New and Used Car Talk Reviews Hot Cars Comparison Automotive Community

The Largest Car Forum in the Philippines

Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 28
  1. Join Date
    Aug 2004
    Posts
    22,704
    #11
    Moral of the story? Hack all you want, but don't threaten to f*** with the government, or they'll hunt your ass down.

    I hope he gets what's coming to him.

    Ang pagbalik ng comeback...

  2. Join Date
    Oct 2006
    Posts
    5,994
    #12
    According to anon, he was dropped months ago from the organization after leaking personal information of its members and taking over anonops IRC channel. karma niya iyan for doublecrossing fellow hackers
    Damn, son! Where'd you find this?

  3. Join Date
    Sep 2003
    Posts
    25,070
    #13
    Apparently what the authorites got was a IRC server operator. It's the logged IP addresses in his computer that is interesting... kawawa ka na if your IP address is among that, expect a visit from the feds.

    LulzSec Takes Hit, Keeps On Hacking -- InformationWeek

    LulzSec said the person arrested by British police, named by authorities on Wednesday as Ryan Cleary, ran a server on which one of LulzSec's many chat rooms had been hosted. "Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us. Lame," said the group via Twitter.

    If authorities are closing in on LulzSec, the group doesn't appear to be backing off. On Wednesday, the group released, via Pastebin, contact information for what it said were two people who tried to snitch on LulzSec by "leaking some of our affiliates' logs." LulzSec alleged that the two people--named as Marshal Webb and Michael Dean Major--had orchestrated last month's hack and defacement of the Eidos Montreal website. In that attack, hackers reportedly stole information on at least 80,000 users of the company's Deus Ex: Human Revolution game.

    LulzSec also warned that there had been a rash of Pastebin posts purposing to be from the group, such as the announcement that LulzSec planned to release a complete copy of the U.K. 2011 census data. "That wasn't us--don't believe fake LulzSec releases unless we put out a tweet first," the group said via its Twitter feed.

    Are law enforcement agencies close to unmasking LulzSec? While British police did bust Cleary, aka "ViraL," he had already been publicly named--in anonymous Pastebin posts released last month--as someone who interacted with LulzSec members via IRC. Some posts also alleged that he was a "4chan DDoS attacker," referring to the freewheeling 4chan forum and imageboard in which all members are supposed to be anonymous.

    Cleary was also mentioned in multiple tweets earlier this month from Twitter user Power2All. Those messages warned LulzSec via Twitter to "avoid and ignore lulzco IRC net, your IP will be compromised by Ryan Cleary." According to Power2All, Cleary's server logged IP addresses and leaked them to the Internet.

    In the wake of Tuesday's arrest of Cleary, a post on the anti-LulzSec blog "LulzSec Exposed" also said that Cleary was "just an IRC operator" for LulzSec, and that the group's leader went by the handle of Sabu. It also said that the arrest of Cleary would give law enforcement agencies a leg up on LulzSec. "Bad news for LulzSec, count your days as we count your heads," said a blog post on LulzSec Exposed. "As Ryan is arrested, your IRC irc.lulzco.org logs are with FBI, SOCA and Interpol."

    The group also alleged that LulzSec members, having been exposed, were starting to flee, and that the group's joint operations with Anonymous are a ploy to keep the LulzSec brand going. "They also want to keep the legacy of Lulzsec even after their arrests by recruiting new people ... to continue it and create havoc among security companies."

    Also on Wednesday, LulzSec Exposed named Power2All, the admin for the Anonymous IRC channel (Anonops), as Netherlands-based PHP programmer Jasper Lingers. But a message via the Power2All Twitter feed fired back, "I am not lulzsec, neither anonymous. AnonOps is a platform to chat on ... Nothing illegal about a chat server."

  4. Join Date
    Oct 2006
    Posts
    5,994
    #14
    I wonder though if they'll find out that the IP addresses are actually proxies.

    scratch that. they just raided DigitalOne. hehe naka proxy nga
    Damn, son! Where'd you find this?

