Malware infected International Atomic Energy Agency Computers

 
Malware infected some UN Nuclear Agency computers
Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key role in global efforts to prevent the spread of nuclear weapons, said on Tuesday that some of its computers were infected by malicious software, during the past several months.
Malware can typically be used by cyber-attackers to gain remote access to systems, or to steal data, however spokesman Serge Gas said. “No data from the IAEA network has been affected.”
The computers were located in common areas of the agency’s Vienna headquarters, known as the Vienna International Centre (VIC).
A third-party technician or visitor with the USB-drive infected with crimeware can be used to infect the system. “The (IAEA) secretariat does not believe that the USB devices themselves were infected or that they could spread the malware further” he said.
Last November, the IAEA revealed that Iranian hackers had accessed one of its former computer servers and posted the contact details of some of the watchdog’s experts online.
Protecting information is vital to the IAEA’s work. The agency continuously endeavours to achieve the highest possible level of protection of information,” Gas said.
The authority did not go into explicit details regarding the malware itself, but did stress that the use of removable media had to be reviewed and tightened.

Read more: http://thehackernews.com/2013/10/malware-infected-international-atomic.html#ixzz2iiH4NNRx
Follow us: @TheHackersNews on Twitter | TheHackerNews on Facebook

Chinese Hackers Caught by US water control system Honeypots

Chinese Hackers Caught by Honeypot US water control system
A notorious Chinese hacker collective known as APT1 or Comment Crew, possibly linked to the Chinese Army, have been caught red handed breaking into a fake United States water control system i.e. known as a Honeypot.
Kyle Wilhoit, a researcher with security company Trend Micro has just revealed the details at BlackHat Conference on Wednesday.
Hackers hacked a water control system for a US municipality back in December last year, but it was merely a decoy set up by Kyle Wilhoit using a Word document hiding malicious software to gain full access.
The honeypots directly mimicked the ICS/Scada devices used in many critical infrastructure power and water plants. Cloud software was used to create realistic Web-based login and configuration screens for local water plants seemingly based in Ireland, Russia, Singapore, China, Japan, Australia, Brazil, and the U.S.
Researchers have been tracked back to the APT1 Group, which security company Mandiant has claimed operates as part of China’s army. Wilhoit used a tool called the Browser Exploitation Framework, or BeEF, to gain access to his attackers’ systems and get precise data on their location. He was able to access data from their Wi-Fi cards to triangulate their location.
Between March and June this year Wilhoit’s 12 honeypots attracted 74 attacks and roughly half of the critical attacks on his honeypots come from China, with Germany, UK, France, Palestine and Japan. “I actually watched the attacker interface with the machine. It was 100 percent clear they knew what they were doing.” Wilhoit said.
The incident has led Wilhoit to believe that other utilities around the world may have already been infiltrated by hackers, and that engineers working at these facilities may not realize that their systems have been compromised. The attacks reportedly occurred before the US opened talks with China over cyber security.

 

Mohit Kumar aka ‘Unix Root’ is Founder and Editor-in-chief of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. Follow him @ Twitter | LinkedIn | | Email | Facebook Profile

 

 

 

http://thehackernews.com/2013/08/Chinese-hackers-APT1-honeypot-water-control-system.html

 

Massive Brute-force attack Targets WordPress sites worldwide

A large distributed brute force attack against WordPress sites is understood to be occurring. A large botnet with more than 90,000 servers is attempting to log in by cycling through different usernames and passwords.

