FBI & White House pissed off Power Hackers & got fucked!

matamafia

Alfrescian
Loyal
Joined
Aug 14, 2008
Messages
1,856
Points
48
http://news.xinhuanet.com/world/2011-06/07/c_121501078.htm

美国“网络战”激怒黑客 FBI合作伙伴网站遭黑
2011年06月07日 08:46:15  来源: 广州日报 【字号 大小】【收藏】【打印】【关闭】

InfraGard的网络技术人员正在工作。(资料图片)

美国军火巨头洛克希德—马丁公司。

InfraGard的LOGO。

  美国联邦调查局(FBI)的一个合作伙伴5日证实,下属分支网站遭黑客袭击,近180个会员账户密码失窃。最近频繁宣布袭击各机构网站的一个黑客团体宣布窃得密码,且将密码张贴于互联网上。

  180个账户密码

  被公布在网络上

  据新华社电 美国联邦调查局这个合作伙伴名为InfraGard,是一个公私合营机构,与联邦调查局共享涉及美国所受现实和网络基础设施威胁的信息。

  美联社报道,失窃登录密码属于InfraGard亚特兰大分会会员,包括美国陆军、网络安全组织和一些重要通信企业。据悉,共有近180个会员账户密码失窃。

  InfraGard亚特兰大分会会员联盟主席保罗·法尔利通过电子邮件告诉美联社记者:“有人确实危害了网站。我们现阶段还不知道袭击如何发生或窃取这些密码所使用的手段。”

  联邦调查局5日宣布了解这一事件,正在采取措施,以减轻危害。法尔利说,亚特兰大分会网站已经关闭,通知会员更改密码,提防再次袭击。

  黑客还窃得

  1000封电邮

  黑客团体Lulzsec自称突破InfraGard亚特兰大分会网站并把获得的账户密码公布在互联网上。这个黑客团体说,所获密码来自许多美国政府机构,如联邦调查局、联邦航空局和农业部,而且这些密码会在其他地方重复使用。

  Lulzsec同时宣布,黑客成员利用其中一份密码,侵入防病毒机构Unveillance公司首席执行官的电子邮箱,窃得近1000封公务或私人电子邮件。Lulzsec由两个英文单词构成,“Lulz”为网络用语,意为“放声大笑”,“sec”则是英文单词“安全(Security)”的缩写。

2011年06月07日 08:46:15  来源: 广州日报 【字号 大小】【收藏】【打印】【关闭】

  日本任天堂公司、索尼公司、美国公共广播公司和福克斯电视台均遭网络入侵

  涉案黑客团体近日连续出击

  据新华社电 Lulzsec在声明中宣称,之所以发起黑客行动,是为了回应一则美国五角大楼考虑把部分网络袭击列入“战争行为”的报道。

  美国《华尔街日报》5月31日报道,五角大楼引入一项“新网络战略”,准备把一切针对美国的“网络侵入行为”分级,最高等级为“战争行为”。报道说,五角大楼定于6月正式宣布这一战略。

  InfraGard亚特兰大分会会员联盟主席法尔利说,InfraGard组织先前与这个黑客团体从来没有过牵连。

  5日早些时候,日本任天堂公司宣布,下属一个美国分支服务器曾遭非法侵入,但没有造成损失。

  Lulzsec宣布对任天堂的侵入为己方所为,在网络上贴出一份据称为任天堂服务器配置的文件。它说,侵入任天堂服务器只是为了好玩,“我们不针对任天堂,我们非常喜欢(任天堂出品的游戏机)N64,真诚希望任天堂能够填补防范漏洞”。

