Showing posts with label Security News. Show all posts

Biggest Data Leak In History — “The Panama Papers” Expose Global Corruption



As a result of one of the biggest data leaks, 11.5 million documents have been leaked by ICIJ. This data leak, known as The Panama Papers, has revealed the names of some of the most famous world leaders and celebrities who are allegedly involved in using offshore structures to launder money and save taxes.

The International Consortium of Investigative Journalists (ICIJ) has published one of the world’s largest leaks of documents concerning the offshore accounts of the mighty and powerful. This Organization is spread across 78 countries and consists of a big army of journalists.
The data leak, dubbed as The Panama Papers, has exposed about 11.5 million documents exposing the web of corruption of several world leaders and families. With more than 2.6 terabytes of data, this leak of Panamanian firm Mossack Fonseca’s records has left behind the past data leaks by NSA whistleblower Edward Snowden and WikiLeaks.
While using offshore structures is entirely legal, alleged people are accused of using the offshore accounts to shell companies to allegedly hide income and save millions of dollars in taxes.
The Panama Papers were initially obtained by German newspaper Süddeutsche Zeitung. From past one year, they were being investigated by 370 reporters of more than 100 publications from all around the world.
The documents that have leaked include passports, financial records, correspondence goings 40 years in history, and details of 214,000 offshore entities. This research by newspapers has already unearthed the names of 12 national leaders, including prime ministers, presidents, and monarchs.
“I would say, first observation, it’s a lot more promising than even some of the more, other projects that we’ve done that have turned out to be very, very big,” said Gerard Ryle, a director at the ICIJ.

Biggest names revealed in The Panama Papers

The biggest political leaders whose name have been exposed are Vladimir Putin, Sigmundur David Gunnlaugsson – Icelandic Prime minister, HRH Prince Salman – King fo Saudi Arabia, Petro Poroshenko – president of Ukraine and others.
Apart from these leaders, names of the family members and associates of several other world leaders — Pakistan’s Prime Minister Nawaz Sharif, Syrian President Bashar Assad, President of South Africa Jacob Zuma, Chinese President Xi Jinping — have also been found.
Bollywood actress Aishwarya Rai, her father-in-law Amitabh Bachchan, KP Singh of the DLF group, Sameer Gehlaut of the Indiabulls group, and Vinod Adani of the Adani group are among the 500 Indians whose names have appeared in the leak. Argentinian footballer Lionel Messi’s name in the list is another surprise.
You can follow this dedicated sub-reddit thread for the latest updates.
Watch this video and know more about victims of The Panama Papers:


Top 10 Most Active Hacking Groups That Love To Deface Websites

John Matherly, the founder of the hacker search engine Shodan, releases a list of the most efficient hacking groups that love to deface websites. He has recently published the third edition of this list on Shodan blog. A Turkish hacking group named GHoST61 has topped the list for the third time. Talking about the underlying server technology, Apache Web was the most affected one.
Shodan is often labeled as the ‘world’s scariest search engine‘ or the hacker search engine. It was created by John Matherly who named this project after the evil computer in the video game System Shock. Every six months, he publishes a list of the top 10 most active hacking groups from all around the world when it comes to defacing websites.
The latest top 10 most efficient hacking groups list was released yesterday and it features GHoST61, a Turkish hacking group, at the top. This relatively unknown group has topped the list once again after claiming the top title in the previous two versions.
If we look at the list from previous years, there are just 4 familiar names in this year’s list — r00t-x (moved down 1 rank), TechnicaL(moved down 2 ranks) andvirus3033 (moved down 2 ranks).
Most of the attacks by these groups are opportunistic, which means that hackers just come across the unprotected websites, leave the defacement messages behind and move to bigger targets.

Top 10 website defacing hacking groups as of Jan 2016:

  • GHoST61: 51
  • Kadimoun: 39
  • AnonCoders: 35
  • r00t-x: 31
  • Shor7cut: 28
  • Owner Dzz: 27
  • Toxic Phantom FROM BANGLADESH BLACK HAT HACKERS: 27
  • TechnicaL: 21
  • virus3033: 21
  • Yuba: 17
If we come to the top targets of website defacers, the servers of Ecommerce Corporation remain the most affected, followed by Godaddy and Unified layer. The new entries in the list are CyrusOne, iServer Hosting, SoftLayer, New Dream Network and Digital Ocean.

