Connect with us

Technology

Anonymous Plans To Attack Facebook on January 28th, 2012 at 12am EST in Cyberwar

Published

on

ad1

According to a video posted to YouTube on January 23, 2012, the faceless “hacktivist” group Anonymous promises to crash Facebook in a concerted attack on January 28, 2012 at 12 AM Eastern Standard Time.

In its video, posted by user AnonymousVoice777, the group declares war on recent government attempts to curb Internet freedoms. Against a background of headless figures and a looming, mustached figure, a male voice intones, “The time has come. An online war has begun between Anonymous, the people, and the Government of the United States.”
Anonymous Vows to attack Facebook

Credit: The Inquisitr

Anonymous is not alone in raising concerns over government interference on Internet commerce. Protests against proposed legislation to target websites infringing on intellectual property and e-commerce have surged. The Protect IPA Act (full name: Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act) and its companion, the proposed Stop Online Piracy Act, or SOPA, have triggered online petitions, protests and even temporary blackouts of sites such as Google and Wikipedia.

Anonymous takes these protests a step farther, though, in declaring a “cyberwar” against a long list of sites, including CBS.com and some sites maintained by the FBI. Now Anonymous has Facebook in the crosshairs, urging its viewers to to download an application called the Low Orbit Ion Cannon and follow the directions on the video to target Facebook at the designated time. Although Facebook has over 60,000 servers, Anonymous reassures viewers that crashing the popular social networking site “can be done.”

Why Facebook? The video remains silent on this point. Chris Matyszczyk, a blogger for CNet, observes that “the video seems to simply align Facebook with the government,” possibly because of its belated opposition to SOPA.

“Anonymous” is an Internet meme that originated in 2003, describing the concept of many internet users acting simultaneously in a coordinated manner. More recently, the name has been claimed by those opposed to government restrictions on internet content and commerce. Because its originators are unknown, speculation, rumor and false stories swirl on the internet about its plans and targets.

ZDNet blogger Emil Protalinski notes that Internet rumors claimed that Anonymous had scheduled attacks on Facebook twice before. The recent surge of pornographic and violent images posted to Facebook were believed to be the work of Anonymous, but the group never claimed responsibility. Still, according to Protalinski, “this appears to be a legitimate call to arms.” And, he points out, “with Anonymous, you just never know.”

This rise in hacktivism is definitely spurring enrollment for students interested in cyber security degree programs. In addition to students being interested so are companies that are trying to hire professional in cyber security technology and research. In the last year alone the Cyber Security job outlook has literally gone straight up with more and more jobs becoming available to people with the right degrees and certifications. Some security experts even think that within Anonymous lies many cyber security experts that work in Anonymous by night and cyber security careers by day!

Continue Reading
Click to comment

0 Comments

  1. Santa Claus

    January 28, 2012 at 4:18 am

    Yeah right and I’m Santa…

    On topic: Go Anonymous!

  2. FBI Special Agent Dasun

    January 25, 2012 at 10:57 pm

    Lsn dear Anonymous u cant do a attack for the face book still i’m in fbi.

  3. Friendly anon

    January 25, 2012 at 8:38 pm

    We don’t kill the messenger

  4. I doesn't die

    January 24, 2012 at 11:11 am

    Low Orbit Ion Cannon stands no chance against servers. If they could get there hands on some netbots then this will be possible.

  5. Anonymous

    January 23, 2012 at 8:53 pm

    We are anonymous.

    This action is not how we work. Our actions are legal, our actions are anonymous. Those are our two rules..

    We are Anonymous
    We are Legion
    We do not forget
    We do not forgive

Leave a Reply

Your email address will not be published. Required fields are marked *

Cybersecurity

Kaspersky Antivirus zero-day could ironically allow hackers to track users

Kaspersky has already issued a patch to resolve the vulnerability.

Published

on

Photo: David Orban | Flickr | CC BY 2.0
ad1

A German journalist discovered a flaw in the system of Kaspersky Lab’s antivirus that led to a significant security risk which allowed cybercriminals to track Kaspersky customer without their knowledge.

This all started when Ronald Eikenberg began testing antivirus programs for his own publication. A few months later he discovered that on a website, Kaspersky’s antivirus has been injecting some code. Eikenberg said that it seems that Kaspersky is trying to find ways in interacting with the site even though there is no browser extension on the system.

“One of the purposes of the script is to evaluate Google search results displayed in the user’s browser. If a link is safe, the Kaspersky software will display a green shield behind it,” he added.

In this era, most of the companies and websites would require tracking users across the internet to identify them and learn their interest to provide the target advertisements to be shown to them. Usually, this would require 3rd-party cookies, and this would allow even Facebook or Google to track your movement throughout multiple websites.