  这以前,Lulzsec宣布入侵索尼公司旗下索尼影像娱乐公司网站,把窃得的超过100万份用户信息公布于网上,声称所公布的部分信息已经核实。

  另外,这个团体宣布侵入美国公共广播公司网站和福克斯电视台网站。


美国“网络战”激怒黑客 FBI合作伙伴网站遭黑
2011年06月07日 08:46:15  来源: 广州日报 【字号 大小】【收藏】【打印】【关闭】

  美军火巨头刚刚遭遇黑客

  美国军火巨头洛克希德—马丁公司5月28日说,该公司一周前挫败一起“重大和顽固”网络袭击。

  企业发言人珍妮弗·惠特洛在一份邮件声明中说,由于采取“几乎立即的”保护措施,美国客户、项目或者员工的个人信息未遭遇损害。

  据报道,不明身份人员通过复制该公司内部使用的认证令牌侵入网络。另外,多家其他美国军工企业遇“黑”。

  洛克希德—马丁公司是美国国防部头号军火供应商,旗下产品包括F-16、F-22和F-35等各式高性能战机以及多种舰艇。 (阿南)
 
http://www.techdirt.com/articles/20...nymous-kicks-off-weekend-long-hackathon.shtml

NATO Threatens Anonymous; Kicks Off Weekend-Long Hackathon
from the hornets'-nests-all-the-way-down dept

Following in the footsteps of Obama's promise to fight hackers with guns, General Rapporteur Lord Jopling has issued a long and sternly-worded statement to NATO, warning them of the threat hackers pose to the security of the allied nations. The draft details Anonymous' involvement with both Wikileaks and HBGary along with with a rundown of recent hacktivist activity in the Middle East and Africa.

Jopling's paper is thorough and fairly well-balanced, although it includes some troubling statements about governmental transparency:

[T]he Rapporteur believes that even if one is in favour of transparency, military and intelligence operations simply cannot be planned and consulted with the public. Transparency cannot exist without control. The government, and especially its security agencies, must have the right to limit access to information in order to govern and to protect. This is based on the premise that states and corporations have the right to privacy as much as individuals do and that secrecy is required for efficient management of the state institutions and organizations.

In addition, transparency can be misused on several levels – by providing unprofessional or poor-quality interpretation of information or documents, by conducting superficial or biased analysis, by lack of experience on the topic or by pursuing a political agenda. Thus, not everything carried out under the “transparency label” is necessarily good for the government and its people.

While he makes a good point that full transparency can often lead to faulty conclusions, the fact is that this sort of thing (poor-quality interpretations of information, biased analysis, pursuit of political agendas) is happening already, and increased compartmentalization and secrecy will only exacerbate the problem. The information will still get out somehow, but at this point, nearly every government in the world is showing an unhealthy distrust of its citizens. Rather than working towards more transparency and openness, they seem to be looking to lock up as much information as possible.

Not only that, but the claim that "states and corporations have the right to privacy as much as individuals do" is flat-out laughable. If this were true, these states and corporations would be an open-book, especially here in the U.S. where warrantless wiretaps and searches have become just another ho-hum tool of the FBI and local law enforcement. On one hand, the government is pressuring Google and Apple to protect the privacy of their users, while on the other hand, it's demanding that said private information be harvested and retained indefinitely.

But this is merely retreading arguments long-familiar with Techdirt readers. It's the point where NATO explicitly calls out Anonymous that it gets interesting. While acknowledging Anonymous' positive "hacktivism" efforts in aid of foreign rebellions, the draft also explicitly warns the group that NATO is willing to take them on and prosecute if necessary:

Today, the ad hoc international group of hackers and activists is said to have thousands of operatives and has no set rules or membership.[36] It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted.

It didn't take long for Anonymous to respond. Or rather, Anonymous would have responded if they weren't already tied up disrupting services in Iran, harvesting thousands of government emails and publishing Iran embassy email account information. LulzSec (whose week has already been busy, what with hacking PBS and Sony Pictures), took it upon themselves to go head-to-head with both the FBI and NATO:

It has come to our unfortunate attention that NATO and our good friend Barrack Osama-Llama 24th-century Obama have recently upped the stakes with regard to hacking. They now treat hacking as an act of war. So, we just hacked an FBI affiliated website (Infragard, specifically the Atlanta chapter) and leaked its user base.

In addition to taking Infragard offline (it was still down as of 7PM Sunday), LulzSec acquired the gmail address of Karim Hijazi, who runs Unveillance, a "white hat" company specializing in data breaches and botnets. Hijazi released a statement on Friday confirming their attacks. His post also included an IRC chat transcript of a conversation with members of LulzSec, in which they claim they are after his money:

(KARIM) So did we wrong you in some way, let’s get to the point?
(LULZ) <@Ninetales> If you wronged us, all of your affiliates would be crushed. Don’t worry, you’re in the good books. The point is a very crude word: extortion.
(LULZ) <@Ninetales> And what we’re both willing to agree upon that you sacrifice in return for our silence.
(LULZ) <@Ninetales> While I do get great enjoyment from obliterating whitehats from cyberspace, I can save this pleasure for other targets. Let’s just simplify: you have lots of money, we want more money.