Top 10 organizations containing most number of defaced websites:
  • Ecommerce Corporation
  • Unified Layer (+1)
  • GoDaddy (-1)
  • CyrusOne
  • iServer Hosting
  • SoftLayer Technologies
  • Media Temple (-1)
  • Peer1 Dedicated Hosting (-4)
  • New Dream Network
  • Digital Ocean
About the underlying server technology, the Apache Web is the most affected with 1,584 defaced websites. It’s followed by nginx with 222 and Microsoft’s ISS with 111 instances. Here’s the complete list:

Nuclear Power Plants Are The Next Easy Target Of Hackers All Over The World

Today, we are at a crossroads on nuclear security and the emerging threats in the form of cyber attacks and nuclear terrorism. Bur, our nuclear plants have failed to add necessary security measures to handle the cyber threats and potential security breaches. Based upon the two latest security reports, we have tried to assess the present day scenario which is too vulnerable.
The nuclear power plants around the world are living in a state of denial about the risks of possible cyber attacks. These highly sensitive facilities have failed to install the necessary security measures to protect their computer networks. Apart from this, 20 countries with nuclear fuel stockpile don’t have any government regulations to install some minimum security steps.
Such sorry state of our nuclear power plants was recently revealed in two different studies conducted by Security Operations Center (SOC) and the Nuclear Threat Initiative (NTI). Let’s tell you more about the situation:

“Security measures employed by Security Operations Center (SOC) aren’t enough”

The first report is an audit of Security Operations Center for the US Nuclear Regulatory Commission (NRC). Studying the affairs between 2013 and 2014, it was revealed that during this period the cyber attacks against US nuclear power plants grew with 18%. In the 18-page assessment report, it was highlighted that the computer networks used by NRC pose a real threat due to inadequate security measure. The NRC’s general inspector added that the measures deployed aren’t “optimized to protect the agency’s network in the current cyber threat environment.”
In the past, the sophistication of cyber attacks against nuclear power plants have increased. The hackers have attempted to gain unauthorized access using social engineering, code injection techniques, and other attempts.
It was reported that SOC, the in-charge of security at NRC, does not meet the agency needs and lacks predictive analysis to keep its networks protected.

“20 countries scored a disappointing 0 against theft and sabotage in nuclear power plants”

The second study, conducted by the Nuclear Threat Initiative (NTI), outlines the worldwide situation that reveals the gloomy condition of nuclear power plants. In this study, 47 countries were included — out of these, 24 had weapon-usable nuclear materials and 23 had nuclear facilities but they didn’t produce usable material.
Surprisingly, only 13 countries scored a perfect score of 4 when their preparations against a cyber attack (sabotage and theft) were examined. These countries were Australia, Belarus, Bulgaria, Canada, Finland, France, Hungary, the Netherlands, Russia, Switzerland, Taiwan, the United Kingdom, and the United States.
On the other hand, 20 countries scored a disappointing 0 against theft and sabotage. These countries were Algeria, Argentina, Armenia, Bangladesh, Belgium, Brazil, Chile, China, Egypt, Indonesia, Iran, Italy, Kazakhstan, Mexico, Morocco, North Korea, Peru, Slovakia, Spain, and Uzbekistan.
The Nuclear Threat Initiative publishes this annual index that examines the nuclear security all around the work. The agency also mentions that in the past few years many countries have improved their security measures but it isn’t enough.
Take a look at this year’s NTI security index scores below:
Nuclear power plants are highly sensitive facilities that need the extra layer of security measures. Employing an army of security personnel for security purposes will be useless if these plants are vulnerable to hacking attacks. These reports suggest that immediate steps must be taken regarding this issue in everybody’s best interests.


