backtop


Print 39 comment(s) - last by masamasa.. on Jun 22 at 3:53 PM


Late this afternoon the CIA homepage was DDoSed.

The hacker group LulzSec claimed responsibility. They also did a phone attack on the FBI today. It's clear they think they're untraceable.  (Source: LulzSec)

Aaron Barr, disgraced former CEO of HBGary appears to be involved in an attempt to implicate LulzSec in Bitcoin theft. It does not appear LulzSec did anything of the sort. It is unclear whether a series of posting are designed to discredit/attack LulzSec, Bitcoin, or both.  (Source: Nerd Merit Badges)
Group's attack continue to grow more flagrant, as do its detractors

At around 6 p.m. Wednesday night after a busy day of distributed denial of service (DDoS) attacks some "31337" 2005-era "/b/tards" posted a microblog to Twitter.  But these weren't just any "/b/tards"; these were the most infamous hackers of the year -- LulzSec.
 
And they didn't just post any old message.  They typed:

Tango down - cia.gov - for the lulz.

Indeed the U.S. Central Intelligence Agency's homepage was unreachable.  

I. Brazen Hacks, Phone DOS

The apparent takedown of the CIA homepage is merely the latest in the griefers' audacious run of high profile system intrusions and DDOS attacks on gaming services, government entities, and more.

The hack outraged th3j35t3r ("The Jester" in leetspeak), a pro-American "hacktivist".  He swore to LulzSec:

@lulzsec - re: your last hit. Gloves off. Expect me. My silence is not an indication of weakness, as your mouth is an indication of yours.

But if The Jester or anyone else can stop the group, they haven't yet.  LulzSec appears to think itself untraceable, given its flagrant hacks -- infiltrating the U.S. Senate servers, hacking an U.S. Federal Bureau of Investigations affiliate, and now hacking the public presence of the world's "most powerful" intelligence agency.

And it's using new tactics.  LulzSec has set up two phone lines -- 614-LULZSEC or 732-993-7703 -- and is taking thousands of calls a day.  Some it actually answers, asking guests questions for prizes or regaling them in a faux French accents.  But it's also redirect the calls to phone denial of service (DOS) attacks -- something rarely seen today.

Today it direct this phone wrath at the online MMORPG World of Warcraft's customer support, the FBI's Detroit headquarters, and "a certain hosting company" (many suspect it was GoDaddy).  Last, but not least it direct attacks at disgraced security firm HBGary who was the subject of much lashing at the hands of Anonymous earlier this year.

II. Framing Attempt?

LulzSec has been the subject of what appears to be wildly bizarre framing attempt involved the increasingly popular peer-to-peer digital currency Bitcoins.  Former HBGary CEO, Aaron Barr, posted to Twitter:

Lulzsec manages to pilfer nearly a half million dollars in bitcoins while running their tele-DDOS-athon today. tinyurl.com/3mfngql

Only the link in question didn't receive the funds today -- it received them on Monday (6/13).  And while it did send a donation to LulzSec's public donations account:
176LRX4WRWD5LWDMbhr94ptb2MW9varCZP

It only sent the typical token gesture: 0.31337 ("elite" in leetspeak) -- worth about $7 USD.

So where did this bizarre rumor begin?  It appears to trace back to a Pastebin:
http://pastebin.com/88nGp508" rel="nofollow

Which was a repost of the Bethesda press release, with one important alteration -- the account was altered to make it look like:
1KPTdMb6p7H3YCwsyFqrEmKGmsHqe1Q3jg

...was a LulzSec donations account.

Clearly that account appears to be involved with some mass fraud or is a clever social engineering project to offer the appearance of a mass fraud.  Either way, the attempt to tie LulzSec to it seems clearly flawed and like a clear framing.  No official LulzSec press release has ever carried that number.

It's unclear whether Mr. Barr is merely a uninformed observer, or is more deeply involved with this possible framing attempt.  But it's clear that his wild claims appear unfounded.

It's also possible that the postings are some sort of attempt to discredit Bitcoin itself.  In recent weeks several news agencies have been spreading posts with dubious claims, attempting to discredit the digital crypto-currency.

For example The Guardian's Ruth Whippman writes:

An odd alliance of libertarians, geeks, businesspeople and drug kingpins hail Bitcoin as the future of the internet – global, private and immune from national economic crises and the whims of reckless bankers. Its critics in the political sphere fear that it could give rise to an online Wild West of gambling, prostitution and global bazaars for contraband.

Previously dismissed as a nerdy curiosity, the untaxable Bitcoin may soon be due for a crackdown.

And Gawker adds:

Not all Bitcoin enthusiasts embrace Silk Road. Some think the association with drugs will tarnish the young technology, or might draw the attention of federal authorities. "The real story with Silk Road is the quantity of people anxious to escape a centralized currency and trade," a longtime bitcoin user named Maiya told us in a chat. "Some of us view Bitcoin as a real currency, not drug barter tokens."

Silk Road and Bitcoins could herald a black market eCommerce revolution. But anonymity cuts both ways. How long until a DEA agent sets up a fake Silk Road account and starts sending SWAT teams instead of LSD to the addresses she gets? As Silk Road inevitably spills out of the bitcoin bubble, its drug-swapping utopians will meet a harsh reality no anonymizing network can blur.

Seemingly, some people are suggesting that Bitcoin is more villainous than the far more anonymous form of currency -- cash.  The source of this misinformation/smear campaign is unknown, though, news agencies seem happy to spread it gleefully.

III. Insecure World

Much has been made to explain how LulzSec is doing what it does.  But the fact of the matter is that the group isn't using new tactics, new tools, or new exploits.  It's just getting more attention because it's good at advertising what it does and its affecting lots of people.

But the fact of the matter is that many corporate and government systems today are incredibly insecure and the vast majority of users are utterly incompetent when it comes to security [1][2][3] -- even some system administrators [1].

Combine these factors and you get an infinitely abusable system.

The abuses have occurred in years past.  They may be happening at a faster rate this year.  But the system has been insecure for years.  And it will likely still be insecure next year, as well.


Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Nutbag? A big may be!
By garagetinkerer on 6/16/2011 7:37:48 PM , Rating: 2
UK is coming up with a law to disconnect people off internet. There was talk about Oz doing the same. Well, US is so far more liberal, but think about it. Companies have formed unholy unions such as RIAA/ MPAA and well created laws which resulted in a single mother paying $400,000 per song as a penalty. It really doesn't seem that far fetched to me to think that there's going to be a new legislation coming in sometime soon... People who are calling proponents of such theories hacks, and other such remember DMCA came and is here still. What did you get out of it? Threats to be sued, or, you got sued if you were a single mother, and oh, ley us not forget DRM which is infecting every bit of technology slowly. People say Vista was bad, but it was so as MS was forced to implement DRM. Remember HDCP, when you're brand new hardware was suddenly not good enough to play HD content.

On the other hand it may be just some guys 'doing this for lulz' as they claim...




"We can't expect users to use common sense. That would eliminate the need for all sorts of legislation, committees, oversight and lawyers." -- Christopher Jennings














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki