Sunday 21 December 2014

Xtam4 "Mastermind" Hacker - Facts & Summary

Many groups of hackers took form under leadership of "Xtam4" in 2012 which at that time was involved in huge carding operations through his team "CWI", earning upto $20,000 dollars a day by 2013. He got nickname "Mastermind" after he planned and succeeded in attacks on Jewish Jewelery sites, Several high profile politicians and FBI Site. He is said to be "Black hat" by many hackers, but yet he didn't claimed or verified this statement.

Facts:

  • He earned upto $20,000 dollars a day in 2013. 
  • in 2014, He closed all of his carding business due to heat from Law Enforcement
  • His main Idol is Father of Organized Crime Charles "Lucky" Luciano
  • He is current boss of famous Pakistani hacking team "GForce Pakistan" aka "GForce Family".
  • At age of 12, He was already earning a name for himself in society of hacking.
He still continues to rise into 2014 and we expect more from the revolution.

Thursday 20 November 2014

GForce Pakistan Against Its own Cyber Allies?


The well known Pakistani Hacking group, GForce Pakistan which is currently running by new alias calling themselves "GForce Family" being run by The previous Leader of CWI Syndicate have been Attacking their own Allies on the side of Pakistan. Hundreds of Pakistani Hacking Crew members have been doxed by known Associate of GForce and current controller of Black MESA Carding business on internet "Alan Alsop". The group have proved its nefarious power by striking down Pakistani groups. The known rumors have been emerged that the crew is controlling all of Credit card operations on internet. Meanwhile Xtam4 never refers to his illegal business or deeds on Internet in any of his pastes and running by a popular revolutionary figure to public.

Friday 24 October 2014

Ministry of Culture Exploited Fingers pointed at GForce


It is believed that the attack held on October 25th on India Culture website was held by GForce Pakistan, The data was released to pastebin. It was not released from none of the official accounts of G force on Pastebin. It was uploaded by Guest. Several codes and Documents of the site were leaked.
From 2001-2002 G Force was considered the Main team that was contributing in India-Pakistan Cyber war. The team continues to dominate the internet.

Paste

Hold Security shares data to NCSC which holds 1,3 million vulnerable Dutch e-mail addresses


The National Cyber Security Centre team (NCSC) and Hold Security have setup a cooperation which allowed the NCSC to get hold of 1,3 million vulnerable Dutch e-mail addresses and 5600 vulnerable Dutch websites.
Hold Security had announced that they had gained a massive dataset of 1.2 billion credentials via vulnerable websites worldwide.
The NCSC explains that the information which they have collected holds;
  • Usernames
  • Passwords
  • E-mail addresses which are used to login at the vulnerable websites
The National Cyber Security Centre has informed their partners, which will inform the identities which are identified in the dataset.
You can read the official Dutch press release here
https://www.ncsc.nl/actueel/nieuwsberichten/ncsc-verkrijgt-nederlandse-gegevens-van-hold-security.html

Related Posts to "Hold Security shares data to NCSC which holds 1,3 million vulnerable Dutch e-mail addresses"

Shellshock: A ‘Bash’ Bug which leaves almost every user on Internet vulnerable

This is a bug which is said to be very much bigger than the previous flaw called Heartbleed, which left all the secure SSL systems vulnerable, but this time a bug is found which able to compromise your system and then able to run commands or execute any malicious program onto your computer or device.

This harmful bug dubbed as ‘Shellshock’. As I said above this is a superbug, so here is, why it is called the SuperBug:
  • Shellshock is a Bash bug and able to exploit any operating system.
  • This Bug able to send a command to the exploited system through a code.
  • The particular area, which is able to exploit the system is generally blocked, but the Bash opens all doors to the system
  • Apple Mac OS X users able to run it from their terminal, others people linux operating systems also can.
    Apple Bash Bug
  • Windows is not affected in the same way, but if a hacker exploits malicious code through the flaw, they could gain access to any device, in theory, including PCs.
  • Working Example: As an Apache Web Sever runs bash command to process task along with the data entered in the online forms.
This flaw has been revealed by the hackers previously, and they are using this to exploit million of users online, UK Privacy regulator has already warned.
In simple words, The flaw is ‘Bash’ which contained in a piece of software and that software used by the operating systems and other website servers.
At this time, there is not any critical update or any idea found by the security researchers to save millions of users online, and the the UK and US governments also have issued national alerts in response to the bug, warning that it may compromise organisations responsible for “critical national infrastructure” such as power stations if it is not rapidly dealt with.
Statement issued by The Information Commissioner’s Office (ICO):
The Shellshock flaw “could be allowing criminals to access personal data held on computers or other devices”, which “should be ringing real alarm bells” for British businesses which are legally obliged to keep their customers’ details secure.
“The worst thing would be to think this issue sounds too complicated – businesses need to be aware of this flaw and need to be monitoring what they can do to address it. Ignoring the problem could leave them open to a serious data breach and ultimately, enforcement action.”

Who found this Flaw?

This critical flaw was found on 12 September by Stephane Chazelas, a 38-year-old French software developer living in Edinburgh. This Flaw uncovered “by chance”, he said to The Independent Today.
After finding this flaw, Chazelas reported this to Chet Ramey, a 49-year-old American programmer working at Case Western Reserve University in Ohio, and he maintains the Bash source code.
One more important thing about the Bug is, it is in the market from last 25 years and there is a question on this, Is it being used by the hackers from years ago?
Reports online inform that, this bug has been fixed by the Apple, but not informed anyone about this.
If you are a website owner and using Linux servers, so always go for a routine check for any updates for your operating system.
If there is any crack or update related to this comes out, we will update this post soon, but for now, you should secure yourself, by keep watching your security updates :)

Wednesday 15 October 2014

Crowd-Funding website Kickstarter Hacked, Customer Information Accessed by Hackers