  5. Join Date
    Sep 2003
    Posts
    25,070
    #15
    Yeah, thay hauled of the entire server...


    The FBI launched a raid against ISP company DigitalOne's servers Tuesday morning in an attempt to catch LulzSec. Digital One had already complied with these agencies in identifying which servers hosted the IP address they were after. The raiders took several enclosures of servers, rather than the servers. The confusion apparently came from DigitalOne's use of a blade system, in which multiple servers are stored on a single Chasis. Even accounting for this confusion, the question remains: why confiscate the server?

    If the FBI wanted to prevent its usage, they've failed. The server could be copied and replaced overnight with no harm. If the FBI wanted the data on the server, they could have asked for a copy. If the FBI wanted to monitor traffic, they could have inserted any number of digital surveilance programs. Instead, they decide to take the server. Is this a new bugdet-cutting initiative?

    And all of this nonsensical action in order to catch LulzSec. As the New York Times reports:

    A government official who declined to be named said earlier in the day that the F.B.I. was actively investigating the Lulz Security group and any affiliated hackers. The official said the F.B.I. had teamed up with other agencies in this effort, including the Central Intelligence Agency and cybercrime bureaus in Europe.

    So the CIA, the FBI, and some European cybercrime bureaus walk into a bar at 1am. They confiscate the fine wine that LulzSec sipped a week ago, along with all of the wine in the bar, putting it out of business for three days because LulzSec may or may not have been there.

    This is what Sun Tzu calls Supreme Excellence.

    And before assuming 'necessary evil,' readers should note that the collateral from the FBI's actions has affected over 100 companies, making them more dangerous to the public in their pursuit of LulzSec than LulzSec has been in its entire existence
    Continue reading on Examiner.com FBI LulzSec server takedown fails - National Anonymous | Examiner.com FBI LulzSec server takedown fails - National Anonymous | Examiner.com

  6. Join Date
    Sep 2003
    Posts
    25,070
    #16
    Yeah, thay hauled off the server hardware...




    Early Tuesday morning, the FBI raided a data center in Reston, Virginia and seized servers, causing several high-profile Web sites to go dark.

    According to a New York Times report, the FBI showed up at the data center, owned by Switzerland-based DigitalOne, around 1:15am and removed the equipment. The move resulted in services like Pinboard, Instapaper, and the Curbed Network going offline.

    DigitalOne chief Sergej Ostroumow sent an email to clients on Tuesday that said FBI took "3 enclosures with equipment plugged into them, possibly including your server—we cannot check it," the Times reported. The seizure affected "tens of clients," Ostroumow said.

    "Sorry for the continued slow site performance from yesterday's server loss. The replacement server has been delivered and I'm setting it up," Instapaper tweeted earlier today.

    The company said it was arranging to replace the blocked database with a new server.

    Earlier today, Pinboard said service has stabilized, and its API was back on. Some archive links, search, global tag pages, RSS, tag clouds, and user stats were still offline.

    "DigitalOne has confirmed that our server was one of the ones taken during the FBI raid. I have no reason to believe it had anything to do with us, but unfortunately these blade servers pack many to a single box," Pinboard said.

    The Curbed Network is back online. "We're back! With some glitches, but our tech team's working to restore everything," the company said in a tweet that pointed to the Times article as an explanation.

    The FBI has not commented on the raid, and it's unclear if it's at all related to recent hacks committed by groups like LulzSec and Anonymous. Earlier this year, the FBI said it executed more than 40 search warrants throughout the U.S. related to distributed denial of service (DDoS) attacks organized by Anonymous.

