Category: Hacking


Email Eruption: Hillary Hidden Emails Multiply By Ten

 

 

 

 

”  When Hillary Clinton tweeted yesterday in the midst of her latest scandal “I want the public to see my email,” did she mean all ten hidden accounts, or just hdr22@clintonmail.com, the only account to be outed before that tweet?  Now, thanks to a hacker, who seems not to have done anything illegal but use a piece of software, things have gone, shall we say, a little haywire:

 

  A prominent hacker tells Fox News’ James Rosen that Hillary Clinton appears to have established multiple email addresses for private use.

  Aides to the former secretary of state say she only used one private email while in office — hdr22@clintonemail.com. That domain name has been traced to a private Internet server in Clinton’s hometown of Chappaqua, N.Y. The server was registered in the name of Clinton’s former aide Eric Hothem a week before the Obama administration assumed office.

  Rosen’s hacker source employed a tool called “The Harvester” to search a number of data sources to look for references to the domain name Clintonemail.com. The source says it appears Clinton established multiple email addresses, including hdr@clintonemail.com, hdr18@clintonemail.com, hdr19@clintonemail.com, hdr20@clintonemail.com, and hrd21@clintonemail.com.

  Other email addresses include h.clinton@clintonemail.com, Hillary@clintonemail.com, contact@clintonemail.com, and mau_suit@clintonemail.com.

  It’s not clear whether Clinton used any or all of these email addresses. It’s also unclear whether her aides used them. “

 

Read more

 

 

 

 

 

 

 

 

 

 

 

Hillary Clinton Used Personal Email At State Dept., Possibly Breaking Rules

 

 

 

 

 

” Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, State Department officials said, and may have violated federal requirements that officials’ correspondence be retained as part of the agency’s record.

  Mrs. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act.

  It was only two months ago, in response to a new State Department effort to comply with federal record-keeping practices, that Mrs. Clinton’s advisers reviewed tens of thousands of pages of her personal emails and decided which ones to turn over to the State Department. All told, 55,000 pages of emails were given to the department. Mrs. Clinton stepped down from the secretary’s post in early 2013.

  Her expansive use of the private account was alarming to current and former National Archives and Records Administration officials and government watchdogs, who called it a serious breach.”

  How could this secretive practice in any way be acceptable in a public official ? We fail to understand how this could be conceived as anything other than a blatant attempt to control what parts of her “official” business are made available for public view .

I can recall no instance in my time at the National Archives when a high-ranking official at an executive branch agency solely used a personal email account for the transaction of government business,” said Mr. Baron, who worked at the agency from 2000 to 2013.

  Regulations from the National Archives and Records Administration at the time required that any emails sent or received from personal accounts be preserved as part of the agency’s records.

  But Mrs. Clinton and her aides failed to do so.

  How many emails were in Mrs. Clinton’s account is not clear, and neither is the process her advisers used to determine which ones related to her work at the State Department before turning them over.”

   No matter how one looks at it , EVERY correspondence of EVERY government official , making allowances for certain matters of national security , are PUBLIC property , generated in the public interest and paid for with public funds and thus are required to be archived and saved for future investigation . 

   How is Hillary’s staff picking and choosing exactly what correspondence the taxpayers , historians , reporters and regulators have access to any different than shredding documents or Nixon’s missing Watergate tapes ? And this woman thinks she deserves to be president . Shame , shame , shame …

   It’s not like Mrs Clinton has a stellar record of forthrightness to fall back on . As a matter of fact her past history belies exactly the opposite what with her being fired from the Watergate investigation , Travelgate , Whitewater , Rose Law firm billing records etc. On the contrary the woman is the picture of obfuscation and secrecy , much like her old boss .

Read it all at the NY Times 

5 Most Dangerous Hackers Of All Time

 

 

 

” As you may know Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.”, it means someone who tries to find solutions or alternative solutions to a problem. Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers based on their behavior.

  A white hat hacker is someone working for corporations like anti-virus or firewall companies or in general trying to help society like most Anonymous Hackers.

