The United Nations finds itself resecuring its network Wednesday following a hack that resulted in the login details of the employees of several divisions being posted to the Internet. Calling itself TeaMp0isoN, the group calls the UN "a Senate for global corruption" and "sits to facilitate the introduction of a New World Order and a One World Government".
TeaMp0isoN hacked accounts belonging to employees of United Nations Development Programme (UNDP), Organisation for Economic Co-operation and Development (OECD), UNICEF, World Health Organization (WHO) among others. Some of the fault for the hack may lie in the users themselves: TeaMp0isoN notes that several of the user IDs contained no password at all.
Sony's PlayStation Network is once again the target of hackers as Sony disclosed late Tuesday that it had disabled some 93,000 PSN and Sony Online Entertainment accounts. According to the company these accounts had been "tested" by hackers, although a majority of the login attempts failed.
The data was said to be obtained from "one or more compromised lists from other companies, sites or other sources," although chief information security officer Phillip Reitinger said it was likely that the data did not come from Sony itself.
The hacker who breached the DigiNotar certificate authority has come out, or at least claimed to. He appears to be the same hacker who breached Comodo, another CA, several months ago. (Hat tip to F-Secure.) "COMODOHACKER" seems to have a problem with the Dutch government.
He claims to have gotten past numerous sophisticated protections in DigiNotar's systems, the details of which he will divulge later, and that he retains inside access to four other "high-profile" CAs and can still issue rogue certificates from them. He also claims that the password for the PRODUCTION\Administrator account (the domain administrator of certificate network) is "Pr0d@dm1n".
Hackers have again disclosed the personal details of police officers, this time in response to BART's decision to cut off cell phone and Wi-Fi service in its metro stations and tunnels to quell a planned anti-police protest. The decision by hacktivist group Anonymous calls its motives again into question, and could put these police officers at risk.
Data disclosed includes names, home addresses, email addresses and passwords to the site of the BART police union; 102 officers in total had their information disclosed, and the hack has taken the organization's website offline.
A British judge has released Jake Davis -- more commonly known as "Topiary" -- on bail Monday, however he has been banned from using the Internet as a condition of his release. Davis was apprehended last Wednesday by the Metropolitan Police as part of a larger effort against LulzSec and Anonymous.
Topiary originally served as the mouthpiece for the LulzSec hacktivist group, but following its disbandment continued his work for Anonymous. He famously taunted police following the arrests of more than a dozen suspected members of the hacktivist group by claiming "you cannot arrest an idea."
As the law enforcement crackdown against hacktivist groups Anonymous and LulzSec continued, British law enforcement on Wednesday announced the apprehension of "Topiary," a 19-year-old man from the Shetland Islands north of Scotland who has served as the spokesperson for the group.
Police were said to still be searching the residence where the individual was apprehended, as well as talking to a 17-year-old in the municipality of Lincolnshire in east central England in connection with the arrested. The person had not been charged or arrested.
Hackers with the group Anonymous claimed Thursday that they had hacked into the servers of the North Atlantic Treaty Organization (NATO). However, it wouldn't release much of the gigabyte of information it stole because doing so would be "irresponsible," seemingly indicating some of the data may be sensitive to security interests.
"Yes, #NATO was breached. And we have lots of restricted material," the group tweeted over its @AnonymousIRC account. "In the next days, wait for interesting data :)"
Anonymous and LulzSec issued a joint statement Wednesday, firing back at FBI director Steve Chabinsky over his comments to NPR that Tuesday's arrests of 14 hackers associated with the groups was meant to send a message that "chaos on the Internet is unacceptable." The response strikes a markedly political tone.
Posted to Pastebin, the statement accuses governments of lying to their citizens and "dismantling their freedom piece by piece," governments conspiring with corporations and wasting taxpayer money, and lobbyists having too much control over day-to-day business "and corrupt them enough so the status quo will never change."
At least a dozen individuals were arrested early Tuesday as the FBI expanded its investigation into the hacking group Anonymous. In conjunction with these arrests, raids were carried out in three homes -- two in Long Island, N.Y. and the other in Brooklyn, N.Y. -- as well as locations in California.
The FBI was not commenting on the raids directly but sources told Fox News that the raids were related to the federal government's widening probe of the activities of Anonymous. Arrests were made in California, Florida, and New Jersey. Charges against the detained individuals were not specified.
Responding to Google's ban of +YourAnonNews on new social network Google+, "hacktivist" group Anonymous and Presstorm Media began discussing the possibility of a new social network called AnonPlus (or Anon+).
"This project is not overnight and will take many of those out there who simply want a better internet," the site's landing page says. "We will not be stopped by those looking to troll or those willing to stop the spreading of the truth. One thing i would like to point out that this project is for ALL people not just anonymous, this idea is a presstorm idea and only takes the name anon because of the Anonymity of the social network."
Black hat security group Anonymous has exposed 90,000 military email addresses stored on servers from consulting firm and U.S. government contractor Booz Allen Hamilton. The hacker group said the breach was done to expose the corruption of government and related corporate entities.
Booz Allen Hamilton deals with all branches of the armed services as well as the defense and intelligence communities of the U.S. Government. It claims to provide, among other things, "strategy and technology solutions that help deter 21st century threats and meet complex mission requirements."
The alarming tweets that went out a few hours ago are false, according to Fox News. They claimed that President Barack Obama had been shot while campaigning, which itself is red flag something wasn't right. What president would campaign on America's Independence Day nearly 18 months before the election?
"FoxNews.com's Twitter feed for political news, FoxNewspolitics, was hacked early Monday morning", according to a report by Fox News. "Hackers sent out several malicious and false tweets claiming that President Obama had been assassinated. Those reports are incorrect, of course, and the president is spending the July 4 holiday with his family. The hacking is being investigated, and FoxNews.com regrets any distress the false tweets may have created".
Now operating under the #AntiSec banner, the LulzSec hackers are still busy causing trouble. The latest data dump posted to torrent sites goes after several governments worldwide as well as both Viacom and Universal Music Group.
"While the LulzBoat is still sailing with us (albeit not with the LulzSec flag), the objective of #AntiSec is different," the description of the torrent reads. "#AntiSec is more than Lulz and more than even Anonymous: It is our true belief that this movement has the capability to change the world. And should that fail, we will at least rock the world."
LulzSec may have faded off into the hacking annals of history, but Anonymous isn't resting. The group on Monday released a file of what appears to be a cyberterrorism training manual. It is not clear how the group obtained the document.
"Little teaser while we work on the actual release: Ever interested in anti-cyberterrorism training?" a tweet from a Twitter account associated with the group reads. The manual appears to come from FEMA's Counter Terrorism Defense Initiative and is dated from 2009.
In what is an embarrassing oversight for Citigroup, attackers that got away with information on over 200,000 credit card holders only needed to make a change in the string of the URL itself. This means that as long as you had the account number, you would be able to access all personal data associated with that particular account.
Citigroup should consider itself lucky that more customers did not have their accounts compromised. How the hackers got the credit card numbers themselves is not clear yet, but the vulnerability allowed them to jump among accounts automatically by just being logged in and running a script.