• What It is

    Here You can get some info .

  • What we do

    We will provide some nice information regarding Hacking

  • About Us

    A person like uuuu... :)


  • Israeli Domain of MSN, Bing, Skype, Microsoft Store, BBC, CNN & Many More High Profile Israeli Sites Hacked

    More hackers taking part in the Israeli rampage dubbed Operation Israel. As soon as the story of bombing and air strike in Gaza get spotted on the social networks, we have seen immediate protest coming from almost every part of the world. In case of digital bombing, then it was first Anonymous who called Operation Israel, then hackers from different part of the world joined and contributed in this combined protest. So far we have seen along with Anon, Pakistani hacker Hitcher from Muslim Liberation Army, Indian hacker Godzilla, & Kosovo Hackers Security have played vital role in this rampage. But now the scenario is going from bad to worse for Israeli cyber space, as a group of Pakistani hackers hit a large number of high profile Israeli domain. Those big giants who have fallen victim in this round of cyber attack from Pakistan are MSN, Bing, Live, Skype, Microsoft Store, BBC, CNN, Coca-Colla, XBOX, Windows, Intel, Philips, Israeli Parliament, Citi Bank and few more. According to sources more than 44 million hacking attempts have been made on Israeli government web sites since Wednesday. Attempts on defense related sites have been the highest, while 10 million attempts have been made on the site of Israel's president, 7 million on the Foreign Ministry and 3 million on the site of the prime minister.

    Complete List:-
    pm.parliament.co.il        

    Both the screen shot of the deface page and Zone-H mirror is saying that four hackers from Pakistan named 1337, H4x0rL1f3, ZombiE_KsA & Invectus were behind this massive cyber attack. Though a post on popular hackers forum named Sec4ever we came to know that ZombiE_KsA denied his relation with this hack. 
    [......]


    USA Accused For Planting "Flame" Malware to Hack France President's Network

    A well known French newspaper named "L'Express" has accused that United States is using dangerous cyber weapon "Flame" to break into the computer networks inside France’s presidential palace also known as the Elysee. In his report L'Express has published details of what it claims was a sophisticated state-sponsored hack into the offices of the French presidency earlier this year with the intention of stealing data. According to the newspaper, the malware attack took place in May 2012, shortly before the second round of presidential elections in France, but has been kept secret until now. The newspaper alleges that the attackers reportedly found their targets on Facebook, identifying people working inside the presidential palace and connecting with them on the social network. The social engineering laid the groundwork for the next phase of the attack; the victims were then sent links to a fake Elysee intranet page where their login credentials were stolen. Workers at the Élysée Palace are said to have been befriended on Facebook by hackers, who then sent their victims a link to what purported to be a login page for the Élysée intranet site. In this way, it's claimed, login credentials were stolen. It is alleged that malware was then installed on the network, infecting computers belonging to senior political advisors, including Xavier Musca, Secretary-General of Nicolas Sarkozy's office. The United States Embassy in Paris has denied any involvement in hacking its ally. “We categorically refute allegations of unidentified sources,” Mitchell Moss, Embassy spokesman, told l’Express. “France is one of our best allies. Our cooperation is remarkable in the areas of intelligence, law enforcement and cyber defense. It has never been so good and remains essential to achieve our common fight against extremist threat.” Though the secretary  of Department of Homeland Security Janet Napolitano did not deny the U.S. was involved. She told l’Express: “We have no greater partner than France, we have no greater ally than France. We cooperate in many security-related areas. I am here to further reinforce those ties and create new ones.”

    While talking about Flame, we would like to remind you that after the episode of 'Duqu'; In the middle of this year The Iranian Computer Emergency Response Team (MAHER) claims to have discovered a new targeted Stuxnet attacking the country's internal system. This newly found Stuxnet have been dubbed Flame (also known as Flamer or Skywiper)Flame the next generation cyber weapon which is also known as 'The Super Spy' has already fascinated the cyber-security industry with its sophistication and versatility as a Swiss-Army knife of cyber-spying. Later it was spotted in the wild when software giant Microsoft confirmed that its Windows Server Update Services (WSUS), Windows Update (WU) has been infected by Flame malware. Also in many fields, the name of 'Flame' was on the high node. 


    -Source (NS & threatpost)
    [......]


    Linux Mint 14 "Nadia" Released With MATE, Cinnamon &MDM

    Its almost six months have past when Linux Mint 13 “Maya” was released, but now its time to upgrade it as the developers at Linux Mint has officially released and declared the availability of Linux Mint 14 code named "Nadia". Linux Mint 14 is based on Ubuntu 12.10, but offers a more traditional choice of desktop environments instead of Ubuntu's often controversial Unity interface. The two flavors available offer two different desktops, one with the project's own custom-built Cinnamon (a GNOME 2-like user interface based on GNOME 3) and the MATE fork of GNOME 2. According to the blog post by Linux Mint project founder Clement "Clem" Lefebvre -For the first time since Linux Mint 11, the development team was able to capitalize on upstream technology which works and fits its goals. After 6 months of incremental development, Linux Mint 14 features an impressive list of improvements, increased stability and a refined desktop experience. 

