PDA

View Full Version : 7000+ Accounts and 70 Police sites taken down in the name of AntiSec




hillbilly123069
07-30-2011, 11:20 PM
Didnt really know where to post this but it's interesting. Sounds like someone is ready to scrap.
"Time for us to conduct a raid of our own.

In retaliation to the unjust persecution of dozens of suspected Anonymous
“members”, we attacked over 70 US law enforcement institutions defacing their
websites and destroying their servers. Additionally, we have stolen massive
amounts of confidential documents and personal information including email
spools, password dumps, classified documents, internal training files, informant
lists, and more to be released very soon. We demand prosecuters immediately drop
all charges and investigations against all “Anonymous” defendants."
http://www.cyberwarnews.info/2011/07/31/7000-accounts-and-70-police-sites-taken-down-in-the-name-of-antisec/

ghengis86
07-30-2011, 11:26 PM
http://www.eweek.com/c/a/Security/Anonymous-Claims-Network-Breach-of-FBI-Security-Contractor-ManTech-693504/

As promised, Anonymous has sought to embarrass the FBI with a network attack, this time going after defense contractor ManTech International.

"Hacktivist" collective Anonymous claims to have "owned" the defense contractor ManTech International and promised to release the stolen information within 24 hours, according to a post on Twitter that appeared shortly after midnight on July 29.

Some documents have already been posted as "teasers," including a resume of an individual with significant military and law enforcement background and a statement of work memo for NATO Communication & Information Systems Services Agency. About 500MB of files are expected to be released.

This latest attack is in apparent retribution for the July 20 arrests of individuals who are accused of participating in Anonymous group hacking attacks.

Earlier this week, in the midst of news reports about British police arresting a suspected member of hacker group LulzSec and regular updates on Twitter about people canceling PayPal accounts in protest, Anonymous posted the following warning on Twitter, "Also, tomorrow: Expect something nice. Looks like the FBI asked for a slap in the face. Well, we can deliver. #FFF (On Thursday, who cares)."

About 14 individuals were arrested on July 20 in the United States for participating in the Anonymous DDOS (distributed denial-of-service) campaign against PayPal in Operation Payback in December. The FBI also arrested one person accused of hacking into InfraGard Tampa and a customer support contractor who downloaded confidential AT&T documents and provided them to LulzSec.

The group said the attacks will continue regardless of the arrests. "We are not scared anymore. Any threats to arrest us are meaningless. We are past threats. We just act. #AntiSec #FFFriday," the group posted via Twitter.

British police also arrested two alleged members of LulzSec, and the Dutch National Police Agency arrested four Anonymous members this month. In June, Spanish authorities arrested three members and claimed to have shut down Anonymous within the country, and Turkish police detained 32 individuals with alleged links to the group.

ManTech provides cyber-security services such round-the-clock intrusion-detection monitoring, security engineering, and incident identification and response. It's providing these services to the FBI's security division as part of a $99.5 million five-year contract. The company also provides vulnerability assessment and penetration testing, cyber-threat analysis and specialized cyber-training services.

Other clients include the National Security Agency and the departments of Defense, State and Homeland Security, among others.

"The latest attack against ManTech following a string of attacks against other defense and national security contractors shows that those charged with defending our nation are also susceptible to the same attacks," Anup Ghosh, CEO of Invincea, told eWEEK. "Make no mistake -- this is a failure of the security industry more than it is a failure of ManTech, Booz Allen, Northrup Grumman, and the*National Labs," Ghosh added.

Anonymous dumped 90,000 passwords belonging to military personnel from consulting firm Booz Allen Hamilton, exposed sensitive information belonging to agricultural chemical and biotechnology company Monsanto employees and stole more than 8GB of internal data from Italy's cyber-crime police unit. Before it disbanded, LulzSec lifted and published internal documents obtained during its attack on the Arizona Department of Public Safety, breached two Websites belonging to FBI partners InfraGard Atlanta and InfraGard Connecticut, and broke into surveillance company Unveillance CEO's personal email account.

libertybrewcity
07-31-2011, 12:20 AM
Does anyone know how they do this stuff? I've read a lot of these hackers are 15 or 16. At 15 or 16 I was having trouble making an Angelfire website. I wouldn't even know where to begin with this stuff.