Hijazi claims to have protected any sensitive client data from LulzSec and states that he "refuses to comply with their requests." However, LulzSec's statement claims that they're not interested in Hijazi's money, but simply wish to expose his company's involvement with U.S. attacks on Libya's communication systems:

We call upon journalists and other writers to delve through the emails carefully, as we have uncovered an operation orchestrated by Unveillance and others to control and assess Libyan cyberspace through malicious means: the U.S. government is funding the CSFI to attack Libya's cyber infrastructure.

Further twists developed Saturday when a post appeared on Pastebin from someone claiming to have infiltrated LulzSec. According to the anonymous (but not Anonymous) poster, an IRC chat had led to a postive ID of four LulzSec members, naming Adrian Lamo of 2600.com as the registrar of lulzsecurity.com. A rebuttal of sorts followed shortly thereafter, claiming these supposed "unmaskings" to be nothing more than names thrown into the IRC-mix for trolling purposes:

sabu, avunti, topiary, kayla, tflow, entropy, marduk and joepie91
these are some of the lulzsec guys, distanced from anonops, keeping the heat low
sailing the lulzyboat

if you are lucky enough to be invited to their private channel
be aware it is one of many for trolling the trolls :)

yo dawg we herd j00 leik lulzsecs so we put an adrian lamos and kevin mitnicks in your lulzsecs
so you can lulz while you lulz

So, where does that leave everything? Who knows? LulzSec apparently took a joyride through Nintendo's servers, prying free a server configuration file but leaving everything else untouched, out of love for Nintendo according to their tweet:

Re: Nintendo, we just got a config file and made it clear that we didn't mean any harm. Nintendo had already fixed it anyway. <3 them!

With both the U.S. and NATO pledging to fight back against cyberattacks, it remains to be seen how much collateral damage will be needed to justify the use of something stronger than sternly worded statements. LulzSec has made it clear that others are willing to step in for Anonymous proper, if it/they are otherwise detained. While it's certainly conceivable that anti-Anonymous actions are going on behind the scenes, the events of this weekend wouldn't seem to bode well for governmental agencies worldwide.
 
http://www.tgdaily.com/security-features/56401-lulz-security-pwns-fbi-affiliated-website

matrixagents.jpg


Lulz Security pwns FBI affiliated website

Posted on Jun 5th 2011 by Trent Nouveau
90Share
Email
Share

The hacker group known as Lulz Security has reportedly pwned an FBI-affiliated website in retaliation for a recent U.S. DoD strategic report classifying cyber sabotage as an act of war.

According to an official communiqué, Lulz breached the digital security perimeter surrounding the Atlanta chapter of Infragard, took complete control of the site, defaced it and leaked the local user base.

Lulz Security pwns FBI affiliated website"While not very many logins (around 180), we'd like to take the time to point out that all of them are affiliated with the FBI in some way," the group explained.

"Most of them reuse their passwords in other places, which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too."

Indeed, Infragard employee Karim Hijazi apparently recycled his work password for two external e-mail accounts - allowing digital infiltrators to easily break into Unveillance, a whitehat company specializing in data security and botnets.



"Unveillance was compromised because of Karim's incompetence. We stole all of his personal emails and his company emails. We also briefly took over, among other things, their servers and their botnet control panel. After doing so, we contacted Karim and told him what we did.

"After a few discussions, he offered to pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim, a member of an FBI-related website, was willing to give us money and inside info in order to destroy his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information."

During the brief cyber foray, Lulz also managed to obtain documents pertaining to an alleged operation orchestrated by Unveillance and others to "control and assess" Libyan cyberspace through malicious means.

"The U.S. government is funding the CSFI to attack Libya's cyber infrastructure. You [can] find the emails of all 23 people involved in the emails," claimed Lulz.