    [......]


    Cyber Crime Cost $8 Billion Loss For India in Last 12 Months While Affecting 42 Million People 

    In its annual cybercrime report, security firm Norton has estimated that India has lost more than $8 Billion; in Indian currency around 42,000 Crore in last twelve months. This big consumer cyber espionage has effected more than 42 million of people around the country. In terms of cost, this is a full 18 per cent increase. Against this, the global loss has been pegged at $110 billion. The study further notes that as many as 66 per cent of online adults in India have been a victim of cyber crime. During the past 12 months, as many as 56 per cent of online adults here have experienced cyber crime, over 1,15,000 victims per day, 80 victims per minute and over one every second.
    According to the report, the average direct financial cost per victim is $192, which is up 18 per cent over2011 when it was $163. One key finding this year is that both the cost per victim as well as social and mobile incidents are on the rise due to cybercrime. The study is based on the findings of self-reported experiences of over 13,000 adults across 24 countries, Norton by Symantec said in a statement. 
    Globally, every second, 18 adults fall victim to cybercrime, resulting in over 1.5 million cybercrime victims each day. With losses totaling an average of $197 per victim across the world in direct financial costs, in the past 12 months, an estimated 556 million experienced cybercrime, representing 46 per cent of online adults, says the report. Last year, the figure was 45 per cent. "Cybercriminals are changing their tactics to target fast growing mobile platforms and social networks where consumers are less aware of security risks," says Norton by Symantec Asia director and internet safety advocate Effendy Ibrahim said. 
    If we compare with other countries who are very much advance in IT then a very nasty truth will come appear, and that is being sound in IT still India is very much week and also careless of cyber security. This carelessness of Indian Govt has already cost maximum damage in terms of finance, defense, privacy and so on. India has already faced big damage in cyber space (both financially & reputation) from native countries like China, Pakistan, where sensitive data of Govt, defense, nuclear & space research has allegedly been stolen by cyber criminals. So far India was dam careless but couple of weeks ago things changed dramatically. And now the Indian Govt is working on a robust cyber security structure, Prime Minister of India Dr. Manmohan Singh himself confirmed that from now on wards India will pay as much attention as possible to make the cyber fence digitally safe and secured. 



    -Source (Norton & msn)

    [......]


    Reliance Net Connect , a venture of Reliance Communications , one of the leading CDMA & GSM Service providers in India website was Defaced by Hackers two days back. No reason mentioned by hackers but on deface page, Hackers wrote "Hacked by Dr-FreaK and Napsters Cr3w".

    Defaced site link - http://reliancenetconnect.co.in , but at the time of writing this post, site has been successfully  restored by company. But you can see mirror of hack on Zone-H.
    In june 2012 due to Internet Censorship in India Reliance Communications blocks various sites, against to which Anonymous Hackers hacked their servers Reliance Communications in such a way that users trying to access Facebook, Twitter, Google, Gmail and Yahoo were greeted messages.

    Also in July 2012 Reliance Communications was successfully breached by another hacker with just information disclosure bug.
    [......]

    27 Years Old Hacker (Timothy Noirjean) From WashingtonFined & Jailed For Hacking Several Facebook Accounts & Pages



    Washington County district court judge sentenced Woodbury resident Timothy Noirjean to 150 days in jailfive years on probation and more than $15,000 in fines.
    27 year old Noirjean pleaded guilty to 13 counts of electronic identity theft. He was accused of posing as a Facebook friend to an Oakdale woman and hacking her information – and information belonging to her friends. Washington County Attorney Pete Orput said his prosecutors never budged from his assertion in 2011 that the case would not be plea-bargained. “I’m not willing to tell one or several (of the victims) that we dismissed one or several of the counts in return for guilty pleas for the others,” Orput said.
    He said he was committed to getting convictions on the 13 counts – all felonies – due to the harm caused by Noirjean’s actions. After hacking the women’s information, Noirjean posted photos of several of the women on an adult website.
    Orput said that while his office could prosecute Noirjean, it couldn’t legally make the website take down the photos. “That harm goes on forever,” he said.
    Orput said Internet users must be critical when it comes to sharing information, adding that identity theft has emerged as perhaps the most common crime in Washington County. “This case illustrates the need to be very, very safe and vigilant online,” he said. “I hope people just won’t share passwords with anybody.”
    According to a criminal complaint, the woman reported having a Facebook chat with someone she thought was a friend. When the woman logged off Facebook, then attempted to log back in, she learned her password had been changed.
    After gaining access to her Facebook page, she found a link on her page that appeared to have been posted by the friend she had been chatting with earlier. That link led to a sexually explicit website that contained three of the woman’s photos and identified her by first and last name and city of residence. Those photos had been stored in her email account, according to the complaint.
    The woman then realized that she had unwittingly disclosed account information to her chat correspondent, later identified as Noirjean. The friend Noirjean had been posing as also learned her account information had been hacked.
    Police closed in on Noirjean using Internet records. In an interview with police, Noirjean admitted to hacking into or attempting to hack more than 100 accounts. More victims were discovered after a search of Noirjean’s computer.
    As part of the sentence, Tenth District Court Judge Elizabeth Martin ordered Noirjean to pay $1,000 to each of the 13 victims. She also required him to pay more than $2,000 to two women to cover computer expenses.


