Tag: anonymous

Missing Scot’s family disavows Anonymous video

anonThe family of a missing Scot have disavowed a video from Anonymous which threatens the Scottish police with cyber attacks for not doing enough to find him.

The video accuses the police investigators in the Allan Bryant case of failing to effectively investigate the case. However Bryant’s family have said that while the video did represent their views about Police Scotland not doing enough, they were shocked by the way it ended because they’re actually threatening police officers in Glenrothes.

.ryant’s father, also called Allan told the Daily Record: “I’ll not condone anything that threatens violence towards any police officers. It’s not the right way to go about things. I don’t want anyone threatening police officers in my son’s name.”

Bryant was last seen on 3 November 2013, outside a nightclub in Fife. A CCTV footage of him leaving the Styx Nightclub in Glenrothes was the last known sighting of the missing Scot, who his family now believe has been murdered.

The threatening video posted accused police investigators of “failing the Bryant family and went on to threaten the police by saying: “This is a message to Police Scotland. We are aware of your lack of cooperation with the family of missing man Allan Bryant junior. This is a warning to Police Scotland and particularly the Glenrothes Police headquarters — should you not to more to have the culprits that have harmed Allan Bryant junior brought to justice then we are going to initiate our very own justice against you and your officers.”

A Police Scotland spokeswoman said: “Police in Fife have been made aware of a communication that suggests reprisals towards officers in Glenrothes. The safety of the public and our officers is an absolute priority. Inquiries are ongoing to establish the full circumstances surrounding this and respond appropriately.”

Police Scotland added that the Allan Bryant missing person search “remains the largest ever conducted within Fife” and is still an ongoing investigation. The police have also appealed to the public to come forward with any information regarding Bryant’s whereabouts or movements after his departure from the Styx Nightclub.

CloudFlare protects IS claims Anonymous

anonOnline hacker collective Anonymous claims that its war on the Islamic State death cult is being hampered because a Silicon Valley startup is not too picky about its customers.

CloudFlare makes software which prevents denial of service attacks, which are Anonymous’ weapon of choice to take down websites.

The startup site serves more than four million customers, helping to defend against cyber-attacks and speeding up website loading times.

But a recent Anonymous has accused CloudFlare of protecting up to 40 websites linked to terrorism.

Posting on Twitter, Anonymous wrote: ‘Once again, @CloudFlare have been found to be providing services to pro #IslamicState websites. Shameful #OpISIS #Daesh #Anonymous.

Matthew Prince, CloudFlare CEO and founder, has since dismissed the claims as ‘armchair analysis’ and added that Anonymous uses it for some of its sites, despite pressure from some quarters for it to take Anonymous sites online.

Prince added that he would fully co-operate with any federal authorities who may wish to pursue the claims made by Anonymous.

“Even if we were hosting sites for ISIS, it wouldn’t be of any use to us. I should imagine those kinds of people pay with stolen credit cards and so that’s a negative for us.”

In 2013, the site faced similar accusations when they were accused of protecting a website linked to Al-Qaeda.

At the time Prince said CloudFlare was ‘protecting free speech’.

“A website is speech. It is not a bomb. There is no imminent danger it creates and no provider has an affirmative obligation to monitor and make determinations about the theoretically harmful nature of speech a site may contain”, he said.

‘If we were to receive a valid court order that compelled us to not provide service to a customer then we would comply with that court order.’

Anonymous takes down IS twitter accounts

anonHacker collective Anonymous has taken down more than 3,800 Twitter accounts linked to the Islamic State death cult.

The hacktivism outift declared war on the Islamic State on Monday after the Paris atrocities One day after declaring war on ISIS members, Anonymous has already managed to have an effect. It created an official Twitter account for the whole #OpParis operation, and a new website to centralise all IS accounts.

Besides scanning for IS Twitter accounts themselves, the hacking group has also opened access to the site to those interested. Anyone who comes across IS social media accounts can easily search the database and report any new accounts and supporters.

The website is called #opIceISIS and will index IS members based on their real name, location, picture, Twitter, Facebook, and YouTube accounts.

This is the second time Anonymous attacked IS. The first time was after the Charlie Hebdo attacks, earlier this year, during operation #OpISIS. That time, the group managed to take down tens of thousands of accounts.

With over 3,800 just on the first day, the group seems more determined this time around to finally put an end to the terrorist group at least on Twitter.

The Ghost Security Group, another secret hacking group, revealed that it traced Bitcoin wallets holding more than $3 million back to known IS members.

With Anonymous’ most recent additions of known ISIS members to their database, law enforcement agencies and other hacking groups might be able to track down more accounts and hinder the terrorists’ activities.

Anonymous outs KKK members

KKK-1000x600Hacker collective Anonymous has been outing members of the quasi-masonic racist terror group the KKK.