According to Kickstarter’s blog post, on Wednesday night, law enforcement officials contacted Kickstarter and alerted them that hackers gained unauthorized access to some of it’s customers data. Kickstarter says that they took all the necessary security measures and they immediately closed the security breach.
No credit card data of any kind was accessed by hackers. There is no evidence of unauthorized activity of any kind on all but two Kickstarter user accounts.
While no credit card data was accessed, some information about their customers which included usernames, email addresses, mailing addresses, phone numbers, and encrypted passwords was stolen. In order to prevent upcoming hacks, the Kickstarter recommends it’s users to change their passwords as soon as possible with some strong passwords, so the hackers won’t be able to guess the real password, because them are encrypted. Right now, if the hackers who accessed the users data have enough computer power, they can crack the encrypted password.
As a precaution, we strongly recommend that you create a new password for your Kickstarter account, and other accounts where you use this password.
Some security measures taken by the Kickstarter Security staff:
  • Older passwords were uniquely salted and digested with SHA-1 multiple times. More recent passwords are hashed with bcrypt.
  • As a precaution they have reset all Facebook login credentials. Facebook users can simply reconnect when they come to Kickstarter.
  • Kickstarter does not store full credit card numbers. For pledges to projects outside of the US, we store the last four digits and expiration dates for credit cards. None of this data was in any way accessed.

How Hackers Changed The World – Anonymous – We Are Legion

How Hackers Changed the World – We Are Legion is a documentary about Anonymous, a hacking documentary released by BBC. It goes in depth to describe some cyber attacks such as Church of Scientology, Paypal, Amazon, Visa, Mastercard and world governments in order to shame them for their shady actions. Anonymous attacked online payment providers when they boycotted Wikileaks, they helped to provide black market Internet connections to disseminate information coming out of the Egyptian protest movement.
anonymous-emblem
According to Wikipedia, Anonymous is associated a loosely international network of activist and hacktivist entities. The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites. You can find more details about the hackers group called Anonymous here.

CloudFlare Hit with 400Gbs NTP DDOS Attack

CloudFlare DDOS Attack, the largest Distributed Denial of Service Attack in the world! NTP based 400 Gbs DDOS Attack
Security company CloudFlare said Monday that a customer running on its platform was hit with a massive DDOS attack and that affected service in all the Europe, even in some of its US infrastructure.
“It was a very large DDoS targeting a CloudFlare customer,” Matthew Prince, CEO of Cloudflare told SecurityWeek. “We’re still gathering the log data to get exact numbers but know it was well over 300Gbps and likely over 400Gbps”, said Matthew Prince.
“The method was NTP reflection, which is quickly replacing DNS reflection as the source of the largest attacks”, said Matthew Prince.
CloudFlare did not mentioned the name of the customer that was targeted in this particular attack.The security firm is usually quite transparent about its operations.

What is DDOS Attack?
Distributed Denial of Service attacks were common in the last months. These affected sites like WordPress or Spamhaus and even led to the destabilization of the virtual currency Bitcoin. The Spamhaus DDoS attack was so great that it affected the speed of the Internet globally.
DDoS attacks are used to overwhelm servers with requests. All requests are directed to the same place on the server and thus there are no answers for new server requests. The Distributed Denial of Service ( DDOS ) is one of the best weapons of the hackers, because, until now, nearly every big site had been a victim of this attack.

What is ( Network Time Protocol ) NTP DDOS attack? How to understand it better.
ntp-ddos
The NTP method first began to appear late last year. To bring down a server such as one running “League of Legends,” the attackers trick NTP servers into thinking they’ve been queried by the “League of Legends” server.
The NTP servers, thinking they’re responding to a legitimate query, message the “League of Legends” server, overloading it with as many as 100 gigabits per second (Gbps). That’s large even for a DDoS attack.
In this way, one small request to an NTP server can generate an enormous response capable of taking down even high-capacity websites.

Ultra-fast battery that will end a nightmare: Loading in 2 minutes and can last 20 years

Researchers are close to finishing a new type of battery more efficient.
Batteries lead our life. They’re everywhere, from TV remote to phone or electric car batteries. Along with them came the nightmare of running out of battery when you need more.
A battery wich charge faster and hold more  seems unachievable dream smartphone users. Still, it could become reality. A team of researchers working on a new type of battery that could charge up to 70% of capacity in just two minutes. Moreover, the life of this battery is 20 times higher than current batteries. I mean,  even 20 years!
Ultra-fast battery developed by researchers in Singapore is so effective that an electric car could be loaded in just 15 minutes. Even if it sounds too good to be true, the team of physicists from the Nanyang Technological University wants to market it in less than two years, according to ScienceDaily.
The term is so short because no technology is new. Instead of reinventing the battery, the researchers optimized the existing technology, using a gel-based titanium oxide, the same substance found in sunscreens. Accelerates gel loading, and at the same time protects the interior materials from damage.
More than that, the batteries will be cheap because titanium dioxide is inexpensive and is found in soil. The team showed how they  formed the titanium dioxide for this new battery and requiered license for this technology.

Tuesday 14 October 2014

NSA and British intelligence services have hidden access to several German mobile network operators

American National Security Agency (NSA) and British intelligence have a hidden network access to several German operators, reports Der Spiegel, based on documents from Edward Snowden.
According to the German weekly, NSA program called “Treasure Map” has a clandestine access to Deutsche Telekom’s network and other smaller operators, which allows to reach Internet-connected devices – smartphones, computers and tablets. This program, named as a “Google Earth of the Internet” by Der Spiegel, serves to “planning of attacks” and “spy network” continues magazine, who could not obtain a response from the NSA and GCHQ , British service charge interceptions.
“Such cyber attack clearly violate German law,” commented Christian Steffen, general manager of Stellar operator, which Der Spiegel presented a document containing passwords belonging GCHQ company clients name a certain number of employees.
Alerted by the journal, Deutsche Telekom and regional operator Netcologne have not identified any suspect device and any data leakage. But according to the head of Deutsche Telekom Thomas Tschersich security, “foreign intelligence services access to our network is totally unacceptable.” “Examine any indication of a possible manipulation. Additionally, we alerted the authorities on this point,” said Tschersich quoted weekly.
Will be back with more details, soon !

