Hackers who exposed North Korean government hacker explain why they did it https://www.byteseu.com/1309282/ #Conflicts #cybersecurity #hackers #hacking #hacktivist #infosec #NorthKorea #Phrack
Hackers who exposed North Korean government hacker explain why they did it https://www.byteseu.com/1309282/ #Conflicts #cybersecurity #hackers #hacking #hacktivist #infosec #NorthKorea #Phrack
We are incredibly proud to have assisted Europol in a global operation against the notorious pro-Russian #hacktivist group #NoName057(16)
Over the years, NoName057(16) has carried out thousands of #DDoS attacks against websites of western organisations and national critical infrastructure , aiming to spread pro-Russian ideology
and stir up distrust and uncertainty in the western hemisphere
It's probably a good idea to do another #introduction since people change over time, ideally.
I'm haui. I help people & build things that help people. Big #foss enthusiast, #sysadmin by day and #hacktivist at night.
I think all people (and animals) are born equal and should stay that way.
I oppose #capitalism and embrace alternative systems. I dont care about #corporatedemocracy and manipulated "free speech".
I want thirst, hunger and homelessness gone, for everyone, by any means necessary.
Photo from 1937 of dead people in Nanking
Another prominent anti #Iran #hacktivist group Edaalate Ali posting longitude and latitude to what I would infer they hope or wish was a target for the bombings.
Anti #Iran #hackers Lab Dookhtegan posting this on their Telegram as the bombs fell on Iran, I’ll be checking in on various #hacktivist group reactions as the day goes on.
I’ve started writing the third & last section of my #blog on the Indian and Pakistani #hacktivist conflict which will detail from the invasion of #Ukraine by #Russia up to the current day & my god it has really crystallized in my mind just how crazy and mixed up things have gotten in #hacker circles
CyberAv3ngers: The #Iranian #Saboteurs #Hacking Water and Gas Systems Worldwide
Despite their #hacktivist front, #CyberAv3ngers is a rare state-sponsored #hacker group bent on putting industrial #infrastructure at risk—and has already caused global disruption.
#security #iran #statesponsored
https://www.wired.com/story/cyberav3ngers-iran-hacking-water-and-gas-industrial-systems/
@gfidk @kdawson Some people here are hackers too. Clowns as well.
They're so elite that SQL injections work on their website... lol
#hacktivist #civildisobediance #antifascist #fuckdoge
Head Mare Targets Russian Orgs with Hidden LNK Files, Ransomware https://thecyberexpress.com/head-mare-targets-russia/ #TheCyberExpressNews #Babukransomware #TheCyberExpress #FirewallDaily #CybleBlogs #Hacktivist #Ransomware #CyberNews #LockBit #Ukraine #Russia
@TheGibson If only we knew some talented #artist folk looking for commissions? :)
I have no idea what a reasonable price would be for a T-shirt design, but if you're out there and the idea of a T-shirt with the slogal "Always Be Noobin'" and #hacktivist culture inspires you, let me know and maybe we can make this happen :)
A pro- #Palestine #hacktivist #group called SN_BLACKMETA claims to have #cyber attacked and taken down the #InternetArchive ,just because the servers are physically located in the #USA .The rather surprising #attack may not get much #sympathy from the wide spread #international #user #community ...
#Israel #Gaza #Hezbollah #Iran #Hamas
https://gizmodo.com/hacktivists-claim-responsibility-for-taking-down-the-internet-archive-2000510339
I've been slacking on posting about #hacktivist activity lately but stumbled across this, from August, in which Cund-el Aksa, a Turkish Islamic fundamentalist #hacker group, #hacked an app called Ekomobil in Turkey and used that access to add bomb threats to screens on buses.
@vfrmedia If I was a #Hacktivist - I'd mess up their digital signals & substitute anarchist radio in.
I have said it before and will say it again, Mysterious Team Bangladesh not only have an incredible #hacktivist group name but also a selection of handles that is the god tier of throwbacks to hacker handle fashions not just of yesteryear but actually decades ago. 'C0MM4ND3R P3T3R', pure nostalgia.
#hacking #history
@Bing_Chris Now do the Iranian oil system, #hacktivist group!
More than 45,000 affected by cyberattack on Idaho nuclear research lab
https://therecord.media/idaho-national-laboratory-data-breach-notifications #Idaho #cyberattack #federal #nuclear #research #lab #hacktivist #SiegedSec
#CISA today published a bulletin warning operators of critical #infrastructure that Iran-allied attackers are conducting #attacks against PLCs.
This attack in particular is a "#hacktivist" attack originating from #Iran-allied attackers. The entirety of the attack targets a specific brand of programmable logic controllers (PLCs), which are basically system-on-a-chip devices used in industrial settings.
The particular brand is made by a company based in #Israel. The "attack" swaps a graphical image on a web-based login screen with a political statement from the threat actors, and is done by the attackers brute-forcing a password used to manage the #PLC device.
Since this isn't a traditional endpoint, there is no endpoint protection to be leveraged here. The CISA bulletin references an IP address connected to a large hosting ISP based in the Netherlands that the attackers are using to launch the brute-force attacks against internet-facing PLCs.
I would suggest that it is counter to conventional wisdom and generally-accepted guidance to put "internet of things" devices like PLCs facing an unprotected network connection to the public internet. If the PLCs are behind a firewall they will not be reachable by the attackers unless the attackers penetrate the network protection where the PLCs are located, which is a far more serious attack, but the CISA bulletin and its related TTP document does not allege that is taking place.
What I infer from CISA's bulletin is that these devices are not hosted behind a firewall (i.e., not requiring a VPN to reach), and are unprotected from inbound attacks coming from the public internet other than by a password, that the device has no ability to counter #bruteforce password spamming, and ships with a default password that is publicly available. Under those circumstances, there's very little anyone can do to protect the devices other than put them behind a #firewall.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a