  A Gray Hat Hacker is someone who usually doesn’t work for any company and is neither good or bad, meaning that he hacks systems kinda illegally, but still not doing any harm to the system or anyone else.

  A Black Hat Hacker is usually considered as the ‘typical’ bad guy who is doing harm, either financially or by just exploiting and hacking systems to push his own limits or better to day ego. “

 

Thanks to AnonHQ

 

 

 

 

 

 

 

 

 

 

 

 

 

Cybergeddon: Why The Internet Could Be The Next “Failed State”

 

 

 

 

 

 

” In the New York City of the late 1970s, things looked bad. The city government was bankrupt, urban blight was rampant, and crime was high. But people still went to the city every day because that was where everything was happening. And despite the foreboding feelings hanging over New York at the time, the vast majority of those people had at most minor brushes with crime.

  Today, we all dabble in some place that looks a lot like 1970s New York City—the Internet. (For those needing a more recent simile, think the Baltimore of The Wire). Low-level crime remains rampant, while increasingly sophisticated crime syndicates go after big scores. There is a cacophony of hateful speech, vice of every kind (see Rule 34), and policemen of various sorts trying to keep a lid on all of it—or at least, trying to keep the chaos away from most law-abiding citizens. But people still use the Internet every day, though the ones who consider themselves “street smart” do so with varying levels of defenses installed. Things sort of work.

  Just like 1970s New York, however, there’s a pervasive feeling that everything could go completely to hell with the slightest push—into a place to be escaped from with the aid of a digital Snake Plissken. In other words, the Internet might soon look less like 1970s New York and more like 1990s Mogadishu: warring factions destroying the most fundamental of services, “security zones” reducing or eliminating free movement, and security costs making it prohibitive for anyone but the most well-funded operations to do business without becoming a “soft target” for political or economic gain.

  That day is not yet nigh, but logic suggests the status quo can’t continue forever. The recent rash of major breaches of corporate networks, including the theft of personal information from the health insurer Anthem and the theft of as much as a billion dollars from over 100 banks are symptoms of a much larger trend of cybercrime and espionage. And while the issue has been once again raised to national importance by the White House, it could be argued that governments have done more to exacerbate the problem than address it. Fears of digital warfare and crime are shifting budget priorities, funding the rapid expansion of the security industry and being used as a reason for proposals for new laws and policy that could reshape the Internet.

“ If we think our kids and grandkids are going to have as awesome and free an Internet as the one we have, we really have to look at why we think that,” Jason Healey, director of the Cyber Statecraft Initiative at the Atlantic Council of the United States, told Ars.”

 

Read the whole thing at ArsTechnica

 

 

 

 

 

 

 

 

 

 

 

 

DDoS Attacks Against Governments More Powerful And Popular Than Ever

 

 

 

” When the protesters hit the streets, expect DDoS attacks to hit the Web. 

  Distributed denial of service (DDoS) attacks are being used against government targets more than ever before, according to new research from Internet infrastructure firm Verisign. The attacks are increasingly powerful, cheap, and easy to deploy.

  DDoS attacks work by flooding a target—a bank, for instance, or a popular website—with data in order to make it crash or unusable for users. It’s not only an easy-to-use, cheap, and effective weapon for hackers, it’s also a goldmine for security firms paid to defend against the attacks.

  DDoS attacks against public-sector targets grew to account for 15 percent of all attacks recorded by the company at the end of 2014. The average size of attacks grew in size by 245 percent, Verisign found.

  DDoS-for-hire services can cost as little as $2 per hour, delivering an easy-to-use but potentially powerful punch to any Internet-connected devices on earth. 

  The DDoS defense market—where Verisign is a major player—is projected to hit $1.6 billion within two years.”

 

Daily Dot

 

 

 

 

 

 

 

 

 

 

 

Massive Utah Cyberattacks — Up To 300 Million Per Day — May Be Aimed At NSA Facility

 

 

 

” Five years ago, Utah government computer systems faced 25,000 to 30,000 attempted cyberattacks every day.