    During an April appearance before a Senate Judiciary subcommittee, Gordon M. Snow, assistant director of the FBI's cyber division, said "our cyber adversaries' capabilities are at an all-time high," and pointed to the activities of Anonymous as one example.
    FBI Seizes Servers, Prompting Site Outages | News & Opinion | PCMag.com

  7. Join Date
    Oct 2006
    Posts
    5,994
    #17
    Hackers aren't that stupid to leave a trace that's why they use proxies. Seemingly innocent servers but once they gain access to them, they can be used as beach heads when performing DDoS attacks. Typically, they'll use lots of proxies to take down the target by overwhelming them with processes. But like they said, that's not yet the worse they can do. If they decided to use Brute Force attacks, again utilizing proxies to do the bulk of the attacks, they can access databases by cracking passwords( brute force means spitting out random combinations until you get it right. although this consumes a lot of processing power and time, depending on the target's degree of encryption, through utilizing multiple proxies and simultaneous attacks by different users, they'll get the results they wanted. Remember, these guys are very organized despite their apparent informality.
    Damn, son! Where'd you find this?

  8. Join Date
    Apr 2011
    Posts
    408
    #18
    Up na ulit ang PS3 since last last week pa. And may free na 5 downloadable games agad. Online in PS3 is IMO great but sometimes laggy. Depende nalang sa connection mo basta pag nag UNCHARTED 2 naman ok walang lag. Lag minsan pag sa 2k11.

  9. Join Date
    Oct 2006
    Posts
    5,994
    #19
    Hehehe, blackhats vs. blackhats

    malaki talaga grudge sa isa't isa
    As reported earlier, a vigilante band of hackers known as the Web Ninjas revealed its mission to expose the members of LulzSec and see that they were behind bars. They reportedly succeeded in retrieving the hacker handles of LulzSec members, including lesser members like "neuron" and "Redacted," and also critical members such as "Topiary" and "Sabu." LulzSec retaliated by "doxing" (or rooting out) the very person who leaked the information to the Web Ninjas.

    "This is Marshal Webb, also known as "[redacted]" in the "#pure-elite" IRC logs you no doubt have enjoyed," the group wrote to the FBI. "He was involved in the hacking of the game "Dues Ex" (sic) and was/is involved in countless other cybercrimes. Also, he tried to snitch on us. Therefore we just did your job for you with great ease. This moron is trying to flee the country in order to avoid serious punishment. Hunt him down... "

    Hacking group TeamPoison has also claimed LulzSec blood by acquiring the names, addresses and pictures of the LulzSec team. "No matter how many bots you gather, no matter how much people you lie to, no matter how much pre-made tools you use, you will _NEVER_ represent the real hacking scene, we warned you, we told you we do not make empty threats, we gave u 48hrs to secure your ircs yet u failed to do so."
    AnonOps Communications
    Damn, son! Where'd you find this?

  10. Join Date
    Sep 2003
    Posts
    25,070
    #20
    Nagpapalamig muna...or are they seeking greener pastures?

    LulzSec Shutting Down After 50-Day Hacking Spree | News & Opinion | PCMag.com
    Hacker group LulzSec on Saturday announced that it is shutting down operations, but called on supporters to continue fighting its anti-government movement via a similar group, Anonymous.

    "For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could," LulzSec wrote in a note posted on Pastebin.

    The group, however, insisted that "we are not tied to this identity permanently," saying that "behind this jolly visage of rainbows and top hats, we are people."

    Despite the sometimes childish antics, "we truly believe in the AntiSec movement," the group said. Recently, LulzSec joined forces with Anonymous to for Operation Anti-Security, which targeted the Web sites and databases of governments with which it disagreed.

    "We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us," LulzSec continued. "The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve."

    The group concluded by saying that it was a "crew of six," but revealed nothing else about its identity or future plans. On Twitter, LulzSec encouraged "all future #AntiSec enthusiasts to join the AnonOps IRC here ... and follow *AnonymousIRC for glory."

    While LulzSec insisted it was on a "planned 50 day cruise," might it be calling things off to evade capture? Most recently, LulzSec released hundreds of documents relating to Arizona law enforcement, prompting concern that the data dump might compromise officers in undercover and other sensistive roles. That resulted in speculation that LulzSec's days might be numbered.

    Recently, a 19-year-old English man was arrested and charged for several hacks done by Anonymous and LulzSec; LulzSec, however, denied that the man, Ryan Cleary, was a formal part of its group.

Page 2 of 3 FirstFirst 123 LastLast
Playstation Network Down Globally