UPDATE

What is the Treasure Map?
Treasure Map is the mandate for a massive raid on the digital world. It aims to map the Internet, and not just the large traffic channels, such as telecommunications cables. It also seeks to identify the devices across which our data flows, so-called routers.
In other words, every single end device that is connected to the Internet somewhere in the world: every smartphone, tablet and every computer is to be made visible. Such a map doesn’t just reveal one treasure. There are millions of them.
Treasure Map allows for the creation of an “interactive map of the global Internet” in “near real-time,” the document notes. Employees of the so-called “FiveEyes” intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird’s eye view of the planet’s digital arteries.
You can read more details regarding the “Treasure Map” program here.

Bitcoin’s evolution on the map

Bitlegal is the easyest way to explore the evolution of the internet currency around the world.
You can search on this map for your country to see if the Bitcoin usage is Permissive / Contentious / Hostile / Unknown.
You should notice that:
BitLegal provides information about a developing area of the law and it is designed to help users make decisions about their own legal needs. Use of this site, or the information contained herein, does not create an attorney-client relationship. The content on this site is not offered as, does not constitute, and should not be relied upon it as a source of legal advice. Legal information is not the same as legal advice. Legal advice is the application of law to an individual’s specific circumstances. Nothing on this website should be considered a substitute for professional legal advice.
You can find more details on BitLegal’s official page.

Gmail hacked. Millions of Gmail accounts and passwords have appeared on the internet

Gmail was hacked today, about 5 million gmail accounts were published on Bitcoin Security Forum Russian hackers.
Alarming news this morning for those who have Gmail account. Russian hackers have published no less than 5 million users and passwords, but it seems we do not have serious reasons to panic.
Some Reddit users have discovered that there were not actually Gmail passwords, as originally written Russian media. These passwords should be occurring on sites throughout the years, sites that were associated with a Gmail address.
Google representatives confirmed that the list includes real accounts. However, company officials told TheNextWeb that “we have no evidence that our systems have been compromised.” It seems that only 60% of published accounts were active at the moment, and of the active accounts, many would have old passwords and not the actual password.
“ The security of our users information is a top priority for us ” said an employee of Google to  TNW. “We have no evidence that our systems have been compromised, but whenever we become aware that accounts may have been, we take steps to help those users secure their accounts.”
Most of users who appear on the list are Russians, but there are some users from Spain, USA and UK.
Therefore, the chances for you to be the victim are quite small write androidauthority.

UPDATE

Google says there is no security breach
It’s important to note that in this case and in others, the leaked usernames and passwords were not the result of a breach of Google systems”
We found that less than 2% of the username and password combinations might have worked, and our automated anti-hijacking systems would have blocked many of those login attempts. We’ve protected the affected accounts and have required those users to reset their passwords.

Windows 10 is the official name of the next operating system from Microsoft


Microsoft-windows10
The company introduced the operating system in a press event.
Windows 10 is the name of the future operating system from Microsoft, that should get on our computers at the end of next year. Therefore, the company will not name the next version of Windows 9 or Windows X or Windows One as everyone expected. New Windows 10 looks pretty good with Windows 7.
The Microsoft Windows 10 said it was “the most comprehensive platform ever built” so that version will be adapted to different hardwares. Good news for those who make applications for them, it should run smoothly in almost any conditions.

FBI: Companies from USA spends tens of billions annually against Chinese cyber espionage

Aggressive cyber war carried by China against the United States causing each year  losses worth billions of dollars to American companies, said FBI Director James Comey AFP reports.
According to federal police chief, the vast majority of American companies have been targeted by this type of activities. “There are two kinds of large companies in the United States. Those who know they have been hacked by the Chinese and those who do not know they have been pirated by the Chinese,” said Comey in “60 Minutes” of CBS.
Annual losses caused by cyber attacks launched from China are “impossible to figure”, but the number is in the order “billions,” according to FBI boss. Asked about countries that target the United States, Comey said, “I do not want to give you a complete list. But I can tell you that at the top of the list are Chinese.”
He quoted the example of the charges, in May, when five officers in the Chinese army stolen, during 2006-2014, trade secrets from American companies specialized in nuclear or solar energy and metallurgy.
Strong tension with Beijing
This case has caused severe tensions with Beijing. According to FBI Director hackers target this information to Chinese industry profits, which is exempted in this way to be “forced to invent”. But, he said, they are easy to spot. “I’m going to think of drunken thieves. Break the door, slam the vase and leave the TV under his arm,” he said. “I am simply fruitful. It might say their strategy is” we are everywhere, always. and they never manage to arrest us again ‘”, said the head of the FBI.
In 2013, the California-based cybersecurity firm Mandiant said Chinese had launched cyber-attacks on 141 organisations across 20 industries. Targets included government departments, private companies, from the Pentagon to the New York Times. NGOs were also targeted. Mandiant linked a number of attacks to a military-affiliated group based in nondescript building on the outskirts of Shanghai.

Google warns: Espionage of the USA risks “breaking the internet”

Cyber espionage practiced by the United States is a threat that could lead to “breaking the internet” warns Supervisory Board Chairman of Google, Eric Schmidt.
“The impact is serious and is getting worse,” said he. “The result of the simplest scenario is that we get to break the Internet,” he warned. Schmidt made ​​the statement during a debate on the consequences of spying on Internet technology sector intrerpinse by American intelligence services (NSA), an event organized by the chair of the Senate Finance Ron Wyden. Participants revealed the emergence of disguised trade barriers, some countries calling for the groups now active in the field of Internet and data services to host their servers rather local and not in the United States.
“The idea of ​​having to install data centers and regional data-themselves fundamentally opposes the way the Internet is structured,” said Colin Stretch, Legal affairs on Facebook. His counterpart from online storage service Dropbox Ramsey Homsany revealed, in turn, the difficulties this can create startups that are based on Silicon Valley fame. “Imagine what would have happened if (Google founders) Larry (Page) and Sergey (Brin), in their garage, they had the second thing on the list to build a data center in Germany,” commented himself.
Participants in the debate have prompted American lawmakers to clean up online intelligence practices in order to regain the trust of the international community. Until then, they find it necessary to attack them, the problem themselves, enhancing security and protection services and their networks.
“In the absence of better laws, we are forced to invest in better technologies,” noted Brad Smith, Microsoft’s Legal affairs. “If people are worried about government encryption, it is necessary to invest in better laws,” he urged. American giants in technology have complained numerous times of Internet surveillance by the United States, revealed by former NSA consultant Edward Snowden. Mark Zuckerberg, founder of Facebook, called directly on President Obama in March, to complain about the “threat” represented by this oversight. John Chambers, CEO of Cisco, telecom equipment manufacturers, wrote for the president, complaining that the practice harms the intelligence agencies’ ability of technology companies to deliver products on a global scale. “