  At the time, Utah Public Safety Commissioner Keith Squires thought that was massive. “But this last year we have had spikes of over 300 million attacks against the state databases” each day: a 10,000-fold increase.

  Why? Squires says it is probably because Utah is home to the new, secretive National Security Agency computer center, and hackers believe they can somehow get to it through state computer systems.

” I really do believe it was all the attention drawn to the NSA facility. In the cyberworld, that’s a big deal,” Squires told a legislative budget committee Tuesday. “I watched as those increases jumped so much over the last few years. And talking to counterparts in other states, they weren’t seeing that amount of increase like we were.” “

Read more

No, Lizard Squad Was Not Responsible For Facebook Outage

 

 

 

” Contrary to suggestions hacker group Lizard Squad took out Facebook, there was almost certainly no attack on the social network and its photo sharing property Instagram, which both went down late last night. According to a source with knowledge of the matter, the downtime was the result of a technical foul up. Facebook is now confirming this in statements to media.

  Some had suspected that Lizard Squad, which was responsible for the Christmas strikes on Microsoft’s Xbox Live and Sony’s PlayStation Network, had hit Facebook with a distributed denial of service (DDoS) attack, where a web service is swamped with traffic. But the source said internal issues were to blame and there was no DDoS.

  There’s another big clue that hints there was no DDoS: this was a simultaneous global outage. Facebook is a huge organization, with highly distributed systems. An attacker would have to figure out how to disable all of them at once, which would take high technical ability and knowledge of Facebook’s worldwide networks. Though Lizard Squad has proven itself adept at knocking out big services, it has not shown itself capable of knocking out something as huge as Facebook.”

 

Read on

 

 

 

 

 

 

 

 

 

 

 

Mysterious Vigilante ‘The Jester’ Single Handedly Takes Down Jihadist Websites

 

 

 

” Anonymous isn’t doing anything new by hacking Islamic extremist websites. A mysterious figure known as “The Jester” has been at it for five years.

  Jester has single-handedly taken down dozens of websites that, he deems, support jihadist propaganda and recruitment efforts. He stopped counting at 179.

  To some, he’s an Internet superhero. Think Batman, with all the vengeance-laden moral qualms of vigilantism included.”

 

 

 

 

 

 

” “ I realized something needed to be done about online radicalization and ‘grooming’ of wannabe jihadis, and we didn’t have mechanisms to deal with it,” Jester said in an interview with CNNMoney. “I decided to start disrupting them.”

  Little is actually known about Jester, other than his public persona on Twitter as th3j35t3r: He is unapologetic, unabashedly pro-America and full of military jargon.

  Jester first appeared on Twitter on Dec. 19, 2009. Since then, he’s used his computer hacking skills to shut down, deface or expose anything he considers threatening to the United States — especially if it endangers soldiers. If a legitimate company is hosting the site, it usually gets a brief warning before he attacks.”

 

 

     While we were unable to track down a video interview of the Jester we did come across this print interview from Homeland Security Today and here is the CNN Money interview , see excerpt below , with the infamous hacker that our readers may find of interest . 

 

 

” On one hand, his personal crusade makes him little different from members of Anonymous. Last week, Anonymous blocked a jihadist website in retaliation for the Charlie Hebdo attack.

  The difference is that Anonymous is a worldwide, ragtag group driven by various ideologies and rules. Jester sticks to one, patriotic mission: U.S. enemies only. But the definition is up to him. In 2010, he temporarily blocked Wikileaks. In August, he took down the website of PlayStation hackers Lizard Squad.

” I answer to my conscience, and to God, sir,” he said. “That’s about it. I think my actions speak loudly enough of my principles and doctrine.” “

 

Read more

 

 

 

 

 

 

 

 

 

 

 

 

World War III Scares Posted By Hacked NY Post, UPI Twitter Feeds

 

 

 

 

 

” Social media watchers on Friday were treated to shocking and dramatic global developments courtesy of the New York Post and United Press International: World War III declared by the Pope! China and the United States engaged in a serious military battle!

