Author Topic: Anonymous ป่วนอีกรอบ! รุกโจมตีเว็บฯ specialforces.com ปิดท้ายปลายปี  (Read 2039 times)

0 Members and 1 Guest are viewing this topic.

Offline Nick

  • Administrator
  • Platinum Member
  • *
  • Posts: 46028
  • Karma: +1000/-0
  • Gender: Male
  • NickCS
    • http://www.facebook.com/nickcomputerservices
    • http://www.twitter.com/nickcomputer
    • Computer Chiangmai


หลังจากที่สร้างความปั่นป่วนมาตลอดปี ตั้งแต่การแฮ็คเว็บไซต์โซนี่จนต้องปิดการใช้งานเกือบเดือน, โจมตีเว็บไซต์หน่วยงานของประเทศอิหร่าน, เข้าแฮ็คบริษัทที่ปรึกษาของกองทัพสหรัฐฯ รวมถึงการเข้าโจมตีเซิฟเวอร์ของ Stratfor และเผยรายงานที่ได้ทำการบริจาคเงินการกุศลจากการขโมยเครดิตการ์ดไปเมื่อวานก่อน ล่าสุด กลุ่มแฮ็คเกอร์ชื่อกระฉ่อนโลกได้เดินหน้ารุกฆาตโจมตียังเว็บไซต์ specialforces.com ที่ซึ่งเป็นส่วนหนึ่งของพิธีเฉลิมฉลอง LulzXmas ก่อนสิ้นปี 2011

โดยกลุ่มแฮ็คเกอร์ดังกล่าวได้ทำการเก็บรวบรวมข้อมูลบัตรเครดิต และข้อมูลส่วนตัว รวมถึงชื่อและที่อยู่ของผู้ที่ทำการสั่งสินค้าจากเว็บไซต์ Pastebin เมื่อวานนี้ ซึ่งถือเป็นการโจมตีที่มีจุดประสงค์เพื่อโต้ตอบฐานลูกค้าในเว็บไซต์ที่ส่วนใหญ่เป็นหน่วยงานทางการทหาร และบุคลากรทางกฏหมาย ที่ซึ่งอ้างว่าพวกเขามีความสุขกับการซื้อยุทโธปกรณ์เพื่อใช้กับประชาชน นอกจากนี้ Anonymous ยังได้ระบุเพิ่มเติมอีกว่า พวกเขาได้ทำการครอบครองรหัสลับกว่า 14,000 ชุดและเครดิตการ์ดกว่า 8,000 ใบจากเว็บไซต์ดังกล่าวมาเป็นเวลาหลายเดือนแล้ว แต่ได้เกิดความไม่พอใจต่ออดีตเพื่อนสนิทจึงได้ทำการปล่อยข้อมูลให้รั่วไหลก่อนเวลาที่ตั้งใจไว้

Source : TechSpot

ที่มา: pantip.com


Offline Nick

  • Administrator
  • Platinum Member
  • *
  • Posts: 46028
  • Karma: +1000/-0
  • Gender: Male
  • NickCS
    • http://www.facebook.com/nickcomputerservices
    • http://www.twitter.com/nickcomputer
    • Computer Chiangmai
Quote
   _____                             
  /     \   __________________ ___.__.
 /  \ /  \_/ __ \_  __ \_  __ <   |  |
/    Y    \  ___/|  | \/|  | \/\___  |
\____|__  /\___  |__|   |__|   / ____|
        \/     \/              \/     

.____          .__         ____  ___                     
|    |    __ __|  | _______\   \/  / _____ _____    ______
|    |   |  |  |  | \___   /\     / /     \\__  \  /  ___/
|    |___|  |  |  |__/    / /     \|  Y Y  \/ __ \_\___ \
|_______ |____/|____/_____ /___/\  |__|_|  (____  /____  >
        \/                \/     \_/     \/     \/     \/


                                             #AntiSec
                                            
Greetings fellow global pirates,

The halls are decked with lulz, AnonSanta’s battle sleigh is re-filled, and lulz lizards worldwide are awaiting his arrival. Wait no longer, good denizens of the Internet, it’s time for another round of the LulzXmas festivities.

But first, tell us, have you enjoyed the complete obliteration of Stratfor live on IRC and Twitter? We have. We also laughed heartily whilst these so-called protectors of private property scrambled desperately to recover the sensitive information of all the customers who they wronged by failing to use proper security precautions. Stratfor’s Terms of Service stated, “Security: The personally identifiable information we collect about you is stored in limited access servers. We will maintain safeguards to protect the security of these servers and your personally identifiable information.” Yet Stratfor lazily stored credit card information and corresponding data unencrypted. Is the irony palpable yet?