Friday 10 October 2014

Google works Like NSA by collecting, storing, and indexing user data: Assange

ulian Assange, the WikiLeaks founder, has confirmed that Google collects, stores, and indexes people’s data, and is in fact ‘a privatized version of the NSA,’ according to media reports.
“Google’s business model is the spy. It makes more than 80 percent of its money by collecting information about people, pooling it together, storing it, indexing it, building profiles of people to predict their interests and behavior, and then selling those profiles principally to advertisers, but also others,” Assange told BBC.
However, he also admitted that it is not doing anything that is illegal.
The founder argued that Google’s work practices are almost identical to NSA adding that the company has been working with the NSA since at least 2002, in terms of contract.
“They are formally listed as part of the defense industrial base since 2009. They have been engaged with the Prism system, where nearly all information collected by Google is available to the NSA,” he said.
Additionally, at the institutional level, “Google is deeply involved in US foreign policy.”
Assange told BBC that Google has become the most influential commercial organization with its ramifications across every country and every single person with access to Internet.
He further said that the company has tricked people into believing that it is a humane organization and not a big, bad US corporation.
Julian Assange, 43 year old Australian, is staying at the Ecuadorian embassy in London since 2012. The embassy is being watched by British police round the clock who are ready to arrest him should he attempt to leave.
His stay at the embassy has impacted his work, said Assange.
“The 7.3 million pounds (US$12 million) of police surveillance admitted outside this embassy. It is a difficult situation. It is not a situation that is easy for [a] national security reporter. You can’t read sources. It is difficult to meet some of my staff because of that surveillance.”
However, he pointed the brighter side of his restricted movements as well.
“There are no subpoenas, there are no door knocks in the night, unlike [for] other national security reporters. So in some ways there are benefits to the situation,” he noted.
He has been optimistic about the attitude shift that has taken place recently. Britain amended its extradition laws to ban extradition without charges.

Help The Poor, Help The Homeless: Anonymous Relaunches OpSafeWinter

Anonymous, the famous hacktivists collective, is back again with its most effective non-hacking operation, OpSafeWinter.
The outreach operation, which started on 7 November 2013, to provide homeless people with basic necessities like food, warm clothing and camping supplies is back again this year as well.
A press release posted on the Pastebin read,
“Fellow Anon and Citizens of the world, We are proud to re-announce #OPSafeWinter. In this age of consumerism there is very little love or care about each other, and we’re here to change that. No longer shall we stand by and watch isolation and fear be spread by the establishment, which is killing and destroying community and lives. We all have a voice, so make yours heard, you are the power, your choice, your life, you are the motivation for justice.”
Our mission: to highlight the homeless situation in areas throughout world. Build up a resource network for food supply, blankets, clothes socks etc. that can be donated. Amenities for warm showers etc.
1st Mission:
Please list the current homeless count in alphabetical order by town/City Country. Within each town contact local charities, shops, businesses that will support with any of the above list and more. You can get the latest figures from your local council by sending them a freedom of information request if you are not sure of the figures in your town.
anonymous-relaunches-opsafewinter
2nd Mission:
Coordinate with anons and others willing to participate in the execution/distribution of services we are able to provide. Whether its’ transport, collection of donations etc.
This is not definitive, any other suggestions ideas are welcome. Please list at the bottom of the pad as bullet points to make it easy to follow.
Lets make winter as safe and comfortable for as many people within our reach and beyond.
@OpSafeWinter #OpSafeWinter
https://www.facebook.com/anonymousopsafewinter
The Cryptosphere, who interviewed the international team behind it, of course under the anonymous shield, reported that the new session starts with a stronger team, better focus, knowledge to dealing with law enforcement implications and a year’s experience.
The team said that despite its name, the operation will continue across the year because it is a global initiative.
“Homelessness is growing on Earth, by leaps and bounds, so continuing the Op throughout the year was an effective way to combat homelessness.”
The idea, which had its origin on the irc in a chat, was well received by many round the globe and within two weeks it had gone global, said one of the team member.
Surprising was the negative response from charities that they thought would actually applaud them for the inventiveness, the team said adding that they would ensure plenty of disclaimers highlighting no monetary donations.
“Any campaign asking for monetary donations will be seriously vetted before a hint of endorsement is shown.”
When asked about media coverage, the team replied that though they did not have mainstream media coverage, they did receive amazing radio coverage and limelight through Elite daily and some UK-based homeless publications.
With hardly any changes in any of its objectives since it was launched last year, the operation still echoes the same mission as it had last year.
“Success would be people recognizing that homeless people are just that…PEOPLE. They deserve compassion and care, just like anyone else. Some actual full-blown shelters have been set up as a result of the Op, [whereas] some see success as a Feed The Homeless Day or a blanket give away,” said the Anonymous team member.
The operation was endorsed by people from 12 countries around the globe [officially and many on ad-hoc basis] last year with the UK, the US and Brazil as being the most active countries. The operation not only sought to help homeless people but also raise awareness about homelessness.