  Thankfully for the international community, it was just (another) case of hacked Twitter accounts going haywire.”

 

 

upi-twitter-screenshot.png

 

 

” Both UPI and the New York Post had their Twitter feeds hijacked at around 1 p.m. on Friday, as President Barack Obama and UK Prime Minister David Cameron addressed the media on cyber security and the need to beef up online defenses.”

 

Read more

 

 

 

 

 

 

 

 

 

 

‘Hacktivist’ Group Anonymous Says It Will Avenge Charlie Hebdo Attacks By Shutting Down Jihadist Websites

 

 

 

 

” Hacker group Anonymous have released a video and a statement via Twitter condemning the attacks on Charlie Hebdo, in which 12 people, including eight journalists, were murdered.

  The video description says that it is “a message for al-Qaeda, the Islamic State and other terrorists”, and was uploaded to the group’s Belgian account.

  In the clip, a figure wearing the group’s symbolic Guy Fawkes mask is seated in front of a desk with the hashtag #OpCharlieHebdo – which stands for Operation Charlie Hebdo – featured on screen.

  The figure, whose voice is obscured says: “We are declaring war against you, the terrorists.”

  They add that the group will track down and close all accounts on social networks related to terrorists in order to avenge those who have been killed.”

 

The Telegraph has more

 

 

 

 

 

 

 

 

 

 

 

Sharyl Attkisson Sues Administration Over Computer Hacking

 

 

 

 

” Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. 

  In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. 

” I just think it’s important to send a message that people shouldn’t be victimized and throw up their hands and think there’s nothing they can do and they’re powerless,” Attkisson said in an interview. 

  The department has steadfastly denied any involvement in the hacking, saying in a 2013 statement: “To our knowledge, the Justice Department has never compromised Ms. Attkisson’s computers, or otherwise sought any information from or concerning any telephone, computer, or other media device she may own or use.” “

 

Fox News

 

 

 

 

 

 

 

 

 

 

How To Pull A Tooth With A Golf Club, Golf Ball And Dental Floss

 

 

 

 

Published on Dec 30, 2014

” My 7 year old wanted to pull his tooth but was concerned it would be to painful to pull SLOWLY. So we did it QUICKLY and in his words with no pain, just a little fear.”

 

 

 

 

 

 

 

 

 

 

Hackers Released An Enormous Cache Of 13,000 Passwords And Credit Cards

 

 

 

 

 

” On Friday, a group claiming affiliation with the loose hacker collective Anonymous released a document containing approximately 13,000 username-and-password combinations along with credit card numbers and expiration dates.

  The stolen personal information was released in a massive text file posted the document sharing site Ghostbin. The compromised sites run the gamut from pornography to gaming to online shopping. 

  Some of the most significant leaks came from online video gaming networks like Xbox Live, the Sony PlayStation Network, and Twitch.tv. There was information from accounts at Walmart, Amazon, and Hulu Plus, as well as keys to computer games like The Sims 3 and Dragon Age: Origins, and a whole lot of porn sites.

  Some Anonymous members have pushed back on the assertion that this leak had anything to do with the hacktivist group. Anonymous has no official leadership or centralized organizational structure; instead, it functions as a loose affiliation of computer hackers that join together in support of various causes, ranging from battles with the Church of Scientology to doxing members of the KKK. If hackers branding themselves as Anonymous carry out a particular action, it doesn’t necessarily mean it’s any of the same people who have carried out any other Anonymous-branded action.

  Judging from the document, the following sites were compromised or, at the very least, had some of their user data stolen—possibly through malware installed onto users’ personal devices or other nefarious methods.