Continuing the week long celebration of wreaking utter havoc on global financial systems, militaries, and governments, we are announcing our next target: the online piggie supply store SpecialForces.com. Their customer base is comprised primarily of military and law enforcement affiliated individuals, who have for too long enjoyed purchasing tactical combat equipment from their slick and “professional” looking website. What’s that, officer? You get a kick out of pepper-spraying peaceful protesters in public parks? You like to recreationally taser kids? You have a fetish for putting people in plastic zip ties?

We had to contain our laughter when we saw these two "hacker proof" logos plastered on the SpecialForces.com website: "Scanned by GoDaddy.com: secured website" and "McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses, and online scams.”  Despite the almighty powers of GoDaddy and McAfee's logos and some reassuring words, SpecialForces.com was just no match for our hella wicked black hat voodoo. We have just one question before we continue: You mad, officer?

To be fair, at least SpecialForces.com DID store their customers’ credit card information using blowfish encryption (unlike the global intelligence and security industry "professionals" at Stratfor, who apparently remain confused as to whether their customers’ information was even encrypted or not). Nevertheless, our voodoo prevailed and we were quickly able to break back into the military supplier’s server and steal their encryption keys. We then wrote a few simple functions to recover the cleartext passwords, credit card numbers, and expiration dates to all their customers’ cards. That’s how we roll.

In reality, for the past few months, we have been in possession of approximately 14,000 passwords and 8000 credit cards from SpecialForces.com. Unfortunately a former comrade leaked the password list early, and the full story on this owning will be told in our upcoming zine. Until then, feast upon one hell of a juicy text file.

We’ll continue to have ourselves a merry LulzXmas at the expense of capitalist pigs, corrupt public officials and all those third parties who cater to the continued oligarchic elite worldwide. We are your secretaries, your janitors, your babysitters, your IT guys, your bus drivers, your maids, your hard-working, driven and determined fellow humans. We could be sitting next to you in a coffee shop, scanning your goods at a department store or even fixing your busted-ass computer. We are here to stay, and by now, you had better damn well expect us, cause the time for simple “lulz” is long past.

Oh, and by the way: Did Bradley Manning get his fancy holiday meal yet? Might want to hurry up before we hit even more targets.

http://ibhg35kgdvnb7jvw.onion//lulzxmas/specialforces_full.txt.gz  <- orders/addresses/ccs
http://ibhg35kgdvnb7jvw.onion//lulzxmas/specialforces_passwords.txt  <- just the passwords
http://wikisend.com/download/287544/specialforces.tar.gz    <- both combined

# grep -R -H -i '.mil' specialforces_passwords.txt | wc
    1274    8072  127545
# grep -R -H -i '.gov' specialforces_passwords.txt | wc
     159    1064   15720

# ls -al /home/
total 64
drwxr-xr-x 15 root              root              4096 Nov 19  2009 .
drwxr-xr-x 24 root              root              4096 Mar 30 04:15 ..
drwxr-xr-x 10 ambientgraphic    ambientgraphic    4096 Aug 11 10:37 ambientgraphic
drwxr-xr-x  4 ambientscan       ambientscan       4096 Feb 27  2009 ambientscan
drwxrwxrwx 30 client            client            8192 Aug 12 03:46 client
drwxr-xr-x 11 cliffdigital      cliffdigital      4096 Aug 11 14:11 cliffdigital
drwxr-xr-x  8 mywallbuddy       mywallbuddy       4096 Jul 28 14:49 mywallbuddy
drwx------  2 nathan            nathan            4096 Sep 12  2008 nathan
drwxrwxrwx  3 nobody            nobody            4096 Oct  3  2008 nobody
drwxr-xr-x  7 nosurrender       nosurrender       4096 Feb 23  2010 nosurrender
drwxr-xr-x  4 ridgewoodapts     ridgewoodapts     4096 Apr  9  2008 ridgewoodapts
drwxr-xr-x  4 scan              scan              4096 Oct 13  2008 scan
dr-xr-xr-x 23 specialforces     specialforces     4096 Aug 11 18:40 specialforces
drwxr-xr-x  4 specialforcesgear specialforcesgear 4096 Feb 26  2008 specialforcesgear
lrwxrwxrwx  1 root              root                13 Nov 19  2009 upload -> /home/client/
drwx------  3 upload            upload            4096 Nov 19  2009 upload-bak