Indian hacker defaces Pakistans’ major political Party ”PPP” website amid Kashmir issue

An Indian hacker going with the handle of Bl@Ck Dr@GoN has hacked and defaced the official website of Pakistan People’s Party, which is country’s oldest political party.
The hack was done against a tweet made by chairman of PPP Bilawal Zardari in which he had vowed to take back the Indian controlled Jammu and Kashmir.
Indian hacker along with his friends left a deface page with a message against the tweet expressed in following words:
‘Hello Mr. Bilawal Bhutto !!! To Citizens of Pakistan, Pakistan’s Army, Pakistan Peoples Party and Specially Mr. Bilawal Bhutto . Without any Violence Let Me tell you that Pakistan will never Get Kashmir. This is the Truth. You Have to Accept it :) So Mr. Bhutto You Want Kashmir ???? Huh xD “Laavange Laavange, Kashmir, Poora Kashmir !!!” Bitch Please.’
A preview of deface page is available below:
Deface page left by the hacker
Deface page left by the hacker
Tweet from PPP’s chairman:
Link of targeted website along with a mirror as a proof of hack is available below:
According to the website of Pakistani mission in the UN:
‘The Kashmir dispute is the oldest unresolved international conflict in the world today. Pakistan considers Kashmir as its core political dispute with India. So does the international community, except India.’
This is not the first time when People’s party website has been hacked. In past, Pakistani group had hacked the site; following with Nigerian Cyber Army hacking the site for second time in 2013.
At the time of publishing this article, the PPP’s website was down.

Monday 18 August 2014

Pirate Bay Founder Held In New Hacking Probe

Pirate Bay founder Gottfrid Svartholm Warg, who faces a year-long prison sentence for promoting copyright infringement, was detained on new computer hacking suspicions when he landed in Sweden on Tuesday morning.
Cambodia deports Pirate Bay founder to Sweden (11 Sep 12)
Cambodia to deport Pirate Bay co-founder (4 Sep 12)
Pirate Bay founder arrested in Cambodia (1 Sep 12)


According to a statement issued on Tuesday by the Swedish Prosecution Authority (Ã…klagarmyndigheten), Warg is suspected of having hacked into the Swedish Tax Agency (Skatteverket) as well as Swedish IT firm Logica, which supplies services to the agency.

"During a preliminary investigation concerning computer hacking at the company Logica and the Swedish Tax Agency during the spring, suspicions were directed at one person, Gottfrid Svartholm Warg," the Prosecution Authority wrote.

The agency added, however, that Warg's August 30th arrest in Cambodia and subsequent deportation from the country on Monday were due to an arrest warrant issued for him in relation to his conviction in the Pirate Bay trial.

Shortly after Warg's arrest, reports emerged that he was wanted in an investigation into a hacker attack against Logica and the tax agency.

According to a September 6th report in the Dagens Nyheter (DN) newspaper, the attacks gave the hackers access to a sizeable amount of protected personal information.

The attack is believed to have started in 2010 and continued until April of this year.

Warg, and his fellow co-founders Fredrik Neij and Peter Sunde, as well as financier Carl Lundström, were all convicted in 2009 of facilitating copyright infringement and ordered to pay 46 million kronor ($6.9 million) in damages to the music and movie industry.

While Neij, Sunde, and Lundström all had their 12-month sentences reduced to between four and 10 months on appeal in late 2010, Warg did not attend his appeal hearing and his one-year sentence was upheld.

Prosecutors now have until Friday to issue a remand order for Warg related to the new computer hacking suspicions.

Wednesday 13 August 2014

Xtam4 Hacker Gives speech for 14th August.


The well-known pakistani hacker xtam4 today given a speech for the masses, The speech went Trending on Pastebin and also appeared on other news channels. This is the first speech he ever gave and its well written and revolutionary. We are expecting more from Resistance.

Pastebin: http://pastebin.com/9a7kMtRR

Friday 8 August 2014

#OpSaveGaza Done by Legendary Old school hacking team.



G-force pakistan the legendary pakistani hacking team that was created in 1998 have done operation against israel, Hacking Israeli government sites. breaking records of other teams like "Anonghost". but there is no competition because the resistance have teamed up against Israel Genocide in GAZA. G-Force reformation is proved to be more powerful and stronger then previous team.Their main source of power is the famous pakistani hacker Xtam becoming their current boss.

Paste: http://pastebin.com/GMAX6vPL

Thursday 7 August 2014

GoDaddy hacked by Anonymous? Not likely


Yesterday the massive Internet registrar/lowbrow advertiser GoDaddy went down, taking millions of web sites offline with it. Breaking news reports attributed the trouble to a hack by Anonymous. Later, these items were corrected to say that the hack was not the work of Anonymous as a whole, but that Twitter user @AnonymousOwn3r was claiming responsibility. Mashable called @AnonymousOwn3r ”the security leader of Anonymous,” which must be true because @AnonymousOwn3r calls themself “the security leader of Anonymous” on his or her Twitter profile (and an “official member” to boot).  CNN went with the more measured description of @AnonymousOwn3r as “a person affiliated with Anonymous.”

All of this is very silly. Anonymous isn’t an organized group of any kind and has no office or officer to make anything official. It has no leaders of security or of anything else, but I guess it does have affiliates. You become one by being anonymous on the Internet. Are you logged in to Macleans.ca right now as you read this? If not, you are a person affiliated with Anonymous.

Whoever @AnonymousOwn3r is, they’ve gained notoriety and thousands of new followers in the last 24 hours and are likely having a laugh at the media right now. It might be a big laugh, because @AnonymousOwn3r might have had nothing to do with GoDaddy’s troubles.

GoDaddy is claiming today that they were not, in fact, hacked at all. CEO Scott Wagner said in a statment today that the outage had nothing to do with a hack or with a denial of service attack, Anonymous’ brute force method of pushing sites offline. Instead, it was “due to a series of internal network events that corrupted router data tables” (which is totally what I thought it was from the start).

Could Wagner’s statement be face-saving bluster? Possibly, but if so, he would be playing a very risky game. Hackers are usually all too happy to provide technical proof of their deeds, and if necessary, demonstrate their “ownage” of a site by smacking it offline again. @AnonymousOwn3r is assuring doubters that he or she is the real deal and linking to GitHub text purportedly documenting GoDaddy’s vulnerabilities.

