‪#‎OpIsraelBirthday‬: Hackers of the World Uniting Forces for a Massive Cyber Attack against Israel on 7 April 2014

The online hacktivist AnonGhost along with a group of hackers has decided to attack Israeli cyber space on 7th April, 2014 when the country will be celebrating its birthday.

One of AnonGhost’s representative told us that this cyber attack will be conducted under the banner of #OpIsraelBirthday in which every possible Israeli website will be targeted in order to show their solidarity with Palestine.

To give a better understanding about the op, hackers have released a video on YouTube which is available below:

Currently the teams involved in the operation are: Mauritania Attacker , Virusa Worm, Deto Beiber, Dr.SaM!M_008, M3GAFAB , Extazy007, PhObia_PhOneyz, Mr Domoz, Tak Dikenal, AnonxoxTN, Raka 3r00t, PirateX, Bl4ck Jorozz, Younes Lmaghribi, Indonesian r00t, BlackBase Hacker, CoderSec, h4shcr4ck, Mrlele, Donnazmi, TheGame Attacker, Man Rezpector, SaccaFrazi , Spec Tre, HusseiN98D, HolaKo, Mr.Ajword, Root Max, Egy Eagle, THE GREATEST, BiosTeRminat0r, Man Rezpector, Hani Xavi, Don Maverick, Psyco Hacker , Black Cracker, rummykhan, Root Max, VINUX, ARAFET, TITO_SFAXSIANO and SquiCk H4ck3r

Last year these were the same group of hackers united from around the world against Israeli cyber space. Let’s see what they will do this time.

Stay with us as we will be updating you as more team are expected to join as claimed by AnonGhost.

Hackers to use mobiles to mount DDoS attacks

Mobile devices are reportedly being used for mounting attacks on businesses by Distributed Denial of Service (DDoS) attackers.

Prolexic Technologies' president Stuart Scholly said that in 2014, applications commonly used in DDoS attacks like Low Orbit Ion Canon (LOIC) will increasingly become ported to mobile platforms.

The company also detected the use of AnDOSid, an Android app that can mount an HTTP POST flood attack, PC World reported

With easy availability of downloadable apps and open option for users to join DDoS campaigns, the increase in number of DDos attacks is said to be a game changer.

A 2013 report released by an American-based DDoS protection firm suggested that mobile phones will continue to play a prominent role in DDoS attacks, targeting still infrastructure.

According to the report, DDoS attacks on Prolexic clients in 2013 increased by 26% over the preceeding year and attacks on still infrastructure amounted to 76% of total recorded attacks, with the largest attack surpassing 179Gbps.

20 Million Credit Cards stolen in South Korea, 40% Population affected by the Data Leak

Since all threats to data security and privacy often come from outside, but internal threats are comparatively more dangerous and a difficult new dimension to the data loss prevention challenge i.e. Data Breach. The "Insider threats" have the potential to cause greater financial losses than attacks that originate outside the company.

This is what happened recently with three credit card firms in South Korea, where the financial and personal data belonging to users of at least 20 million, in a country of 50 million, was stolen by an employee, who worked as a temporary consultant at Korean Credit Bureau (KCB).

“Confidential data of customers ranging from the minister-level officials to celebrities, including their phone numbers, addresses, credit card numbers, and even some banking records, have been leaked from Kookmin Bank, Shinhan Bank and several other commercial banks”,

The stolen data includes the bank account numbers, customers' names, social security numbers, phone numbers, credit card numbers and expiration dates, according to the estimate by the Financial Supervisory Service (FSS).

The arrested employee behind the theft, later sold the data to phone marketing companies, whose managers were also arrested earlier this month.

"The credit card firms will cover any financial losses caused to their customers due to the latest accident," the FSS said and assured that the Regulators have launched investigations into security measures at the affected firms.

"Their parent firms seem to be taking a step back (from the issue) and not showing any responsible attitude, We will hold them fully responsible for the data leak if their sharing of client data among affiliates and internal control turn out to be the cause."

Now this is not the first time when a company is facing data breach because of Insider Threat, last month an employee of Citibank Korea was arrested for stealing the personal data of 34,000 customers. In 2012, two South Korean hackers were arrested for data from 8.7 million customers in the nation's second-biggest mobile operator.

Syrian Electronic Army(#SEA) Website hacked by Turkguvenligi, Turkish hacker

One of world best back-hat hackers "Syrian Electronic Army" own official website hacked by Turkguvenligi, Turkish Hacker. 

According to Turkguvenligi, they clam to hack Syrian Electronic Army official sites sea.sy and leaks.sea.sy. Both sites are defaced by hacker. SEA also consider as world top hackers. They hacks include Microsoft, Skype and media sites New York Times. SEA mostly use hacking techniques like phishing and social engineering. But Turkguvenligi who are consider as Elite Class hackers exploit their server.

According to Syrian Electronic Army (SEA) Hackers
"The hosting company that hosts #SEA websites, including (http://leaks.sea.sy) was attacked... (sea.sy) was not affected. Since the #SEA servers is managed by the hosting company, they down the servers quickly to make sure that will not happen again. Such attacks will not affect the #SEA, we will continue our hacks and operations."