According to a blog update on IXWebHosting, they are currently experiencing issues where there is a brute force attack on the default WordPress login pages of  their customers.
Massive Brute Force attack using Botnet Targets thousands of WordPress sites
As you can see from our numbers, we were seeing 30 to 40 thousand attacks per day the last few months. In April 2013, it increased to 77,000 per day on average, reaching more than 100,000 attempts per day in the last few days.Sucuri study says.
.
This attack is greatly effecting Linux servers and attack is possibly conducted using botnets. To solve the issue, hosting administrator block all connections to wp-login.php.
.
At this moment, we highly recommend you log into any WordPress installation you have and change the password to something that meets the security requirements specified on the WordPress website. These requirements are fairly typical of a secure password: upper and lowercase letters, at least eight characters long, and including “special” characters (^%$#&@*).” Hostgator recommends to their users..
.
A large botnet has been attempting to break into WordPress websites by continually trying to guess the username and password to get into the WordPress admin dashboard. This is affecting almost every major web hosting company around the world. Our Network Operations Centre (NOC) has detected a significant increase in botnet activity in the last 24 hours.” Spiral Hosting also issue notice to their customers.
.
Users are advised to use .htaccess to protect their admin area and to rename the login pages. This is a global issue affecting all web hosts. Stay tuned to our Twiter and Facebook Page for further information.
.
Mohit Kumar aka ‘Unix Root’  is Founder and Editor-in-chief  of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. Follow him @ Twitter | LinkedIn |   | Email | Facebook Profile

WordPress Pingback Vulnerability Serves DDoS attack feature

Author : Mohit Kumar on 12/18/2012 06:47:00 AM
WordPress Pingback Vulnerability

Accunetix a web application security company reported vulnerabilities found in the WordPress Pingback feature. According to report, Pingback vulnerability exists in the WordPress blogging platform that could leak information and lead to distributed denial of service (DDoS) attacks.

.
WordPress has an XMLRPC API that can be accessed through the xmlrpc.php file. When WordPress is processing pingbacks, it’s trying to resolve the source URL, and if successful, will make a request to that URL and inspect the response for a link to a certain WordPress blog post. If it finds such a link, it will post a comment on this blog post announcing that somebody mentioned this blog post in their blog.” Bogdan Calin explained.
.
Pingbackis one of three types of linkbacks, methods for Web authors to request notification when somebody links to one of their documents. This enables authors to keep track of who is linking to, or referring to their articles. Some weblog software, such as Movable Type, Serendipity, WordPress, and Telligent Community, support automatic pingbacks where all the links in a published article can be pinged when the article is published.
.
WordPress Pingback Vulnerability
.
A new tool has been released that automates the pingback vulnerability autonomously, distributed on the software development site Github as “WordPressPingbackPortScanner” . That tool exposes the API and lets attackers scan other hosts, multiple WordPress blogs and with a specialized URL, reconfigure routers.
.
Tool description –WordPress exposes a so called Pingback API to link to other blogposts. Using this feature you can scan other hosts on the intra- or internet via this server. You can also use this feature for some kind of distributed port scanning: You can scan a single host using multiple WordPress Blogs exposing this API.
.
The bug is already reported on WordPress community, but Softpedia notice that the ticket was closed at the time after someone argued that “there are so many ways to orchestrate a DDOS attack.”
.
All the wordpress blogs are at risk,can be heavily  abused by attackers. Since the WordPress also supports URL credentials , the attacker can use a link like http://admin:admin@192.168.0.1/changeDNS.asp?newDNS=aaaa to reconfigure internal routers.
.
He also says that disabling the Pingback feature won’t fix the solution ,the ultimate solution is a patch.

About Author:

Photo Mohit (Mobile)Mohit Kumar aka ‘Unix Root’  is Founder and Editor-in-chief  of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure.

http://thehackernews.com/2012/12/wordpress-pingback-vulnerability-serves.html

Hackers Hit Former U.S. Military Chief

 

Author : Mohit Kumar on 12/07/2012 06:28:00 AM
According to reports, the hackers targeted personal computers retired Admiral Mike Mullen, the former chairman of the Joint Chiefs of Staff. The FBI is hunting for foreign hackers. Mullen is currently teaching WWS 318: U.S. Military and National and International Diplomacy and will teach an unnamed graduate seminar in the spring.
According to Mullen’s aides, however, he did not save or view classified information on his personal computers. Agents from an FBI cyber-security unit contacted Mullen in late October or early November, and asked that he surrender his computers in connection with the ongoing inquiry. Mullen agreed, and in early November at least one FBI agent collected the computers at his office at the U.S. Naval Institute.
Hackers+Hit+Former+U.S.+Military+Chief
One official said that evidence gathered by the FBI points to China as the origin of the hacking, and that it appeared the perpetrators were able to access a personal email account of Mullen.
Officials said that Mr. Mullen has had access to classified information while working on the Benghazi investigation, but his own computers weren’t in such a heavily protected network.
China is often cited as a suspect in various hacking attacks in the United States and other nations. Beijing dismisses allegations it is involved.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’  is Founder and Editor-in-chief  of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure.