For More Updates Stay With US: http//:amadahmd.blogspot.com

New remote access Trojan Trochilus used in cyberespionage operations



Cyberspy group uses the Trochilus RAT program By Amad Ahmad

The program was used by a group that recently targeted organizations in Myanmar

A cyber-espionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products.
The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites.
The researchers linked the compromises to a sophisticated group of attackers known as Group 27, who are known to use different malware programs in their operations, some with overlapping capabilities.
Arbor Networks has uncovered seven malware programs used by the group so far, including three remote access Trojans: PlugX, 9002, and the new Trochilus.
"These seven packaged malware offer threat actors a variety of capabilities including the means to engage in espionage and the ability to move laterally within target networks in order to achieve more strategic access," the Arbor researchers said in a blog post.
While the Myanmar attacks provided initial insights into the group's operations, additional research revealed that the hackers' activities extend beyond that country.
When Trochilus was initially found, it had "minimal or no detection from anti-malware software," the Arbor researchers said.
While the threat is not yet widespread, Arbor published sample details and other indicators of compromise so that organizations can check their networks and systems and protect themselves in the future.

                                                        For More Updates: Click Here

How to protect a Folder with password in Windows PC/laptop

Secure your folder with password without using any additional software in your Windows 7/8.1/10 PC/laptop

This article will be helpful for those who want a better level of privacy than the level offered by basic OS functionalities. And also do not want to struggle with various software available as free or paid.
In this article we will teach you to password protect a folder(and transfer your private stuff in it) just by using command prompt.
Okay, first of all you need a text editor(notepad will do), and you have to copy the following code there. Replace “YourPassword” with the password you want to give to the folder (without double quotes).
cls
@echo off
echo amadahmad.blogspot.com
title Folder Private
if EXIST TWlock goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private TWlock
attrib +h +s TWlock
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p “pass=>”
if %pass%==YourPassword goto Decrypt
goto FAIL
:Decrypt
attrib -h -s TWlock
ren TWlock Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto End
:MDLOCKER
md Private
echo Private created successfully
goto End
:End
Now save the file as a .bat file(give any name you want, I have given name “Cipher”).
Third step is to open this file. ( I recommend that you open this batch file by command prompt rather than by clicking on it, in this way you will be able to see all the action)

As you open the file for the first time, it creates a folder named “Private” in the same directory as of the batch file.
You can place your desired stuff in this folder.
Now again open Cipher.bat in cmd and you will be presented with a choice of yes or no. Once you type ‘Y’ the folder will be locked.
After this the folder will be locked.
Whenever you need access,open Cipher.bat again, Enter the required password and the folder will be unlocked.
Read Also: 
                                               For More Updates: Click Here

602 Gbps DDoS Attack On BBC Proves That 2016 Isn’t Going To Be Any Different


D-DOS attacks are one of the biggest enemies of a website admin. The year 2015 saw an unprecedented growth in the number of DDoS attacks. Along the similar lines, Arbor Networks recorded an attack peaking up to 334 G-bps. Well, things aren’t looking good in 2016 as a hacktivist group has taken the responsibility of the D-DOS attack on BBC website that peaked up to 602 G-bps.
On New Year’s eve, the BBC website and i Player service went down due to a massive Distributed Denial of Service (DDoS) attack. The attack peaked up to 602 G-bps, according to the claims made by the New World Hacking group, who took the responsibility of the attack. In another recent attack, the Republican presidential candidate Donald Trump’s main campaign website was also targeted by the same group.
Earlier BBC announced that the service failure was due to some technical failure. Later it rephrased that the New World Hacking group took the responsibility just to “test its capabilities.”

602 G-bps – Largest DDoS Attack in History

DDoS attacks are conducted by flooding a web server with a torrent of traffic. These attacks are widely popular and often used by hackers with an aim to bring down the websites. For more, read our guide to know how DDoS attacks work.
The BBC websites including the Player on-demand service suffered at least three hours outage on Thursday due to the DDoS attack.
This group is calling itself a hacktivist group whose main target is ISIS.  One of the members of the group – calling himself as Ownz – has told ZDNet their real motives.
Read the statement here:
We aren’t really attention seekers, then again this attack was only a test of power, but we didn’t take down BBC because they had ISIS members on the site. We took down BBC as a test of our power. We use these attacks on ISIS mostly. 
David Marcus, VP of Facebook Messaging Products
The hacking group called this just a “start of a new year.”
The group also sent a screenshot of a web interface that was allegedly used to launch these attacks. The picture indicated an attack peaking up to 602 Gbps.
If this attack size is proved to be true, it would easily surpass the past record for the largest DDoS attack of 334 Gbps in 2015 recorded by Arbor Networks.
Detailing the attack, Ownz said that they have their own ways to bypass the security layers of the Amazon Web Services. He said:
The best way to describe it is we tap into a few administrative services that Amazon is use to using. The [sic] simply set our bandwidth limit as unlimited and program our own scripts to hide it.
We have contacted the Twitter handle of the New World Hacking group for more details and we’ll be updating the article as we get some update.