Deface Page Say's:
"You imbecils will attack our country with fake phishing emails and we'll accept your lies and dont do anything ? That is the end you deserve:

"And never think that Allah is unaware of what the wrongdoers do. He only delays them for a Day when eyes will stare [in horror].
Ibráhím - 42
For only conscientious people ! http://www.youtube.com/watch?v=c0hOYa6Q0a0

BREAKING NEWS BASHAR ASAD AND HIS ORGY CREW(SEA) GET SACKEDFear not the elite phishing crew has been brought down to where it belongs, the hacking scene will never accept social media savvy and attention seeking so called "hackers". It was always a underground realm and the real can distinguish the real in this game. We sit back hand asses while these lowly kids make twitter accounts and do phishing to outdated professionals in the COMP-SEC field. The show is over and this is just a mere example of Underground vs self-proclaimed-l337-hackers. We don't need to make achievement videos , put high-profile professionals info on the internet, or deface targets that are strictly aimed for media attention. For those that know us have a clear understanding of our achievements and what we can accomplish. And believe me you are just an average joe on my block ;)
End of the game for dogs of the murderer "asad". In support of russia, you worked hard to make people believe in that you are right to make muslim massacre in syria. And we warned you before, as you see below ;)
Gerizekalıların ddos saldırılarını yıllardır hack diye haber yapan yavşak ve de bir o kadar da cahil Türk medyasının editörleri, özellikle sizin haber yapmanızı İSTEMİYORUZ, duyrulur. ;)

Greetz; Our old friend, spo0feR(Pakistani Hacker) ;)"

Hacked Sites:


Israel Project Website Hacked and defaced by AnonGhost

The Israel Project website has been defaced by AnonGhost

AnonGhost has hacked The Israel Project website, they have left the website defaced as you can view here. AnonGhost has actively been hacking Israeli websites for the last years. The AnonGhost team emerged from the TeamPoison hacking crew that has been disbanded.

What is TIP

Founded in 2003, The Israel Project (TIP) is a non-partisan American educational organization dedicated to informing the media and public conversation about Israel and the Middle East.

A one-stop source for detailed and accurate information, TIP provides facts to press, policy makers and the public on issues affecting Israel and the Middle East, the Jewish people and America’s interests in the Middle East.

TIP does not lobby and is not connected to any government. TIP informs, providing facts, access to experts and keen analysis. It offers real-time background information, images, maps, audio, video, graphics and direct access to newsmakers. TIP organizes press briefings and speaker tours, conference calls and educational trips, supports non-profit journalism, conducts public affairs research and adheres to the highest possible standards of accuracy and reliability.

Working in multiple languages, the TIP team collectively has decades of experience in media, government, policy institutes, research, academia and the military.

TIP has an extensive Arabic media program. More than 1.2 million Arabic-speaking social media subscribers already follow content on TIP Arabic’s Facebook page Israel Uncensored.

Facebook Scam: Win a Disney Cruise with $2,000 Spending Money

Cammers have created Facebook pages called “Walt Disney World” on which they claim to be giving users the chance to win a trip via Disney Cruise.

“Great news, we're giving you a chance to get a Disney Cruise for you and 5 friends to 50 people from us with $2,000 spending money for a date of your choice. To enter Just Share this video then go here: www.disney-cruise-lines.com,” the posts entitled “Win a Disney Cruise with $2,000 spending money” read.

The so-called competition has nothing to do with Disney. Furthermore, the link doesn’t actually point to the Disney Cruise Lines website, but to a site where users are instructed to complete a survey in order to allegedly win various prizes, Hoax Slayer warns.

Each time one of these surveys is completed, the scammers make some money via affiliate networking services. Furthermore, some of the sites also instruct users to hand over personal information, which can also be monetized in various ways.

Finally, by tricking users into liking their bogus Facebook pages, the cybercrooks are actually increasing their values. Pages with a large number of likes can be worth a lot of money on the underground market since they can be repurposed for other shady activities.

If you’re a victim of this scam, remove the post you’ve shared on your timeline. If you’ve completed the survey and handed over some personal information, watch out for other scams, since it’s likely that you’ve ended up on the scammers’ list of potential victims.

I’ve seen three of these fake “Walt Disney World” pages, but others might appear soon. The ones that are currently online have harvested as many as 21,000 likes. If you come across such pages, report them to Facebook.

Cyber Attack Hit Japanese Nuclear Power Plant using Special Malware

Software update cause Malware attack on Japanese Nuclear Power Plant.

When japan was hit by Earth Quick last year then it was also discovered that japan was working on some secret nuclear power Plants. So this may be possible that world power want to get information about Japan Nuclear Power Plants and have an eye on them.

The most critical and worst target of a State-sponsored cyber-attacks could be Hospitals, Dams, Dykes and Nuclear power stations and this may cause military conflicts between countries.

According to Japan Today, The Monju nuclear power plant in Tsuruga, Japan was accidentally targeted by a malware on 2nd January, when a worker updated the system to the latest version of the video playback program. Monju Nuclear Plant is a sodium-cooled fast reactor, was launched in April 1994. It has not been operational for most of the past 20 years, after an accident in which a sodium leak caused a major fire. Employees over there are only left with a regular job of company's paperwork and maintenance. So the malware could have stolen only some sensitive documents, emails, training records and employees' data sheets. The Malware command-and-control server suspected to be from South Korea. The malware itself is not much sophisticated like Stuxnet or Duqu, but the unmanaged software update and patch management system can seriously lead to a critical cyber attack. Even being isolated from the Internet does not prevent you from being infected. One of the best examples of flawed Internal policies is Stuxnet, one of the most infamous pieces of malware ever created to destroy Iranian Nuclear plants and infected the systems through a USB stick only. Also in November, The Kaspersky revealed that Russian astronauts carried a removable device into space which infected systems on the space station.

Related Posts Plugin for WordPress, Blogger...