The problem however when using Kaspersky Antivirus is that it exposes a user by tagging them with a unique identifier that will record and keep track of what you visited in the past four years, which would allow some sites and third-party services to track them even though users have already blocked them. This will be putting the users at risk since everything that the user does is being monitored or kept track of.

“That’s a bad idea because other scripts that run in the context of the website domain can access the HTML code at any time—and thus the injected Kaspersky ID. This means in plain language that any website can simply read the Kaspersky ID of the user and misuse it for tracking,” the researcher says.

Instead of using unique identifiers, they were given a specific ID assigned to a particular computer; thus, it does not change after several days.

This attack could lead to scamming people by either asking their personal information or bank account information through the form of a payment system. One good example would be that a pop-up will show up and say ‘your license has expired, please enter your credit card information to renew your subscription.’

This process would affect multiple users that are using Kaspersky Antivirus. 

There was a patch that was issued last month to update all Kaspersky antivirus program for all the user of a specific version. However, there is still a version of the security tool that still allows a malicious hacker to know that antivirus software is installed on the machine.

Another way to somehow mitigate the problem is to manually uncheck in the software settings depending on the situation that you feel you are being spied on.

Kaspersky has already removed the unique identifiers for the GET request to enhance somehow the process of checking web pages when it comes to malicious activity. The change was provoked by Eikenberg after he notified Kaspersky about the possible risk of personal information disclosure when using unique identifiers for the GET request.

A statement released by Kaspersky revealed that based on their research, there is a minimal chance that this could be carried out in practice, but it is theoretically possible to happen. The complexity of the program would help fend off the leak of private information and also its low profitability would somehow be a discouragement for the hacker. 

Nevertheless, the company would still need to improve their system in order to prevent further mishaps, the private information that should be protected by the company is a due responsibility that should not be taken short for. Thus it is a severe issue if Kaspersky does not resolve the problem at hand right away. 

On a brighter note, if users want to disable tracking altogether, they can manually disable the URL advisor feature from the settings – additional – network- uncheck traffic processing box. This procedure will allow the user to be safe and not be monitored for the meantime while using the said application.

Users of specific tools that sole purpose is to protect our information and protect the user, having this kind of issue will bring distraught to the public in trusting some of the protection programs to install on their devices.

Continue Reading

Gadgets

Huawei warns Trump of disrupting the dominance of Apple, Google

Huawei CEO said that if the U.S. government continues to deny them of using Android, they will be forced to use HongMeng OS on their new smartphones, disrupting the dominance of Google and Android.

Published

on

Photo by Kamil Kot on Unsplash
ad1

Huawei is poised to take over and disrupt the dominance of two long-standing tech giants in the smartphone industry, Google and Apple, and when pushed by the U.S. government to their last recourse if Washington continues denying the Chinese company access to the Android operating systems for their future smartphone products, it will have no choice but to fight against Google and Apple, which is bad for the U.S., Huawei CEO Ren Zhengfei warned.

Ren stated in an interview that if Google strips them from the Android operating system, then the world will know a third operating system. Ren also claimed that releasing a third operating system will not be the best choice for the two major companies since there will be more competition.

The blacklisting was announced last May, and since then, Huawei has been claiming to launch a new smartphone with a new operating system. The operating system, named HongMeng or Harmony OS, will be better than both the current operating system available, the tech giant said.

People have been wanting a better version of the smartphones that we are using now, instead what we got instead are clever phones that have low-latency, better smart-TVs and even watches that are able to connect to the internet.

Huawei claimed that they don’t have a “plan-B” if ever the banning of Google would happen, according to Ren. If ever Google is not used, they plan to shift HarmonyOS to be viable to smartphones, but it would take some time since the shift would require them to create a whole new system that would be on par when it comes to its performance.

The problem all started when there were claims that due to the coziness of Huawei with the Chinese government, it is feared that the devices would be used as a tool to spy on other countries. This was all the reason that caused the U.S. to ban companies from using equipment from Huawei way back in 2012.

An executive order from President Donald Trump placed Huawei on the list of the U.S. Department of Commerce’s Bureau of Industry and Security on May 15. However, Trump agreed to be more lenient on the restriction as a part of a deal to resume business trade talks with China in June.

If the U.S. really does deny access to Google’s operating system, then Huawei has no choice but to create an alternative, and it will be backed up by China for Huawei to create this alternative.

Ren warned Google, “you cannot rule out the chance that the third operating system might outrun them someday.”

The U.K. can’t practically decide on what to do right now as other major telcos still work hand in hand with Huawei by continuing to sign agreements with them. While the U.S. still is still tangled in trade talks with agriculture, so the cycle of their industry is still the same, fast-moving and no change. 