                                                        For More Updates: Click Here

Kingston’s ‘Unhackable’ DataTraveler USB Drive Self-destructs With Incorrect PIN Entry


Kingston Digital, one of the world leaders in memory products, has released Data Traveler 2000 encrypted USB Flash drive. This portable memory device offers best-in-class security features like hardware encryption and PIN protection with an on board keypad. The device is expected to ship in Q1 in 16 GB, 32 GB and 64 GB capacities.
At CES 2016, Kingston has announced a new USB drive that’ll make the life easier for the privacy concerned users. This secure Data-traveler 2000 encrypted USB Flash drive is created to provide the best possible security measures to the IT professionals for carrying sensitive documents.
The USB drive looks impressive right from the outside. As you pull out the outer aluminum cover, a built-in keypad will be there to surprise you. When inserted into a computer, you’ll have to unlock the device by entering the correct PIN. Failing to do so in 10 attempts, the USB will self-destruct — sounds just like the pen drive from Hollywood flicks like Mission Impossible, right?
This USB 3.1 compatible thumb drive offers speeds of up to 135 MBps read and 40 Mbps write. On the security front, Data Traveler 2000 comes with hardware-based full disk AES 256-bit encryption in XTS mode. The drive also protects your data from brute-force attacks.

Kingston Data Traveler 2000 USB — PIN protection, AES 256-bit data encryption, resists brute-force attacks

For additional protection, Kingston’s super-secure USB drive features the option of auto-locking the drive by deleting key and password files after 10 invalid login attempts.
“We are excited to add Data Traveler 2000 to our existing lineup of fast and encrypted USB Flash drives for organizations and SMBs,” said Ken Campbell, Flash business manager, Kingston. “It is the perfect option to deploy in the workforce where a uniform encrypted data storage solution that works on many different OS’ are in use.”
This OS independent USB drive works with all popular operating systems, even Android and Chrome-OS. The Data Traveler 2000 is available in 16 GB, 32 GB and 64 GB capacities.
The Data Traveler 2000 is expected to hit the markets in the end of 2016 Q1.

                                                        For More Updates: Click Here

Credit Card PIN Number Could Be Stolen Over Wifi



A team of security researchers in Germany found, that any card data may be stolen right off the terminals designed to protect it. This risk can not be easily fixed. Not only customers but shops can find this technology turned against them.
1
The German researchers has discovered a way to steal payment card data from terminals without the need for a skimmer or POS hardware that’s been compromised. The researchers were able to do it over an ordinary WiFi network. When a Russia Today reporter paid the team a visit to see the attack firsthand they were able not only to capture his PIN but also produce a cloned credit card within minutes.
2
The flaw that allows them to pull off their attacks isn’t something that can be easily patched in software. It’s a shortcoming in the protocol used by the payment terminal when it transmits data, and apparently banks aren’t exactly falling over themselves to figure out a fix.
That hack can affect you if you’re shopping in Germany, the terminals you’re making payments on don’t rely on the ZVT protocol. Banks are acknoledged of this problem but are reluctant to react to it.

