of alternative net website defacements to cybercrime archive Zone-H. And somebody with the handle "b4d_vipera" claimed responsibility for hacking Sony BMG Greece.
What regarding alternative massive recent attacks? Are these all related?
In the past few months there are a string of alternative pc hacking incidents, however they're not all linked. in contrast to the Sony and alternative attacks conducted by Anonymous and LulzSec that were done to reveal security weaknesses and embarrass a target and find publicity, alternative styles of attacks are a lot of malicious.
For instance, the networks of Citigroup and therefore the International financial Fund were compromised recently. Reports have speculated that the IMF was targeted by a remote government probably wanting access to insider data that might have an effect on monetary markets. it is also unknown who is behind the Citigroup incident, though The the big apple Times reported that whoever did it managed to induce in through the most client net website and then leapfrogged between completely different customers by inserting numerous account numbers into the browser address bar repeatedly. the information from accounts may well be used for monetary fraud, though the thieves apparently failed to get card expiration dates or security codes, which is able to build the information harder to use.
Then RSA warned customers in March that its system had been compromised and information was stolen associated with its SecurID two-factor authentication devices, that are widely employed by U.S. government agencies, contractors, and banks to secure remote access to sensitive networks. among some months, reports trickled out regarding breaches at 3 defense contractors: Lockheed Martin, L-3 Communications, and Northrop Grumman, the primary 2 of that confirmed that the attacks were associated with SecurIDs. It's unclear who is behind the attacks, however when it involves military espionage foreign governments or nation states are usually suspected. during this case many specialists speculated it may well be China.
Google announced earlier this month that it had thwarted an attack aimed toward snooping on many Gmail accounts owned by U.S. and alternative government officers, journalists, and political activists that perceived to originate in China. Chinese representatives have denied any involvement.
There was additionally a breach at e-mail selling service supplier Epsilon in April that prompted massive corporations like Citibank, Chase, Capital One, Walgreens, Target, Best Buy, TiVo, TD Ameritrade, and Verizon to warn customers that their e-mail addresses had been exposed.
And in March somebody stole digital certificates from registration authorities related to Comodo and will have used them to spoof sites like Google, Yahoo, Live.com, and Skype. A 21-year-old Iranian patriot claimed responsibility for the attacks, saying he was protesting U.S. policy and was taking revenge for last year's Stuxnet malware that specialists believe was created to close up Iran's nuclear program.
{ 0 comments... Views All / Send Comment! }
Post a Comment