As security experts analyze this, we’ll find out who is lying: CEO Scott Wagner or @AnonymousOwn3r.

My best guess? GoDaddy went dark due to some internal technical glitch, some random indvidual took credit, the media ran with it, and “lulz” ensued.

DHS Looking Outside the Box for Hackers, Feds Warm Up to the Cloud, and More




DHS Looking Outside the Box for Hackers, Feds Warm Up to the Cloud, and More



Here is today’s federal cybersecurity and information technology news:
  • As many security experts suspected, the Apple device ID’s that Anonymous claimed came from a Federal Bureau of Investigation agent’s hacked laptop actually came from the hack of an application development company. More here.
  • A new survey finds that although much of federal information technology has not yet moved to the cloud, agencies seem to be gaining confidence in moving more critical systems to the cloud. More here.
  • The Executive Office of the President is seeking a unified system for managing thousands of internship applications. More here.
  • Secretary of the Department of Homeland Security Janet Napolitano called for guidelines to facilitate public-private cybersecurity information sharing at a recent conference. More here.
  • In an attempt to bolster their cybersecurity workforce, the Department of Homeland Security is encouraging qualified hackers to apply even if they don’t have a college degree or don’t intend to stay at the position indefinitely. More here.

US Govt is Watching Your Emails, Images, Videos, Search History, Skype Calls, Files, Chats

There are chances that you might have thought of being watched by US government through Gmail, Facebook and other internet giants who are holding your sensitive and most private data.
The news is that all your fears were real, as a new secret document has proven the existence of a US government program that grants NSA (National Security Agency) and FBI the direct access to the servers of Google, Facebook, Microsoft, Skype, Yahoo, Apple and other internet companies, from where they can extract any user information at their will.
Named as PRISM, the program was sanctioned by President Bush in 2007, which is now renewed again by President Obama in December 2012.
Under this program, tech giants gave the direct access to its servers to US government agencies, through which they can grab any information they want, without any hurdle.
The information that NSA can access may include your emails, chats, search history, images, videos, skype calls (even the content of skype calls), YouTube videos (even those which are private), files that are stored in your computer, call records of your smartphones, SMS, MMS, places you visit and much more.
Microsoft joined this program before anyone, followed by Yahoo and Google. Facebook, Skype, Youtube, AOL and Apple are also the program partners who have given the direct access and they can obtain information of any kind for any user who uses these services.
Dropbox is likely to be added in the list of partner companies soon.
PRISM enables US government agencies to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.
Interestingly, US agencies call PRISM “one of the most valuable, unique and productive accesses for NSA”.
Another fact, which may worry our local “Privacy and Internet Freedom Activists” to a greater level is that Pakistan is second largest spying target of NSA, after Iran. Over 13.5 billion reports were gathered from Pakistan in March 2013 only.
Given the amount of data we share with these companies, including our personal and private information, this revelation is alarming and raise countless serious questions, concerning the morality of tech companies and US government.

#OpIsrael, Hundreds of Israeli websites are being attacked by Anonymous hackers

OpIsrael, Hundreds of Israeli websites are being attacked by Anonymous hackers

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group's anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel's policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.”

On a website dedicated to the event, another hacker group – AnonGhost – posted a video saying that the attack will target every possible Israeli website in order to show solidarity with Palestine.

In March, hackers united under the AnonGhost banner claimed to have crashed the website of Israel’s Ministry of Agriculture and Rural Development. The group posted the logins and passwords of the website’s users online.

The first cyber-attacks under the name OpIsrael were launched by Anonymous during and Israeli assault on Gaza in November 2012. Around 700 Israeli websites, including high-profile government setups such as the Foreign Ministry and the Israeli President's official website, were taken down. Following the attack, Anonymous posted the personal data of 5,000 Israeli officials online.




The websites of the Israeli parliament, ministries and other government organizations stopped operating for some time after last year's attack, which also took place on April 7.

A Middle East hacker who participated in the operation told RT that the “aim of the attack was to show the world the true face of Israel and its armed forces.” He said that last year’s attack was a warning for Israel to be ready for new, larger “surprises.”

In retaliation against the massive assault, Israeli hackers allegedly broke into the website OpIsrael.com and posted pro-Israeli content. The site was allegedly being used to coordinate cyber-attacks on Israeli sites. 


Hackers:

Mauritania Attacker - Virusa Worm - Deto Beiber - Dr.SaM!M_008 - M3GAFAB - Extazy007 - PhObia_PhOneyz - Mr Domoz - Tak Dikenal - AnonxoxTN - Raka 3r00t - PirateX - Bl4ck Jorozz - Younes Lmaghribi - Indonesian r00t - BlackBase Hacker - CoderSec - h4shcr4ck - Mrlele - Donnazmi - TheGame Attacker - SaccaFrazi - Egy Eagle - Mr.Ajword - HusseiN98D - Pr3d4T0r - THE GREATEST - HoLaKo - Man Rezpector - BiosTeRminat0r - Spec Tre - Hani Xavi - Don Maverick - RevCrew - Psyco Hacker - Black Cracker - rummykhan - VINUX - ARAFET - TITO_SFAXSIANO - SQUICK HACKER - Root Max and probably a lot more that are not listed.