The names of four senators and five City mayors have been included on Anonymous’s list which includes the details of the politicians, their spouses and the local chapter of the KKK to which they are purported to belong. The person who posted the information said they redacted the politicians’s home addresses to prevent anyone taking action directly against them.

Anonymous, the amorphous online activist collective, last week promised to reveal the identity of 1,000 members of the KKK after coming into possession of the private information through a compromised Twitter account associated with the group.

Anonymous hackers have so far published four separate listings on text-sharing website Pastebin, including 57 phone numbers and 23 email addresses.

There has been no verification of the details so far, but Anonymous has vowed to reveal the full identities of up to 1,000 members of the KKK Thursday, November 5 to coincide with the group’s global protest movement, called the Million Mask March.

So far though none of the phone numbers connected to anyone and some on the list are not members of the KKK, with one being a member of the Sons of Confederate Veterans, a historical group populated by relatives of Confederate soldiers.

Anonymous and the KKK have been battling it out in cyberspace for almost a year, ever since the protests in Ferguson when a local chapter of the Klan weighed into the debate by warning that it would use “lethal force” against anyone protesting on the streets of Ferguson.

In its statement addressed to the members of the KKK, Anonymous told the  group: “After closely observing so many of you for so very long, we feel confident that applying transparency to your organizational cells is the right, just, appropriate and only course of action. You are abhorrent. Criminal. You are more than extremists. You are more than a hate group. You operate much more like terrorists and you should be recognised as such.”

Hack helped hackers

anonA US court has decided that journalist Matthew Keys helped members of the Anonymous hacking collective break into his former employers’ computers.

Keys, 28, was indicted in 2013 for conspiracy to cause damage to a protected computer and two other counts, after being accused of giving hackers access to the Tribune computer systems in December 2010. Keys had just left a job at a Tribune-owned television station after words with a dispute with a supervisor.

The hackers then went on to change a story on the Tribune’s Los Angeles Times website.

Keys denied the charges and his brief Tor Ekeland said he would appeal the verdict.

Sentencing is scheduled for January 2016. The Justice Department has not determined what sentence it will request, but it will likely be less than five years, spokeswoman Lauren Horwood said.

Prosecutors claimed Keys urged on the hackers by giving them a password. But Keys’s lawyer had told jurors he was operating as a professional reporter trying to gather information about members of Anonymous.

The events occurred before Keys joined Thomson Reuters as a Reuters.com editor in 2012. A month after Keys was charged, he said Reuters dismissed him.

Plug pulled on anonymous Wi-Fi

spyRhino Security Labs has pulled the plug on an anonymous Wi-Fi device it was developing just a month after its existence was announced.

Security researcher Benjamin Caudill from Rhino Security Labs unveiled Proxyham, a device small enough to be slotted into a book and squirrelled away in a separate location from the user in order to confuse Internet traffic tracking systems.

The $200 device was made up of a Raspberry Pi PC and antennas. The product uses low-frequency radio channels to connect to public Wi-Fi hotspots up to 2.5 miles away, and if a user’s signature is traced, the only IP address which appears is from the Proxyham box which can be planted far away from the user.

At the time Caudill was quoted as saying, “You can have it all the way across town, and worst case scenario the police go barge into the library across town”.

He was supposed to be showing it off at the Def Con hacker conference in Las Vegas next month, but now that will not happen.

The sale and distribution of the Proxyham anonymous Internet browsing device, source code and blueprints has been stopped in its tracks.

Through Twitter, Rhino Labs said “Effective immediately, we are halting further dev on Proxyham and will not be releasing any further details or source for the device.”

Caudill will no longer be hosting a talk at Defcon on the device, whistleblowers and the challenge of being anonymous online and no one is saying why.

I could be because the outfit has secretly flogged it to another party. However, this was quickly quashed by the security firm, which said they “can’t go into any further details” on either the research or cancelled talk.

What is more likely is that it has received a National Security Letter which would also act as a gagging order.

Anonymous hijacks thousands of routers

anonOnline activists Anonymous, have hijacked hundreds of thousands of home and office Internet routers.

Security firm outfit Incapsula said the hackers target routers that have factory-default usernames and passwords, an “inexplicably negligent” mistake by ISPs and users alike.

The hijacked routers, located mostly in the US, Thailand, and Brazil, were infected by various potent malware and used to build a botnet that began attacks against dozens of targets in late December 2014.

Using the Internet bandwidth from the homes and offices of these routers, the owners of these botnets wield a weapon that packs a heavy punch against online targets.

Many of the hijacked machines reported back to AnonOps.com, a gathering point for the Anonymous activist group, “indicating that Anonymous is one of the groups responsible for exploiting these under-protected devices,” the report claims.

The hacking was first discovered by Incapsula last year when dozens of its customers were victims of what researchers describe as a “homogenous botnet” made up of swaths of nearly the same home and office routers.