 

  • Amazon
  • Walmart
  • PlayStation Network
  • Xbox Live
  • Twitch.tv
  • Origin.com
  • Hulu Plus
  • Dell
  • Brazzers
  • lKnowThatGirl
  • Mofos
  • DigitalPlayground
  • Wicked
  • Twistys
  • Fantyasyhd
  • Puremature
  • Tiny4k
  • MotherFuckerXxx
  • Playboy
  • CastingCouchX
  • BangBros
  • POVD
  • BabesNetwork
  • ArtisticAddiction
  • X-art
  • Shutterstock
  • Platinumclub.com
  • AprilJordan.com
  • DareDorm
  • PrettyPetites
  • NaughtyAmerica
  • PornAccess
  • RookieBabe
  • GFMembersPass
  • HungarianHoneys
  • PleaseBangMyWife “

 

Daily Dot has more

 

 

 

 

 

 

 

 

 

 

 

PlayStation Network, Xbox Live Offline Due To Attacks

 

 

 

 

 

 

” If all you want for Christmas is some online video gaming, you may feel like you got coal in your stocking.

  Online game networks Xbox Live and PlayStation Network were knocked offline much of Christmas Day in an apparent DDos (distributed denial of service) attack.

  Taking credit for the takedown: a group called Lizard Squad, which previously claimed credit for August attacks on the PlayStation Network and online games World of Warcraft and League of Legends. “

 

USA Today

 

 

 

 

 

 

 

 

 

 

 

No, North Korea Didn’t Hack Sony

 

 

 

 

 

” The FBI and the President may claim that the Hermit Kingdom is to blame for the most high-profile network breach in forever. But almost all signs point in another direction.
  So, “The Interview” is to be released after all.

  The news that the satirical movie—which revolves around a plot to murder Kim Jong-Un—will have a Christmas Day release as planned, will prompt renewed scrutiny of whether, as the US authorities have officially claimed, the cyber attack on Sony really was the work of an elite group of North Korean government hackers.

  All the evidence leads me to believe that the great Sony Pictures hack of 2014 is far more likely to be the work of one disgruntled employee facing a pink slip.

  I may be biased, but, as the director of security operations for DEF CON, the world’s largest hacker conference, and the principal security researcher for the world’s leading mobile security company, Cloudflare, I think I am worth hearing out. “

 

 

Read more

 

 

 

 

 

 

 

 

 

North Korea Internet Access ‘Totally Down’

 

 

 

 

 

” North Korea experienced sweeping and progressively worse Internet outages extending into Monday, with one computer expert saying the country’s online access is “totally down.” The White House and the State Department declined to say whether the U.S. government was responsible.

  President Barack Obama said Friday the U.S. government expected to respond to the hacking of Sony Pictures Entertainment Inc., which he described as an expensive act of “cyber vandalism” that he blamed on North Korea. Obama did not say how the U.S. might respond, and it was not immediately clear if the Internet connectivity problems represented the retribution. The U.S. government regards its offensive cyber operations as highly classified.”

 

Read more

 

 

 

 

 

 

 

 

 

 

Sony Hackers Mock FBI: ‘You Are An Idiot’

 

 

 

 

 

 

” The group behind the devastating hacking attack on Sony has apparently posted a message mocking the FBI.

” The result of investigation by FBI is so excellent that you might have seen what we were doing with your own eyes,” the message posted on the file-sharing website Pastebin by a group calling itself GOP (Guardians of Peace) said.

” We congratulate you success. FBI is the BEST in the world.”

  The US federal agency has named North Korea as the force behind the attack on Sony, which led the company to withdraw the comedy The Interview from its Christmas Day release.”

 

Yahoo News

 

 

 

 

 

 

 

 

 

 “President Obama Piles On And Blames Sony” Regarding Sony Hack Attack

 

 

 

Megyn Kelly On Jimmy Kimmel 12.17.14

 

 

 

Cellphone Privacy Is Shaky, Researchers Say

 

 

 

” German researchers have discovered security flaws that could let hackers, spies, and criminals listen to private phone calls and intercept text messages on a potentially massive scale — even when cellular networks are using the most advanced encryption available.