# cat /etc/shadow
root:$1$lr0e4BnN$q2GEqgZqekcfmlQ/BDdEz0:15196:0:99999:7:::
bin:*:13795:0:99999:7:::
daemon:*:13795:0:99999:7:::
adm:*:13795:0:99999:7:::
lp:*:13795:0:99999:7:::
sync:*:13795:0:99999:7:::
shutdown:*:13795:0:99999:7:::
halt:*:13795:0:99999:7:::
mail:*:13795:0:99999:7:::
news:*:13795:0:99999:7:::
uucp:*:13795:0:99999:7:::
operator:*:13795:0:99999:7:::
games:*:13795:0:99999:7:::
gopher:*:13795:0:99999:7:::
ftp:*:13795:0:99999:7:::
nobody:*:13795:0:99999:7:::
rpm:!!:13795:0:99999:7:::
dbus:!!:13795:0:99999:7:::
mailnull:!!:13795:0:99999:7:::
smmsp:!!:13795:0:99999:7:::
nscd:!!:13795:0:99999:7:::
vcsa:!!:13795:0:99999:7:::
haldaemon:!!:13795:0:99999:7:::
rpc:!!:13795:0:99999:7:::
sshd:!!:13795:0:99999:7:::
rpcuser:!!:13795:0:99999:7:::
nfsnobody:!!:13795:0:99999:7:::
pcap:!!:13795:0:99999:7:::
named:!!:13934::::::
xfs:!!:13934::::::
apache:!!:13934::::::
distcache:!!:13934::::::
mysql:!!:13934::::::
ntp:!!:13934::::::
avahi:!!:13934::::::
postfix:!!:13934::::::
cyrus:!!:13934::::::
tomcat:!!:13934::::::
postgres:!!:13934::::::
mailman:!!:13934::::::
webalizer:!!:13934::::::
specialforces:$1$0YQ2PeIV$daR4duNT9tbGveA.VYw5m0:15196:0:99999:7:::
specialforcesgear:Muo8rV/8uFca2:13935:0:99999:7:::
ridgewoodapts:DjeqcreKU9936:13979:0:99999:7:::
nosurrender:NGSf7ub12KOB6:13979:0:99999:7:::
ambientscan:$1$duark8Ga$0PCJPEs/kloHC6P1H1mf./:13979:0:99999:7:::
client:$1$uD8tW5tn$Q1O/NltCmklzJ2DA/6YMc.:13979:0:99999:7:::
ambientgraphic:$1$F8SkFSGx$EXGhDZD/NGSq/FVtbdidF/:14016:0:99999:7:::
nathan:/kTD9C.fGp7rY:14134:0:99999:7:::
scan:UhR6mxTsk12us:14165:0:99999:7:::
mywallbuddy:9RSOz494FbTUE:14470:0:99999:7:::
cliffdigital:$1$P0JwnyRO$Lp8rBE8e1vQ.RShGpdmYu0:15196:0:99999:7:::
upload:$1$Sp.4fB8B$8RbkjNeKXR8p4CzjeUY1q/:14568:0:99999:7:::
sphinx:!!:14914::::::

credit: http://pastebin.com/vuMypejL

 
Share this topic...
In a forum
(BBCode)
In a site/blog
(HTML)


Related Topics

  Subject / Started by Replies Last post
0 Replies
1469 Views
Last post April 07, 2011, 02:53:12 PM
by Nick
0 Replies
1822 Views
Last post May 11, 2011, 03:24:54 PM
by Nick
0 Replies
1507 Views
Last post June 06, 2011, 01:42:15 PM
by Nick
0 Replies
1806 Views
Last post June 21, 2011, 01:59:13 PM
by Nick
0 Replies
1471 Views
Last post July 20, 2011, 01:35:46 PM
by Nick
0 Replies
1995 Views
Last post August 11, 2011, 02:57:00 PM
by Nick
0 Replies
1506 Views
Last post August 29, 2011, 12:16:47 PM
by Nick
0 Replies
1643 Views
Last post September 06, 2011, 12:49:03 PM
by Nick
Anonymous

Started by Nick Movies

0 Replies
3027 Views
Last post November 03, 2011, 08:48:56 AM
by Nick
0 Replies
1595 Views
Last post February 05, 2013, 12:30:37 PM
by Nick