Sensitive information of 1 Million people breached at Nationwide Insurance

 
Author : Mohit Kumar on 12/02/2012 09:25:00 PM
Nationwide Insurance was breached last week  and Sensitive information of about 1 Million people is at risk. The FBI is  investigating a breach, including policy and non-policy holders.
.
Nationwide mailed notices to all affected  individuals last Friday. Insurance Commissioner Ralph Hudgens issued the  following statement Monday concerning the unauthorized access of Nationwide  Insurance‘s website.
.
Spokeswoman Elizabeth Giannetti confirmed a statement by the California Department of Insurance  earlier in the day which said “names, social security numbers, and other  identifying information” of one million policyholders and non-policy holders  were exposed. No credit card details were revealed.
.
breached+at+Nationwide+Insurance
.
About 30,000 people in Georgia were affected,  as well as more than 12,000 in South Carolina.
Are  you affected ? call The Nationwide at  number 800-760-1125. Affected members and applicants free credit  monitoring and identity theft protection services from Equifax for at least one  year.
.
The insurance company has not provided details  on how a database on its computer system was compromised.
.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a Security  Researcher and Analyst, with experience in various aspects of Information  Security. His editorials always get people thinking and participating in the new  and exciting world of cyber security. Other than this : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to  make internet more Secure.

Read more at http://thehackernews.com/2012/12/sensitive-information-of-1-million.html#bGEqKbfr5O1mtMXg.99

XSS vulnerability in 4shared and NATO Multimedia Library Exposed

Posted by Mohit Kumar on 11/28/2012 05:20:00 AM|
 

Inj3ct0r Team found cross site scripting vulnerability in 4shared , a file sharing site. Vulnerability link is exposed in a note available at their website.
In general, cross-site scripting refers to that hacking technique that leverages vulnerabilities in the code of a web application to allow an attacker to send malicious content from an end-user and collect some type of data from the victim.
NATO+Multimedia+Library+Online+Catalog
Also same hackers claiming to get access over a private server of NATO Library and expose the links online. Website titled “NATO Multimedia Library Online Catalog“.
Inj3ct0r member told The Hacker News, “We found another secret NATO server. We received a root on the server and gave the world the hidden database to NATO personnel. Now everyone can look for a secret document.”

These three servers are available online without authorization, but its not confirm that servers got hacked or not.

Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’ is Founder and Editor-in-chief of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure.

Hackers break into International Atomic Energy Agency servers

The UN nuclear watchdog has acknowledged one of its former computer servers had been hacked. The stolen information was contained in a statement by a group with an Iranian-sounding name calling for an inquiry into Israel’s nuclear activities. The International Atomic Energy Agency (IAEA) is investigating Iran’s nuclear program.
Hackers+break+into+International+Atomic+Energy+Agency+servers
A group called Parastoo Farsi for the swallow bird and a common Iranian girl’s name claimed responsibility for posting the names on its website two days ago. The group had been known to be critical of Israel’s undeclared nuclear weapons program.
The IAEA deeply regrets this publication of information stolen from an old server that was shut down some time ago,” agency spokesperson said and agency experts had been working to eliminate any “possible vulnerability” in it even before it was hacked.
Israel and the United States accuse Iran of seeking to develop a nuclear weapons capability, a charge Tehran denies, and says the Islamic state is the main proliferation threat.
It is commonly believed that Israel possesses nuclear weapons, though it has never confirmed, nor denied the fact. Tehran has strongly denied any allegations, insisting that its nuclear program is peaceful.
Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’ is Founder and Editor-in-chief of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure

Israeli Hackers Leak Credit Card Data from Palestine ISP

!!EEV: Again, always proceed with caution when clicking unknown links!!

