Just as with MPD, the apparent Atlanta website attack led to a viral buzz on social media, as accounts that appear to be affiliated with Anonymous echoed the claims. The challenge on attribution, though, is the same as in Minneapolis. There is no organized Anonymous hacking group—it is a loose affiliation of like-minded individuals with a wide range of affiliated websites and social media accounts.
Attributing any such action to Anonymous is impossible, given the nature of its loosely affiliated organization. But, because self-styled members can essentially join the cause simply by saying they are doing so, it makes any action claimed by an Anonymous affiliate essentially attributed. The fact that the Atlanta PD website has limited access suggests that any attack may have come from outside the U.S.
Other things to check out:
Environmentalists Targeted Exxon Mobil. Then Hackers Targeted Them. - The New York Times
Prosecutors are investigating the hackers behind the operation and who hired them, the people said, speaking on the condition of anonymity so they could discuss an ongoing investigation. Exxon Mobil has not been accused of any wrongdoing.
Citizen Lab has provided its information to federal prosecutors in Manhattan to assist them in their criminal investigation. A spokesman for the United States Attorney's Office in Manhattan declined to comment.
"In our investigation, we determined that hiring hackers may be a relatively common practice for many private investigators," said John Scott-Railton, the report's lead author. "The sheer scale of it is remarkable to us."
China-backed Hackers Target Biden Campaign in Early Sign of 2020 Election Interference | Voice of
WASHINGTON - Google announced earlier this month that Chinese-backed hackers were observed targeting former Vice President Joe Biden's campaign staff.
The internet giant said that hackers did not appear to compromise the campaign's security, but the surveillance was a reminder of Russia's interference in the 2016 election.
* * *
Shane Huntley, director of Google's Threat Analysis Group twittered on June 4 that the company has discovered a "China APT group targeting Biden campaign staff with phishing," but there was "no sign of compromise."
Subscribe to read | Financial Times
In case you are keeping track:
Hackers for Hire – Reason.com
Our interview this week is with Chris Bing , a cybersecurity reporter with Reuters , and John Scott-Railton , Senior Researcher at Citizen Lab and PhD student at UCLA. John coauthored Citizen Lab's report last week on BellTroX and Indian hackers for hire, and Chris reported for Reuters on the same organization's activities – and criminal exposure – in the United States.
The most remarkable aspect of the story is how thoroughly normalized the hacking of legal and lobbying opponents seems to have become, at least in parts of the US legal and investigative ecosystem. I suggest that instead of a long extradition battle, the US should give the head of BellTroX a ticket to the US and a guaranteed income for the next few years as a witness against his customers.
How Hackers Use An Ordinary Light Bulb To Spy On Conversations 80 Feet Away
As always, there are exceptions to the exploit rule. The hackers need a clean line of sight between their electro-optical sensor-equipped telescope and the hanging light bulb concerned. So, if the curtains or blinds are closed on a window, or the light bulb sits behind a lampshade of some sort, then this eavesdropping method will fail. Ditto if the light bulb doesn't meet the hacking requirements in terms of either thickness of glass or output of light.
All that aside, this remains a remarkably bright method of spying on private conversations from afar. The researchers were able to accurately monitor both speech and music from a distance of 80 feet (25 meters) away. Using a bigger telescope and a 24/32 bit analog-to-digital converter, the range could be amplified, the researchers said.
Hacked: Aussie websites for sale on dark web
ASX-listed companies, financial services firms, law firms, an insurance company and an adult entertainment store are among hundreds of Australian websites for sale on the dark web.
The websites are part of a list of 43,000 hacked servers available for sale on MagBo, the shadowy online marketplace where cyber criminals sell access to websites for as little as $US1 ($1.46) and as much as $US10,000.
"It's an important message to get out to Australian businesses," Curve Securities chief executive Andrew Murray said.
Hackers spotting exposed Elasticsearch servers faster than search engines
Hackers have been finding unprotected Elasticsearch servers exposed on the internet quicker than search engines can index them, new research from Comparitech has found.
A honey pot experiment lured more than 150 unauthorised requests to a fake database with the first coming less than 12 hours from being exposed.
Javvad Malik, security awareness advocate at KnowBe4 said that exposed servers are a big concern, and are responsible for exposing a large number of records on an almost daily basis around the world.
Happening on Twitter
¿Anonymous, hackers o hacktivistas? En #TheMakers hicimos un repaso por la historia para aprender de hacktivismo. 🎧… https://t.co/YkSIbKcn0G platzi (from USA, España & Latinoamerica) Tue Jun 16 01:15:01 +0000 2020
Environmentalists leading effort to have ExxonMobil prosecuted for concealing climate change risk, a potential exis… https://t.co/R1QIyP93L9 lhfang (from San Francisco) Tue Jun 09 16:44:58 +0000 2020
https://t.co/Ljx7husYKm Forbes (from New York, NY) Fri Jun 12 09:08:15 +0000 2020
No comments:
Post a Comment