An investigation revealed that all the hijacked routers suffer from lax security and were remotely accessible via HTTP and SSH on their default ports.

The botnet was self-sustaining. Newly hijacked routers will scan for other vulnerable machines; when a good target is found, an automated script easily conscripts it into the botnet’s ranks.

The malware infecting the machines includes the popular MrBlack trojan to new and as-yet unidentified pieces of malware.


Anonymous hacks the FBI

The Slovenian branch of Anonymous claims it has hacked the FBI and uploading email addresses and personal information relating to the director to online storage site Pastebin.

Black-Shadow of the Slovenian branch of Anonymous said he has posted the FBI domain email addresses and passwords for 68 agents, although the user claims in his post that the collected log-in details are “not all ours”.

His post also includes a short profile on FBI director James Comey, including sensitive information such as his date of birth, his wife’s name, the date they got married, his educational history and even the geographical coordinates of his residence. Handy if you have access to a spare drone or cruise missile.

Two internal FBI websites are also included in the post – the FBI’s Virtual Academy website from its training division, and the FBI Agents Association.

Two of the FBI’s domain name servers for its website www.fbi.gov were targeted, and the hackers took information from seven open ports on the servers.

Anonymous Slovenia posted the Pastebin link on its Facebook Page, along with the comment “Laughing at your security.” We guess that the only thing the Americans could come back at is that the Slovenians serve donkey in their pizza restaurants.

Anonymous has been out of the headlines lately thanks mostly to infighting amongst its members. It had developed a reputation for being script kiddies using DoS attacks. This particular take down suggests that there are some good hackers in the organisation who are working despite of the organisation’s shortcomings. 

Ipsos denies selling PERSONAL EE user data to Met police

Ipsos Mori has denied that it offered to sell personally identifiable information from the call and text data of 27 million EE mobile network customers, but does not deny offering to sell anonymised information.

The research firm said it “absolutely refutes” accusations in the Sunday Times, which claimed that it had been offering EE call and text data to the police, as well as boasting that the data it had collated could be used to track individuals and their locations in and around 100 metres.

It is thought the police may have had an interest in the offer but backed out of the deal once it became public. The Metropolitan Police confirmed to the Sunday Times it had spoken with Ipsos Mori. 

Ipsos Mori did not deny it was offering information full stop, instead assuring EE customers that any data was thoroughly anonymised.

In a statement, Ipsos Mori said it “absolutely refuted the suggestion that it [was] offering access to individual personal data for sale”.

Instead it said its mobile analytics explored user volume, demographics and mobile web use from anonymised and aggregated groups of people.

“In conducting this research we only receive anonymised data without any personally identifiable information.

“We have taken every care to ensure it is being carried out in compliance with all relevant legal and regulatory requirements, including the Data Protection Act and Privacy and Electronic Communications (EC Directive) Regulations (both as amended),” it added.

As a result it said it could assure customers that it only received anonymised data without any personally identifiable information on any individual customers. The statement did not reveal exactly which demographics were up for sale.

“We do not have access to any names, personal address information, nor postcodes or phone numbers,” it said.

Reuters social media editor wanted for hacking

The deputy social media editor at Reuters.com, is to be arrested for conspiring with members of the Anonymous hacking collective.

According to his employers, a federal grand jury has indicted Matthew Keys for working with the hackers to break into the computers of his former employer the Tribune.

Apparently it all happened before he joined Thomson Reuters.

Keys faces three charges including a conspiracy to transmit information to damage a protected computer. The plan apparently was to give Anonymous access to Tribune websites.

The hackers edited a story on the Tribune’s Los Angeles Times website.

Keys tweeted that he found out about the charges from Twitter and tomorrow everything will be business as usual.

A Thomson Reuters spokesperson said the indictment alleges the conduct occurred in December 2010 and Keys joined Reuters in 2012. They did not say if he was still working for them, but a Thomson Reuters employee at New York says Keys’ workstation was being dismantled and that his security pass had been deactivated.

Keys became a suspect because he had been fired in October 2010 and refused to hand over control of the Facebook and Twitter accounts he had run for Fox 40.

Keys told a colleague that he had penetrated an elite chat group used by some of the most sophisticated members of Anonymous.

He claimed to have learned of attacks on the Tribune’s Los Angeles Times, eBay’s PayPal and other companies and two days later, a story on Latimes.com was defaced.

When the Times story was altered, Keys responded “nice,” according to the indictment.

The FBI claims that Keys was playing a double game for weeks before getting kicked out of the chat group. He took screenshots of the hacking group’s chats and sent them to media outlets.

However, one of the leading figures of Anonymous, Sabu, claimed that Keys “gave full control of LATimes.com to hackers”.

Sabu, AKA Hector Xavier Monsegur, was arrested later in 2011 and turned supergrass while continuing to lead an Anonymous spinoff called LulzSec, according to court documents.