Along war with airstrikes between Israel and Palestine, Cyber war between hackers from both country on fire.
.
First Hackers from all over world who supporting Palestine start attacking Israeli sites, now a hacker going by name “yourikan” has leaked a complete database from an ISP called PALNET (http://www.palnet.ps).
.
palnet
In a statement, hacker told ‘The Hacker News’, “this is in react of the latest terror from Palestine in the missiles against Israel and the cyber war against us say no to Palestine! say no to terror!
.
Leaked database has been posted on pastebin and downloadable file on anonfiles and including credit card details and full personal address, numbers, names of various Israeli users and admin password and snmp secrets files.
.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’  is Founder and Editor-in-chief  of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure.

 

http://thehackernews.com/2012/11/israeli-hackers-leak-credit-card-data.html

Anonymous Hackers may have hacked Former CIA Director David Petraeus

Posted by Mohit Kumar on 11/10/2012 10:55:00 PM |
broadwell-petraeus_2394589b
CIA Director was uncovered when a woman described as close to him received harassing emails and complained to authorities. The FBI traced the emails and found that they had been sent by Paula Broadwell, who wrote a highly favorable book on the former Army general’s life and work. While initially investigating the reports, the FBI feared the CIA director’s personal email account may have been hacked, but the sexual nature of the email exchanges exposed the affair.
.
A Yahoo email account belonging to former CIA Director David Petraeus may have been compromised by the group Anonymous. The personal email account was exposed during the the leak of commercial intelligence company STRATFOR by Anonymous Hackers, among other millions of email accounts of customers belongs to the company.
.
The emails sent by Broadwell indicated that she perceived the other woman as a threat to her relationship with Petraeus, law enforcement officials. Anonymous also obtained email logins to STRATFOR’s website   which potentially could have been used by Paula Broadwell for email or other secure sites as well as correspondence.
.
Broadwell was reportedly under investigation by the Federal Bureau of Investigation for allegedly trying to obtain access to the retired general’s classified emails. Broadwell, a married mother of two young sons, apparently had no idea any of this was coming.
.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar aka ‘Unix Root’  is Founder and Editor-in-chief  of ‘The Hacker News’. He is a Security Researcher and Analyst, with experience in various aspects of Information Security. His editorials always get people thinking and participating in the new and exciting world of cyber security. Other than this : He is an Internet Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to make internet more Secure. Follow him @ Twitter | LinkedIn |   Google | Email

http://thehackernews.com/2012/11/anonymous-hackers-may-have-hacked.html

Guy Fawkes Day start with Hack of 28,000 Paypal Accounts

Guy+Fawkes+Day
5th November 2012 was the  most exciting day in Cyberspace, yesterday we have report about  few major hacks and leaks including Hacking  of ImageShack Server , thousands of researchers  database leak from Symantec portal, then NBC  Sports Rotoworld forums and NBC  Mobile site was defaced by pyknic hacker and a claim that user names  and passwords for the site had been compromised, Anonymous leaks the VMware  ESX Server Kernel source code online , numerous Australian sites, and  the Organization for Security and Cooperation in Europe.
The Guy Fawkes Day start with the  hack of  28,000 Paypal Accounts. AnonymousPress tweeted, “Paypal hacked by Anonymous as part of our November  5th protest privatepaste.com/e8d3b2b2b1 #5Nov” (File Removed now)
Private Paste documents contained 27,935  entries from Paypal database table “mc_customers” including emails, names, passwords (encrypted) and corresponding telephone  numbers.
However according to PayPal’s head of PR, they  claim to be investigating the alleged hack, but so far they have stated that  they are unable to validate any evidence that there has been a security breach  which we can only take to be a good thing

– See more at: http://thehackernews.com/2012/11/guy-fawkes-day-ends-with-hack-of-28000.html#sthash.8Gjujh22.dpuf

Photo-Mohit+(Mobile)

Mohit Kumar  aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a Security  Researcher and Analyst, with experience in various aspects of Information  Security. His editorials always get people thinking and participating in the new  and exciting world of cyber security. Other than this : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to  make internet more Secure