TheViper
07-31-2011, 12:29 AM
Does anyone know how they do this stuff? I've read a lot of these hackers are 15 or 16. At 15 or 16 I was having trouble making an Angelfire website. I wouldn't even know where to begin with this stuff.

Depends on the type of attack. Some, like a DDOS attack, can be done by anyone. Unless you are writing the bot code itself which also isn't that hard for basic coders,

More advanced attacks required people with machine level skills that come as naturally to them as sports come to athletes.

EvilEngineer
07-31-2011, 01:04 AM
very simple really...

Admins are dumb and don't change all the passwords on various bits of equipment on their network.

Switches / directors, Servers, and storage... all vendors have default passwords, and the bigger the company... the less likely it is that they changed them. (sad but true) same with the tiny shops. Best security I find is in the mid-range shops. Big enough where there are multiple levels in the IT department, not so big where they've outsourced their support to India.

Oh yeah... and the India contractors are idiots and easy to pay off.

squarepusher
07-31-2011, 01:33 AM
They also use SQL injection

Rael
07-31-2011, 06:03 AM
Payback is a bitch

ghengis86
07-31-2011, 06:52 AM
Merge?
http://www.ronpaulforums.com/showthread.php?305914-7000-law-enforcement-officers-details-leaked-by-Anonymous-Hackers&p=3431135#post3431135

asurfaholic
07-31-2011, 07:34 AM
I am sure there are plenty of people who are eager to see what sort of "sensitive" info came from Monsanto.

Lothario
07-31-2011, 08:26 AM
I think this is brilliant - as wise men have said, "when the government fears the people..."

pcosmar
07-31-2011, 08:56 AM
very simple really...

Admins are dumb and don't change all the passwords on various bits of equipment on their network.


That is a large part of it. And that was an issue that these people were originally addressing,,until attacked for it.
So called "security" firms are raking in millions from and in collusion with governments. Computer uses are milked for millions by so called "security" firms.

They were the first targets. (security firms)
Then the police and enforcement arms got involved. Now they are targets.

The "web" was built by hackers. Not Bureaucrats.

Working Poor
07-31-2011, 11:46 AM
Oh those geeks

tangent4ronpaul
07-31-2011, 12:17 PM
I am sure there are plenty of people who are eager to see what sort of "sensitive" info came from Monsanto.

Quite interested.

Wish they would break into the FED one of these days...

-t

MRK
07-31-2011, 12:54 PM
They're never going to be able to stop this. I am almost certain the ringleading hackers reside in and use or forward their hacks via proxy to servers in countries outside of the United State's legal or international agreement jurisdiction. There are many countries unwilling to cooperate with US law enforcement and identify or arrest these people. This becomes less likely to change the more the United States aggravates governments across the world.

The people who got arrested seem to be people who downloaded and used the DDoS-support software within the United States or other Western country. These are the everyday people who wanted to feel like they were helping the Wikileaks cause by using their machines in the group effort to take down PayPal. They clearly didn't realize that they didn't have the de facto immunity their overseas or proxy-forwarding comrades did.

Inflation
07-31-2011, 01:17 PM
OMG, LUL




/************************************************** *****************************
*** FUCK FBI FRIDAY III: ManTech Mayhem ***
************************************************** *****************************/

Ahoy thar,

Today is Friday and we will be following the tradition of humiliating our friends
from the FBI once again. This time we hit one of their biggest contractors for
cyber security: Mantech International Corporation.