  The flaws, to be reported at a hacker conference in Hamburg this month, are the latest evidence of widespread insecurity on SS7, the global network that allows the world’s cellular carriers to route calls, texts, and other data to one another. Experts say it’s increasingly clear that SS7, designed in the 1980s, is riddled with serious vulnerabilities.

  The flaws discovered by the Germans are actually functions built into SS7 for other purposes, such as keeping calls connected as users speed down highways, switching from cell tower to cell tower. Hackers can repurpose them because of the lax security on the network.”

 

Read more at the Boston Globe

 

 

 

 

 

 

 

 

 

Anonymous Hacking Attack Lands British Rock Guitarist In Jail

 

 

 

” Geoffrey “Jake” Commander, a rock guitarist who has played with the Electric Light Orchestra, George Harrison and Elton John, among others, walked unnoticed through the halls of the U.S. District Court in Alexandria early Friday afternoon.

  Having been found indigent by a federal judge, the 66-year-old was accompanied by a court-appointed lawyer. Nearly four years to the day earlier, as his attorney put it, Commander, “like the crew of Gilligan’s Island, went on a three-hour tour that led to disastrous consequences.”

  He was one of 13 people charged last year as members of the underground group Anonymous in attacks against financial institutions and other companies. Initially, he faced up to 10 years in federal prison.

  Later, though, the case was quietly downgraded to a misdemeanor. On Friday, Commander was sentenced to 10 days in the Alexandria jail. With credit for one day served already after his arrest, he’ll be out early next week.

  Records hardly depict Commander as a cybercrime mastermind as much as an online surfer who stumbled his way into an unfamiliar chat room. Once there, in what he later would call an “impulsive, spurious and foolish” decision, he clicked on a link that would lead him years later right into the crosshairs of the Justice Department. “

 

Washington Times

 

 

 

 

 

 

 

 

 

 

Hacked Documents Reveal A Hollywood Studio’s Stunning Gender And Race Gap

 

 

 

 

” Sony Pictures Entertainment, one of the largest film studios in Hollywood, appears to have been the subject of a massive, devastating computer hack. The hack, which came to light last week, included leaked full-length versions of five upcoming Sony Pictures films, along with a trove of sensitive internal documents, and a hijacking of Sony Pictures’ corporate Twitter account.

  This morning, I received a link to a public Pastebin file containing the documents from an anonymous e-mailer, and have spent hours poring through some of them. I’ll spend more time in the days ahead. But one interesting tidbit caught my eye: a spreadsheet containing the salaries of more than 6,000 Sony Pictures employees, including the company’s top executives.

  One other observation to make about Sony Pictures’ top-paid executives is that they’re almost entirely white. From some quick Internet searching, fifteen of the seventeen appear to be Caucasian, one (Dwight R. Caines) appears to be African-American, and one (Man Jit Singh) appears to be South Asian. (I’ll update these numbers when and if I hear back from Sony Pictures.) In other words, unless I’m missing something, the upper pay echelon of Sony Pictures is 94 percent male, and 88 percent white. “

 

 

Hollywood hypocrisy in action: Diversity for thee , but not for me …

Read more

 

 

 

 

 

 

 

 

 

Government Employees Cause Nearly 60% Of Public Sector Cyber Incidents

 

Fed Cyber Attacks

 

 

” About 58 percent of cyber incidents reported in the public sector were caused by government employees, according to an annual data breach report compiled by Verizon. The findings — stripped of identifying information — do not mention ex-contractor Edward Snowden’s mammoth leak of national secrets. 

  Even if Snowden’s leaks had been included in the tally of results attributed to insider threats, they wouldn’t have made much of a dent. 

” If that were recorded in here, that would be a single event,” said Jay Jacobs, a Verizon senior analyst and co-author of the report. 

  Most (34 percent) of the insider incidents in the global public sector during the past three years were miscellaneous errors such as emailing documents to the wrong person. Unapproved or malicious use of data by public servants accounted for 24 percent of reported incidents.

  Surprisingly, cyberspying and intrusions via security holes in websites, known to be big problems in government, represented less than 1 percent of the situations reported. “

 

NextGov has more