 

 

GhostShell leaks 2.5 million Russian government accounts as #ProjectBlackstar

Posted by Mohit Kumar on 11/03/2012 05:14:00 AM |
Team GhostShell hackers group who was  responsible for the recent leak of some millions  of records from top universities around the world once again strike  back. As the part of “Project Blackstar” Hacking  group GhostShell Declares War On Russia and leaks 2.5 millions of  accounts belong to governmental,  educational, academical, political, law enforcement, telecom, research  institutes, medical facilities, large corporations in such fields as energy,  petroleum, banks, dealerships and many more.
.
Project+Blackstar

This set of hacks is spread out across 301 links, many of which simply contain raw  dump files uploaded to GitHub and mirrored on paste sites like Slexy.org and  PasteSite.com. The files include IP addresses, names, logins, email addresses,  passwords, phone numbers, and even addresses.

.
The average citizen is  forced to live an isolated life from the rest of the world imposed by it’s  politicians and leaders. A way of thinking outdated for well over 100 years  now,” Team GhostShell member DeadMellox wrote. Project  BlackStar is the second alleged hack from Team GhostShell in the last  month.

.
The still present communism feeling has fused with todays  capitalism and  bred together a level of corruption and lack of decency of which  we’ve never  seen before.
GhostShell’s latest operation was  announced just one  day after Russia’s new “Internet blacklist bill,” Bill  89417-6, took effect. The  controversial legislation allows the Russian  government to censor any site  accused of illegally hosting copyrighted material  by ordering the country’s  Internet service providers to block access.

.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar  aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a  Security  Researcher and Analyst, with experience in various aspects of  Information  Security. His editorials always get people thinking and  participating in the new  and exciting world of cyber security. Other than this  : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks.  His all efforts are to  make internet more Secure

– See  more at:  http://thehackernews.com/2012/11/ghostshell-leaks-25-million-russian.html#sthash.wEsyIYLd.dpuf – See more at: http://thehackernews.com/2012/11/ghostshell-leaks-25-million-russian.html#sthash.wEsyIYLd.dpuf

1 Million dollar hacked in 60 Seconds from Citibank

FBI have arrested 14 people over the theft of  $1 million from Citibank using cash advance kiosks at casinos located in  Southern California and Nevada.
.
Authorities say the suspects would open  accounts at Citibank, then go to casinos in California and Nevada and withdraw  the money from cash-advance kiosks as many times as they could in a 60-second  span. Someone had figured out that a glitch prevented Citibank from recording  the extra withdrawals.
1+Million+dollar+hacked+in+60+Seconds+from+Citibank

FBI agents assisted by the Glendale Police  Department and the Los Angeles Police Department arrested 13 of the defendants  in the Los Angeles area Wednesday and Thursday.

.
The suspects used the money to gamble and were  given comped hotel rooms because of the amount they were spending, according to  the FBI. Withdrawals were kept under $10,000 to avoid federal transaction  reporting requirements, the FBI release read.
.
FBI Special Agent in Charge Daphne Hearn  commented, “While advancements in technology have created a world of  accessibility to users and a convenience for consumers, they have also left room  for criminals to exploit even the smallest of loopholes. For over 100 years the  FBI has kept pace with technological and communication changes in the business  world where these types of electronic transactions are the standard and we will  continue to do so in order to help protect commercial enterprise and our  nation’s economy.
.
Prosecutors said the suspects allegedly  withdrew about $1 million during an eight-month period. FBI agents said the  loophole in the Citibank system has now been closed.
.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar  aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a Security  Researcher and Analyst, with experience in various aspects of Information  Security. His editorials always get people thinking and participating in the new  and exciting world of cyber security. Other than this : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks. His all efforts are to  make internet more Secure. Follow him @ Twitter | LinkedIn |   Google | Email

– See more at: http://thehackernews.com/2012/10/1-million-dollar-hacked-in-60-seconds.html#sthash.kZR6LnC6.dpuf

Researchers caught espionage malware mastermind on webcam: linked Russian Official Security Agencies

Posted by Mohit Kumar on 10/30/2012 09:02:00 AM |
flame

In march 2011 CERT-Georgia has Discovered  Cyber Espionage Attack Incident on country of Georgia.  Advanced  Malicious Software was Collecting Sensitive, Confidential Information about  Georgian and American Security Documents and then uploading it to some of  Command and Control Servers.