Supplying ‘authoritarian regimes’

In an interview, Ren also admitted that Huawei supplies “authoritarian regimes.”

“I actually do not make any prejudgement of a government first before we sell to our customers. Because every country has a sovereign system, it’s not in our position to interfere with the sovereignty of other states. If we did, then we would be playing the game of politics, right? And that’s a matter for sovereign states.”

The situation where Huawei is on right now might be a little difficult since it will require a gamble if ever they were denied access with Google’s operating system. Right now, Huawei still does not have any ‘plan-b’ course of action, but they will have to make an alternative when the time comes. They also plan to compete with the two biggest Operating system provider (Google and Apple). 

The U.S. is still pondering on whether to continue the relationships with Huawei or to completely ban them and make them a permanent blacklist on U.S. Department of Commerce’s Bureau of Industry and Security, halting any form of trade with Huawei and demolishing the support that they are still currently having with Google.

The long term plan is still hazy, but if ever the U.S. does force China into a full-scale Android alternative, others will jump on board. And, despite the rhetoric, the U.S. really does not want that.

Continue Reading

Cybersecurity

‘Vanda The God’ hacking group claims responsibility over massive healthcare website attacks

The attack affected websites from the U.S., U.K., New Zealand, and South Africa.

Published

on

Photo by Clint Patterson on Unsplash
ad1

Tu Ora Compass Health server fell after being targeted by hackers causing medical facilities to stop their operations; the worse part is that they are not alone because they are a victim of a massive attack that has affected different websites and companies from around the world.

The crisis that the hacking made was not only small scale but was also able to affect quite a lot of countries, including the U.S., the U.K., and South America-based websites. Four medical facilities in New Zealand was compromised that has caused them to halt all operations; thus, risking thousands of private information under their possession.

From a report, Tu Ora Compass Health’s website was not working correctly and is showing some errors; with this, it resulted in a chain of bugging websites. Kuripuni, Greytown, Featherston, and Carterton medical centers could not even be accessed at the same time as Tu Ora Compass Health’s website went down.

Tu Ora Compass Health, however, reported that there were no unnecessary leakage of patient’s data or any compromised information.

“Shortly after we became aware of the incident on August 5, we contained it by taking the compromised server offline. This stopped all access to any applications and data on that server and elsewhere within our network.” Chief executive of Tu Ora Compass Health, Justin Thorpe said.

“Vanda the God” was the name of the attack group that made themselves known by openly claiming that they have already hacked and posted the information that they got from it on their Twitter account.

Most of the affected sites on their list were government sites. Here is a list of those sites that are already posted on their Twitter: 

Vanda The God is an international hacker group that hacked a couple of government sites, but it is still unclear if they have a motive over the attacks. Nonetheless, they have been hacking sites and replacing their home page with vulgar anti-government statements, which points out to the direction of a hacking as a political statement.

With their series of hacking and manipulating websites, does this even raise awareness or encourage people to be politically active? DataBreaches.net tried to reach out to them via Twitter to ask if what they are doing is making any difference, or what is making a change. They replied by tweeting, “I believe the people who see the message open their eyes and see that the governments are corrupt Me (sic) people that society screams for their rights.”

Currently now Tu Ora Compass Health is working on their technology providers to investigate the intrusion that recently occurred. They have to restrict the website temporarily; thus, all those 20 affiliated GP practices around the country could not also be accessed. 

According to Tu Ora Compass Health, since patients trust them with information that is very private, they will treat this as serious as they can, making sure to implement all necessary actions to ensure that the server is much more secure and capable of fending off any future hackers. However, Thorpe would like to apologize for any inconvenience that this has caused by taking a few servers offline.

“We are currently working through the process of restoring access to this server and ensuring all our systems are as secure as possible.” as per Thorpe.

Cyber attacks are common in this era according to statistics made by Cybersecurity Reports, which says that cyberattacks have increased by 59% for 2018. And by December 2018 there have been much more attacks that peaked at 80 per day. This rate is highly alarming since there are a lot of vulnerable websites that can easily be penetrated, and personal information could be leaked.

The most common types of vulnerabilities in 2018 based on an analysis made by Sitelock were; Cross-site scripting or XSS, SQL injection (SQLi), and cross-site request forgery (CSRF). 

There are many forms of cyber attacks that are possible to be used. And it is better to be equipped with a much higher form of security system is your website is managing a ton of information that might be at risk. Hackers will want to get there hands on that information, and thus if there is a flaw in your security, it is just giving them easier access to their pot of gold. Being secured is better than being at risk of any loss. 

Continue Reading

Trending