DDOS Attack:

Hacked Sites List:
Israeli Gov password hashes and emails http://pastebin.com/XLyGkBYF

http://www.refuatyeladim.co.il/
http://www.gush-etzion.co.il/
http://www.cooler-mizug.co.il/
http://www.facesofberlin.org/
http://www.fried-hebron.co.il/
http://www.nofeimamre.com/
http://www.chabadnelson.com/
http://www.yachadisrael.org/
http://www.tiferethanna.com/
http://www.bakufsa.com/
http://www.zimmer-yehuda.co.il/
http://www.hadesk.co.il/
http://www.ora-vitrage.co.il/
http://elilev.me/
http://www.talkshow.co.il/
http://www.14across.co.il/
http://www.14across.com/
http://www.bwithme.co.il/
http://www.camacal.co.il/
http://www.danielzelig.com/
http://www.goingoout.co.il/
http://www.ideals.co.il/
http://www.newpro.co.il/
http://www.talkshow.co.il/
http://www.webhostsstatus.com/
http://cleanex.co.il/
http://adel.co.il/
http://www.doritsivan.com/
http://www.mediaportal.co.il/
http://fb4success.co.il/
http://www.extra-tlv.co.il/
http://eco-artvillage.org/
http://gil-text.com/
http://panpirsum.co.il/
http://www.down-from-youtube.com/

http://www.galilchocolate.co.il/
http://www.farod-inn.com/
http://www.dreamingforpeace.com/
http://doula4life.com/
http://dorit-coach.co.il/
http://www.ditiyair.com/
http://www.villa-tehila.co.il/
http://www.visual-taste.com/
http://www.webysitter.co.il/
http://www.yaelfriends.com/
http://www.yarokyarokevents.com/
http://derech-hashani.com/
http://www.orly-yeor.co.il/
http://ylogo.co.il/
http://www.yofitofiart.com/
http://www.zalishnik.co.il/
http://www.daliaoz.com/
http://www.csttax.co.il/
http://www.career360.co.il/
http://constellations.org.il/
http://www.biodog.co.il/
http://www.baofan.co.il/
http://www.bizcity.org.il/
http://anzor.co.il/
http://all2cad.co.il/
http://adalya.co.il/

http://hdesigners.co.il/my/
http://hdesign.co.il/my/index.php
http://hayadrori-law.co.il/my/
http://hawwai.co.il/my/index.php
http://judaicaisrael.co.il/my/index.php
http://isahar.co.il/my/index.php
http://ideo.co.il/my/index.php
http://gymtogo.co.il/my/
http://guyroze-law.co.il/my/
http://grfit-ag.co.il/my/
http://green-leaf.co.il/my/
http://gether.co.il/my/
http://haybniya.co.il/my/
http://hinashelly.co.il/my/
http://helena-cate.co.il/my/

http://mh-club.co.il/
http://www.mistica.org.il/wp-content/
http://מורה-פרטי.co.il/
http://שיעורי×-פרטיי×.co.il/
http://מורהפרטית.co.il/
http://irita.co.il/
http://lwp.co.il/
http://netadieta.co.il/
http://tnufabook.co.il/
http://forward-seo.co.il/
http://tgr.co.il/
http://mobland.co.il/
http://mobland.co.il/index.html
http://mishol.co.il/
http://www.greenify.co.il/
http://www.gargamel.co.il/


Hacked by @security_511 http://mops.gov.il/ http://pastebin.com/BZkAegrL 8 emails + pass @Op_Israel @AnonOpIsrael #Opisrael #OpIsraelBirthday

SITE: http://horadot.co.il/vengenz.html STATUS:#defaced #hacked 
#AnonsIndonesia #OpIsraelBirthday #OpIsrael

#OpSaveGaza, Israeli Cyber Space Again on Target of Muslim Hackers

ou can kill us but you can not kill the spirit of resistance and patriotism.



Message From Muslim Hackers to World:

This is an urgent call for all Hackers, Human Right Organisations and Activists all around the world to unite again and start campaign against Israhell, share what is really going on there, expose their terrorist activity to the world. The act of launching rockets from Gaza sector to Israhell is an acceptable and normal reaction against those pigs, its called Resistance and not terrorism. israhell never existed its only Palestine, it's our home. If you are a Hacker, Activist, a Human Right Organisation then hack israel websites and expose to the world their crimes, show to the world how much blood is on their hands, blood of innocent children and women.
We will never remain silent against israhell war activity. Anonymous collective, all Hacker teams will join this operation inchallah and we will be the cyber resistance, the cyber shield, the voice for the forgoten people. The voice of Palestine. Fight for the right, do something, where ever you are, what ever you can do, join the cyber intifada

Hacked Sites List:

Israel Websites hacked By AnonGhost

http://www.habanos.co.il/
http://www.adi-hitech.co.il/data/
http://adon-shoko.co.il/data/
http://www.ceramiccon.co.il/index.html
http://gvaot-winery.com/index.html
http://www.imagecom.info/index.html
http://lev-universe.com/index.html
http://www.mango.ms/index.html
http://www.kksh.co.il/index.html
http://www.sertasltd.com/index.html
http://www.pazam.co.il/index.html
http://www.pcpc.co.il/index.html
http://www.shviro.co.il/index.html
http://kadishanet.co.il/forms/
http://kadishanet.com/forms/
http://www.moonart33.com/data/
http://www.doritgray.com/data/
http://www.electrot.co.il/images/
http://hocusfocus.co.il/data/
http://www.nb-nesbad.co.il/img/
http://www.tidluk.co.il/data/
http://www.yarden2000.co.il/images/
http://www.kadishanet.org.il/forms/
http://www.kadishanet.com/forms/

Sites Hacked by sniper script
http://www.goticket.co.il/
http://www.vazan-nadlan.co.il/

Hacker For Rase Voice for GAZA by $j@root From BGHH
http://www.gruporeabilitar.com.br/
http://burkeblogs.com/wp/sjroot.html
http://burkeblogs.com/wp/
http://burkeblogs.com/

Hacked By Hunter Gujjar Hacker, Pakistani Hacker
http://testimonials.lliinternational.com/
http://tirunelveliwebsite.com/PCA.html

Hacked by Shoaib_Crunchi For GAZA, Pakistani Hacker
 http://bmefcolleges.edu.in/uph.htm
http://bmp.bmefcolleges.edu.in/uph.htm
http://bmefcolleges.com/uph.htm
http://bmefcolleges.bmefcolleges.edu.in/uph.htm
http://bmcp.bmefcolleges.edu.in/uph.htm
http://bmcm.bmefcolleges.edu.in/UPH.HTM

#‎FreePelastine‬
http://www.upgrade-solutions.co.il/
http://www.spada.co.il/
http://gemma.co.il/
http://ergasol.com.moonsitesoftware.co.il/


Israel Site HaCkEd By LDT, Libyan HaCkers
http://www.s-tradein-zafon.co.il/

Israel Sites Hacked By Ali TOOFAN
http://shantibanti.co.il/sec.htm
http://yaelgel.co.il/sec.htm.
http://yaelnarkis.com/sec.htm
http://windbell.co.il/sec.htm
http://yolway.co.il/sec.htm
http://bambook.co.il/

Turkey And Pakistan Warning to Israel to leave GAZA alone.