.

After a challenging investigating  by CERT-Georgia researchers they found that this attack was  linked Russian Official Security Agencies, Moreover investigators was able  to turn on the webcam of mastermind behind the malware and  they caught  him on camera.
.
Hacker hack some Georgian news sites and  inject  “Georbot Botnet” behind that, after visiting that page  most of the  readers get infected and malware take control of their systems.  Malware was able  to send any file from the local hard drive to the remote  server, Steal  certificates, Record audio using the microphone and web  cams,  Scan  the local network to identify other hosts on the same network.  Malware was also  using  CVE-2010-0842, CVE-2006-3730, MS06-057 and other  unknown  vulnerabilities to infect networks.
.
But finally Researchers  from CERT-Georgia trick the mastermind in his own trap by infecting their  own PC from Lab, then gave Cyber Attacker Fake ZIP Archive with their own virus  inside and the name “Georgian-Nato Agreement“. Attacker  stole  that archive and executed malicious files provide by researchers. That  sudden  give access of mastermind’s computer to investigators. They turn on his  camera  and took his picture shown below:

hack

We have obtained Russian Document, from  e-mail, where he was giving someone instructions how to use this malicious  software and how to infect targets. We have linked him with some of German and  Russian hackers. Then we have obtained information about his destination city,  Internet service provider, e-mail, and etc.” Researchers said.
Most Georgian Infected computers were from our  Governmental Agencies and Critical Information Infrastructures . Main targets  of  hacker was classified information from Georgia Ministries  ,Parliament  ,Critical Information Ifrastructures, Banks , NGO’s.

Federal+Security+Service+of+the+Russian+Federation+(FSB)

During investigation they got the origin of  hacker, which was Russian Ministry of Internal Affairs, Department of Logistics  , according to google map its just next to “Federal Security Service of  the Russian Federation (FSB)

About Author:

Photo-Mohit+(Mobile)Mohit Kumar  aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a  Security  Researcher and Analyst, with experience in various aspects of  Information  Security. His editorials always get people thinking and  participating in the new  and exciting world of cyber security. Other than this  : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks.  His all efforts are to  make internet more Secure. Follow him @ Twitter | LinkedIn |   Google | Email

– See more at:  http://thehackernews.com/2012/10/researchers-caught-espionage-malware.html#sthash.yRm90N2B.dpuf – See more at: http://thehackernews.com/2012/10/researchers-caught-espionage-malware.html#sthash.yRm90N2B.dpuf

Anonymous going to lauch wikileaks like project called TYLER

Posted by Mohit Kumar on 10/23/2012 10:42:00 AM |
Anonymous+going+to+lauch+wikileaks+like+project+called+'TYLER'
International hacker group Anonymous is going  to create a WikiLeaks competitor scandalous leak portal called  Tyler, for the publication of secret information from governments of  various countries. One of the group’s members, who specified that he is  representing the collective, spoke about the TYLER project and the rift with  WikiLeaks in an email interview with the Voice of Russia.
.
They have scheduled this new project to  December 21 this year. According to the hacker, who requested anonymity,  the conflict between Anonymous and the website of Julian Assange revolves  around  the forced funding techniques and lack of transparency around money to  WikiLeaks.
.
So far Anonymous defends WikiLeaks  and Assange personally and supported the mission of the site to share  information, news and classified information with the public. They even helped  to publish more than 2 million emails, known as the Syrian file.
.
Since Assange has repeatedly threatened to  close the WikiLeaks, hackers have decided to create their own platform for  publishing secret government documents. According to Anonymous, Tyler will be a  unique service project, as it will not have fixed the server – it will be based  on the principle of decentralized or peer to peer network based on the equality  of participants. Hackers claim that the attack or close the platform due to  this  will be impossible.
.
When asked about the future of WikiLeaks, the  anonymous hacker said “Julian has threatened on at least one previous  occasion to pull the plug on the project because the fundraising was not  meeting  his expectations. It was at that time that Anonymous began planning to  field our  own alternative disclosure platforms. Julian desperately needs  WikiLeaks, and he  is the only one that can pull the plug on the project. I  rather think that so  long as he is in dire straits, he will not do so despite  any threats from him to  the contrary.”
.
In this case, it is unclear whether the hacker  to interview to Russian media reflect the views of the entire community of  anonymous or its individual fragments as haktivistite not acting in an  organized  group with a recognized leader.
.