What ManTech has to do with the FBI? Well, quite simple: In Summer 2010 the FBI
had the glorious idea to outsource their Cybersecurity to ManTech. Value of the
contract: 100 Million US-Dollar:

"The FBI is outsourcing cybersecurity to the tune of nearly $100 million to a
Washington-area managed services company. The deal shows a willingness in the
federal government to place IT services more and more in the hands of third
parties as agencies don't have enough staff on hand to do the job."

http://www.informationweek.com/news/government/security/226700486

And this is not the only Cybersecurity contract ManTech won; with a quick
internet search you will be able to find lots more. And just a few months back,
in March 2011, ManTech received another 9 Million cybersecurity contract from
the FBI:

http://www.euroinvestor.co.uk/news/story.aspx?id=11545467

Well done, good sirs. You failed epically. Because we pwned ManTech utterly and
throughly; and we did not need hundreds of millions for it. In fact, we did not
require any funds at all, we did it with Lulz.

So we begin by releasing 400MB of internal data from ManTech, this gives
some insight on how they are wasting the tax payer's money. Most of the
documents in this first batch are related to NATO who, you may recall, made some
bold claims regarding Anonymous earlier this year:

"It remains to be seen how much time Anonymous has for pursuing such paths.
The longer these attacks persist the more likely countermeasures will be
developed, implemented, the groups will be infiltrated and perpetrators
persecuted"

http://www.nato-pa.int/default.asp?SHORTCUT=2443

Indeed, it remains to be seen. It also remains to be seen how much longer the
public will accept how completely incompetent law enforcement agencies are
spending their citizens' money to fund even more incompetent federal
contractors. Incidentally, apart from the FBI, ManTech International has some other
clients:

* Defense Intelligence Agency,
* National Geospatial-Intelligence Agency
* National Reconnaissance Office
* National Security Agency
* Department of Homeland Security
* U.S. Navy, Air Force, Army, Marine Corps
* Missile Defense Agency and DARPA
* Department of Justice
* Department of State
* Environmental Protection Agency
* NASA, NATO, state and local governments

Great. It's really good to know that you guys are taking care of protecting the
Unites States from so-called cyber threats.

It should also be noted that ManTech, along with HBGary, Palantir, Endgames and
others were involved in the now-dubbed Operation MetalGear to manipulate and spy
on their citizens using persona management software for social networks:

http://wiki.echelon2.org/wiki/Mantech

We are providing these ManTech documents so the public can see for themselves
how their tax money is being spent. But don't you worry, the U.S. is a rich
country and can afford to waste money, right?

Dear Government and Law Enforcement, we are repeating this message as we have
the suspicion you still do not take us seriously: We are not scared anymore and
your threats to arrest us are meaningless. We will continue to demonstrate how
you fail at about every aspect of cybersecurity while burning hundreds of
millions of dollars that you do not even have.

The director of the U.S. Computer Emergency Response Team (CERT), Randy
Vickers, already resigned from his post, without proving an explanation. Let us
provide you with one: Mr. Vickers realized that he is on the losing side of
this war. A war that should never have been started in the first place. Not
only because the enemy was vastly underestimated and misjudged completely but
even more because it is fought against innocent citizens who simply chose to
protest against the grievance of the government. You cannot win this war and
the sooner you realize this and call for peace, the sooner we can put an end to
this and solve the problems of this world together.

Dear citizens of the U.S. and the world: We are fighting in the name of all the
oppressed and betrayed people. In your name we will continue to fire upon these
laughable battleships until they are no more. Hold on tight while the seas are
rough but we will prevail!

Anonymous
AntiSec





Download this torrent (magnet link)
Comments


Moderator randompirate at 2011-07-29 23:50 CET:
epic :D


:cool: ANTiSEC FTW :cool:

libertybrewcity
07-31-2011, 03:01 PM
have they released the documents yet?

edit: found them

MRK
07-31-2011, 03:05 PM
They also use SQL injection

http://xkcd.com/327/

libertybrewcity
07-31-2011, 03:27 PM
Wow. The only thing I gained from scanning through the documents is that ManTech is one big sausage fest.