    -Source (Woodbury Bulletin)



    [......]

    WikiLeaks Get Court Victory, Donations By Visa & MasterCard May Resume Soon

    Court victory to WikiLeaks, this Thursday an Icelandic court declared victory in the first round of its campaign against the financial blockade imposed by Visa and MasterCard to WikiLeaks donation. Judge ruled 'Valitor' -Icelandic payments processor to reopen a gateway handling Visa and MasterCard donations to Wikileaks. The court ruled that Valitor must resume processing payments for Wikileaks' partner DataCell within two weeks. If Valitor doesn't, then it must pay a fine of 800,000 Icelandic kronur (USD$6,200) per day until the company complies with the ruling, the Reykjavik district court ruled. 
    WikiLeaks says that the ensuing blockade has led to a 95 percent fall in revenue, something which founder Julian Assange says has forced him to focus on fundraising at the expense of his site's publication work.
    The judgment, handed down by Reykjavik District Court, is "a very important milestone in our campaign,"WikiLeaks spokesman Kristinn Hrafnsson said in a telephone interview. Lawsuits remain active in Denmark and in Belgium, he said, but the Icelandic win was "a small but very important step in fighting back against these powerful banks."
    DataCell CEO Andreas Fink said the court had dismissed Visa's argument that DataCell should not be allowed to process donations for third parties.
    "The verdict is an important one as the court had to rule on the conditions of the contracts we had with a payment processor which indirectly imposes Visa general rules on us," said Fink. 
    Still neither Visa Inc. nor MasterCard Inc. immediately returned emails seeking comment on the judgment.



    -Source (Newsday & PCW)

    [......]


    Personal Information of 123,000 US Government Employees Stolen
    Personal information of over 123,000 federal employees have been exposed after a cyber attack in last July. The cyberattack occurred against a Thrift Savings Plan (TSP) contractor, Serco Inc. The FBI notified both Serco and the TSP last month about the attack. According to the Guardian has called Serco "probably the biggest company you have never heard of." It's on the FTSE 100 (Big!), has 100,000 employees and operates everything from railways in the UK and Australia to driver licensing in Ontario, Canada to retirement accounts for US government employees, members of the armed forces and US Postal Service workers. Perhaps taking advantage of the holiday weekend in the United States, Sercoannounced this morning that hackers had compromised systems at its Thrift Savings Plan (TSP) operation.
    After extensive forensic investigation it was determined that 43,000 members' names, addresses and Social Security Numbers had been accessed by the intruders, and the Social Security Numbers of another 80,000 may have been involved. 
    "Serco regrets this incident and the inconvenience it may cause to some Thrift Savings Plan participants and payees whose personal data was involved," said Serco Chairman and CEO Ed Casey in the statement. "We have fortified our information security measures and cyber defenses."
    Further information has been published that shows the original intrusion into Serco's system occurred in July 2011. Information that was accessed has been available to criminals for nearly a year before Serco was notified by the FBI.
    [......]


    Dating Site eHarmony Hacked, 1.6 Million Password Stolen

    Dating Site eHarmony Hacked, 1.6 Million Password Stolen 

    After LinkedIn now cyber criminals targeted one of the famous dating site eHarmony and stolen more than1.6 millions of passwords from the database. The authority has admitted that its password database has been compromised, with around 1.5 million hashed passwords being found in the wild. The leaked database that appeared in public contained unsalted MD5 hashed passwords and was reported to not contain any identifying user-names or email addresses. According to the sources all the password hashes has been randomly submitted to some underground hacker's forum where a user asked for help in cracking the hashes. This help was collectively given by the forum members who were then reportedly given the LinkedIn hashed passwords to work on. After the primary investigation eHarmony confirmed that a small fraction of user database has been affected. And affected members password has already been reset. eHarmony did not give any details of how the passwords were leaked and says they will continuing to investigate what happened. 
    [......]

    Infinity add