"[In addition], Unveillance was involved in a scheme where they paid an Indian registrar $2,000 to receive 100 domains a month that may be deemed as botnet C&Cs. [All are] shameful ploys by supposed 'whitehats.' [Yes], we accept your threats NATO. Game on, losers."
 
http://www.thetechherald.com/articl...-troubled-waters-in-the-wake-of-LulzSec-visit

Unveillance faces troubled waters in the wake of LulzSec visit
by Steve Ragan - Jun 6 2011, 07:00
Unveillance faces troubled waters in the wake of LulzSec visit. (IMG: Unveillance)

Unveillance faces troubled waters in the wake of LulzSec visit. (IMG: Unveillance)

Email
RSS
Comment
Facebook
Twitter
Digg
FARK
Slashdot

In response to the news that the U.S. government wants to view hacking as an act of war, the group responsible for attacks on Sony and PBS targeted the Atlanta chapter of InfraGard, a security association that works with the FBI.

The aftermath of LulzSec docking their ship in InfraGuard’s port has resulted in accusations of corruption against data intelligence and metrics firm Unveillance.

The attack on InfraGard resulted in the public posting of nearly 200 usernames and passwords for those who joined the Atlanta chapter. However, those passwords are what led to the mini-HBGary Federal incident, which has recently tossed Unveillance and its founder, Karim Hijazi, onto the public stage.

At the time this story was published the Atlanta InfraGard website was offline.

Speaking about the InfraGard breach, LulzSec commented that most of the names on the leaked list reuse passwords, “…which is heavily frowned upon in the FBI/InfraGard handbook and generally everywhere else too.”

“One of them, Karim Hijazi, used his InfraGard password for his personal GMail, and the GMail of the company he owns. ‘Unveillance’, a whitehat company that specializes in data breaches and botnets, was compromised because of Karim's incompetence. We stole all of his personal emails and his company emails. We also briefly took over, among other things, their servers and their botnet control panel.”

The leaked emails, nearly a thousand of them in all, are a mix of personal and business related messages. However, there is more to this story, thanks to chat logs released by Hijazi and LulzSec.

In a statement, Hijazi said that over the last two weeks, he was contacted by several members of LulzSec, who made threats against him and his company in order to obtain money as well as sensitive data.

“In spite of these threats, I refused to pay off LulzSec or to supply them with access to this sensitive botnet information. Had we agreed to provide this data to them, LulzSec would have been able to grow the size and scope of their DDoS attack and fraud capabilities. Plain and simple, I refused to comply with their demands. Because of this, they followed through in their threats – and attacked me, my business and my personal reputation,” the statement explained.

Along with his comments, Hijazi published chat logs from an IRC conversation, which show LulzSec members attempting to extort him. You can read the statement and the chat logs here.

Not willing to back down, LulzSec published chat logs of their own, from a conversation held less than a day after the extortion chat between them and Hijazi.
Part of the Unveillance drama is that LulzSec has accused Hijazi of handing information over to the Cyber Security Forum Initiative (CSFI), in order to help them attack Libya's cyber infrastructure.

The LulzSec logs show Hijazi commenting that he regretted sending information to CSFI, but that he did so because he was in marketing mode at the time due to the fact that he was “truly starving”.

“That CSFI is odd. They took my data and ran,” Hijazi said when asked about his relationship with CSFI in the chat logs, “I don't know their intent. [If] it was what you referred to, I regret giving them data…”

In a statement LulzSec said that they were never going to extort anything from Hijazi.

“We were simply going to pressure you into a position where you could be willing to give us money for our silence, and then expose you publicly… Karim, founder of Unveillance, attempted from the start to work with us for his own gain, and he even offered us payment for certain ‘tasks’. These tasks, hardly subtle at this point, were those of a malicious nature; destroying Karim's competitors through insider info and holes Karim would supply us.”

The LulzSec chat logs and response to the Unveillance statement are here and here.

We’ve reached out to Hijazi for additional comment on the LulzSec chat logs. We’ll update this story with any new information.
 
BETTER THAN WIKILEAK! Hacked Govt Sites and Posted Govt's email & passwords online! :D :D
 
OK hackers! Hack LKY & post all his emails online pse! :rolleyes::D:D
 
Back
Top