About Author:

Photo-Mohit+(Mobile)Mohit Kumar  aka ‘Unix Root’  is Founder and  Editor-in-chief  of ‘The Hacker News’. He is a  Security  Researcher and Analyst, with experience in various aspects of  Information  Security. His editorials always get people thinking and  participating in the new  and exciting world of cyber security. Other than this  : He is an Internet  Activist, Strong supporter of Anonymous & Wikileaks.  His all efforts are to  make internet more Secure. Follow him @ Twitter | LinkedIn |   Google | Email

– See more at:  http://thehackernews.com/2012/10/anonymous-going-to-lauch-wikileaks-like.html#sthash.4vk647F9.dpuf – See more at: http://thehackernews.com/2012/10/anonymous-going-to-lauch-wikileaks-like.html#sthash.4vk647F9.dpuf

Hacker catches Facebook registering private links as ‘likes’

If you’ve sent Facebook friends a link to something out on the wilds of the World Wide Web, the social network knows and they’re telling others about it.

A video published online this week by a poster on Hacker News reveals that Facebook scans private messages and registers links in them as “likes.” That means if you’ve ever privately sent your friends a link to something you’d rather not publicize, well, too bad.

The “likes” problem could better be described as an exploit of Facebook’s code that can be used to fraudulently inflate the number of “likes” an external page gets.

For instance, if a company wanted a product to appear popular, they could set up dozens of fake Facebook accounts and begin trading messages back and forth, adding “likes” just as fast as they can click “send” — up to 1,800 an hour, according to the anonymous person behind the video.

“[It] won’t drive any traffic to your website,” a commenter on Hacker News noted. “But if your visiting an online store and you see a lot of likes under the product then this might cloud your judgement.”

For a publicly-traded company, the potential for “like” fraud is a serious threat to their credibility — perhaps even moreso than the obvious concerns over collecting metrics data from ostensibly private communications.

Facebook didn’t commented on the exploit, but Raw Story‘s own tests showed that the “likes” were no longer appearing on public-facing profiles. The “likes” were instead only visible in Facebook Insights for domain owners.

Facebook founder Mark Zuckerberg said Thursday that the social network has over 1 billion monthly active users, making the site by far the largest of its kind in the world.

This video was published to YouTube on October 3, 2012

 

http://www.rawstory.com/rs/2012/10/04/hacker-catches-facebook-registering-private-links-as-likes/

‘Anonymous’ retaliates after member arrested by FBI

By Agence France-Presse Thursday, September 13, 2012 23:44 EDT

Print

Anonymous on computer monitor via AFP

WASHINGTON — The hacker group known as Anonymous on Thursday posted credit card numbers in retaliation for what it claimed was an FBI raid arresting one of its members.

The group said Barrett Brown was arrested in an FBI raid while participating in an online chat Wednesday.

Contacted by AFP, the FBI declined to comment.

But a video posted by the group, a loosely knit collective with no clearly defined leadership structure, showed the chat interrupted by what appeared to be a raid.

In retaliation, the group posted “these 13 credit cards details as teaser,” saying they were “potentially belonging” to government officials.

A Twitter posting said the offshoot of the group, called Antisec, “retaliates on Barrett Brown arrestation.”

According to a report on the website The Hacker News, Brown came to notoriety when he threatened to release the names of 75 collaborators of the Mexican Zetas cartel for kidnapping an Anonymous member.

The report also said he founded Project PM, which collects information about the intelligence industry and what it claims are threats to privacy and democratic institutions