'Cosmo the God' Sentenced and banned from internet 6 Years.

Hacker ‘Cosmo the God’ Sentenced and Banned from Internet for Six Years.




A 15-year-old UG Nazi hacker going by the name of Cosmo or Cosmo the God was sentenced in juvenile court on Wednesday with terms for six years without any computers or Internet, until his 21st birthday. During these 6 years, he'll need approval from his parole officer to access the internet. Wired report that hacker resides in Long Beach, California, and began as a politicized.

99 Israeli Sites hacked by Anonghost

99 Israeli Websites 0wn3d bY AnonGhost.

According to hackers, this was just a warning attack. The real attack on Israeli cyber space will be after 3 days(7 Apr 2014). Whole server is massively defaced and hackers message is displaying on each hacked site. This kind of attacks rise many questions for security experts that how much hackers become powerful and there is not enough knowledge security experts have.



Deface Page Say's:
"Hi Israel !
We always here to Punish you as we did on the last Operation 7 April and we back again to celebrate it
Because We are the voice of Palestine and we will not remain silent!!

Muslims are everywhere - We will enter to Palestine soon :) remember this :D 

Alkhilafah is Coming soon Insha'Allah"

Hacked Sites:

http://fpisrael.co.il/index.htm 
http://fanpagepro.co.il/ 
http://opticcenter.co.il/ 
http://intersurf.co.il/index.htm 
http://master-market.co.il/index.htm 
http://elit.org.il/index.asp 
http://mtns.co.il/ghost.htm 
http://melach-haaretz.co.il/index.htm 
http://elicohen.org.il/index.htm 
http://elazraki.org.il/index.htm 
http://burgerville.co.il/ 
http://komunityproject.co.il/index.htm 
http://coolshoe.co.il/index.htm 
http://aclimatic.co.il/index.htm 
http://www.agr-non.co.il/index.htm 
http://animalhouse.co.il/index.htm 
http://harel.co.il/index.htm 
http://ibca.org.il/index.htm 
http://colorless-carotenoids.com/index.htm 
http://dormins-technology.com/index.htm 
http://phyto-flu-ene.com/index.htm 
http://phytoene-phytofluene.com/index.htm 
http://ibrlogin.com/index.htm 
http://antiaging-dormins.com/index.htm 
http://skincarotenoids.com/index.htm 
http://skin-youth.com/index.htm 
http://prophyderm.com/index.htm 
http://phytoeneandphytofluene.com/index.htm 
http://ariel-weltsch.com/index.htm 
http://arnongolani.co.il/index.htm 
http://bizbazz.co.il/index.htm 
http://bootnest.com/index.htm 
http://buna.co.il/index.htm 
http://www.classico-group.com/index.htm 
http://classigan-ltd.co.il/index.htm 
http://dan-viro.co.il/index.htm 
http://elazraki.org/index.htm 
http://en-levant.com/index.htm 
http://eyal-cpa.co.il/index.htm 
http://fineschmeckers.com/index.htm 
http://golanplastic.com/index.htm 
http://gvahim-ltd.co.il/index.htm 
http://www.gvahim.com/index.htm 
http://handsontraining.co.il/index.htm 
http://handson-training.com/index.htm 
http://hatraklin.co.il/index.htm 
http://haygroup-web.com/index.htm 
http://hummer2rent.co.il/index.htm 
http://ibrweb.com/index.htm 
http://idc-diamond-deal.com/index.htm 
http://moriah-collection.com/index.htm 
http://iicc.org.il/index.htm 
http://josephbau.com/index.htm 
http://josephbau.org/index.htm 
http://kakkoii-fashion.com/ghost.htm 
http://levant.co.il/ghost.htm 
http://limelect.com/ghost.htm 
http://mbegood.co.il/index.htm 
http://memorex.co.il/index.htm 
http://mhasharon.co.il/ghost.htm 
http://miriambenhaim.com/ghost.htm 
http://mirshamim.co.il/index.htm 
http://mobisoft.co.il/ghost.htm 
http://monplatin.co.il/index.htm 
http://mor-logistics.co.il/index.htm 
http://moraz-pregnancy.com/index.htm 
http://mottichef.co.il/index.htm 
http://navy-raoul.com/index.htm 
http://kachol-atlit.co.il/index.htm 
http://neve-yam.co.il/index.htm 
http://nevemarom.co.il/index.htm 
http://www.nirugroup.com/index.htm 
http://nofim.net/index.htm 
http://nordic-dog-club.co.il/index.htm 
http://oig.co.il/index.htm 
http://opticjunior.co.il/index.htm 
http://rain-line.com/index.htm 
http://samarkand.co.il/index.htm 
http://www.sandwich-factory.co.il/ghost.htm 
http://sh-m.co.il/index.htm 
http://shay-cb.co.il/ghost.htm 
http://shay-cb.com/ghost.htm 
http://shtechs.com/ghost.htm 
http://www.sivan-digital.com/index.htm 
http://www.sivan-group.net/ghost.htm 
http://steinmetz-foundation.co.il/ghost.htm 
http://www.supercom.com/index.htm 
http://talyam.co.il/index.htm 
http://www.tavlit.co.il/ghost.htm 
http://terminator.co.il/index.htm 
http://www.the7d.co.il/index.htm 
http://www.the7d.com/index.htm 
http://www.ti-group.co.il/ghost.htm 
http://indoor-outdoor.co.il/index.htm 
http://transelectric.co.il/index.htm 
http://w2pcardpack.com/ghost.htm 
http://werubel.co.il/index.htm 
http://x-pens.com/index.htm 
http://yehudalight.co.il/index.htm