For More Updates: Click Here

The Worst Hacks of 2015



Last year we witnessed some of the most shocking cyber attacks ever, with North Korea allegedly hacking Sony over the release of a dumb comedy movie to unknown hackers spilling the private nude pictures of dozens of celebrities. For some, it was the year hacking truly became the norm.
But somehow, 2015 was worse. Hacking and data breaches weren’t just the norm, but they reached far and wide, hitting victims of all kinds, from regular consumers, to government employees, and even children and cheaters. It seemed like no one was spared.
We’ve decided to look back to 2015 and revisit not only the worst data breaches, but those that pushed the boundaries and redefined the world of information security. In no particular order, here’s our list.
Israel Government Allegedly Hacks Kaspersky Lab
In the last few years, the Russian security firm Kaspersky Lab has helped uncover some of the most secretive and high profile government-led cybe rattacks and espionage operations ever, from the landmark Stuxnet to Flame, Red October, and those of the Equation Group. This year, the tables turned when Kaspersky Lab announced it had been hacked by a group of government-sponsored hackers, likely from Israel (though the firm avoided to pointing fingers, the malware used was attributed to Israel in the past). The attack on Kaspersky didn’t spill a lot of confidential data, but it was a sign of things to come: a future where malware hunters are targeted by the own spies they’re trying to uncover, using more than just intimidation tactics.
The Massive Breach at OPM, The Hack That Keeps on Giving
In May, the agency that handles practically all US government employees' data revealed it had been the victim of a month long intrusion, and that hackers had taken the personal data of around 4 million people. That was bad enough, but it turned out the breach was much, much worse than OPM let on.
For starters, hackers (likely Chinese) actually stole the personal information of at least 20 million people, including the fingerprints of 5.6 million people. But we later also learned that the personal data stolen wasn’t just stuff such as date of birth and names, but the intimate personal details of millions of government workers, including those holding security clearances. The stolen data included information on their sex lives, drug abuses, and debt—all information that could be used to blackmail them and even blow their cover. Oh, the OPM hack even involved White House correspondents.
Vigilante Hacker Hits Italian Spyware Vendor Hacking Team
In early July, the usually-quiet Twitter account of the controversial surveillance tech vendor Hacking Team got its name to “Hacked Team,” and started tweeting screenshots of internal emails, as well a link to more than 400 gigabytes of data.
“Since we have nothing to hide, we’re publishing all our emails, files, and source code,” read the tweet.
As it turned out, the company had been hacked by a hacker only known as PhineasFisher, the same mysterious vigilante who hacked Hacking Team’s competitor Gamma International in 2014. The files exposed Hacking Team’s shady customers, including Sudan and Bahrain. Thanks to the cache of internal emails and files, among many things, we also found out how someone stole the company’s equipment in Panama, how its software targeted porn sites’ visitors, and how the company could turn off customers’ spyware infrastructure thanks to a backdoor.
Think of the Children: Toymaker Gets Hacked, Loses Parents’ and Kids’ Personal Data
An anonymous hacker found a way into the servers of the multinational toy company VTech, which makes internet-connected toys. The hacker was able to access the personal data of almost 5 millions parents and 6.3 million children, including their names, home addresses, passwords, and even selfies and chat logs. The data, however, was never published online. The hacker told Motherboard that all he wanted was expose and denounce VTech’s poor security practices. As a result of the hack, the company had to take down its online services, two US senators put into question VTech’s security and privacy protections, and a 21-year-old was arrested in the UK.

“If T-Mobile can’t guarantee my Social Security number’s safety, it shouldn’t ask for it.”

Hackers Steal Social Security Numbers of 15 Million T-Mobile Customers
T-Mobile revealed in October that hackers had gained access to a server of the giant data broker Experience, getting their hands on around 15 million Social Security numbers. The third-most popular mobile phone carrier in the US tried to deflect the blame on the data broker, which was the one actually hit with the breach. But as Motherboard managing editor (and data breach victim) Adrienne Jeffrey argued, “If T-Mobile can’t guarantee my Social Security number’s safety, it shouldn’t ask for it.”
Hackers Dox Cheaters And Embarrass Infidelity Giant Ashley Madison
A mysterious group of hackers calling itself the Impact Team broke into Ashley Madison, a successful and infamous website that promised discreet affairs for married men and women. A few weeks later, the hackers released a large data trove revealing all the names of the sites’ users, as well as internal emails. The hack exposed the service’s many lies, from the faulty paid service to "full delete" an account, to its alleged army of fake women accounts. The hackers claimed it was an easy hack, saying “nobody was watching” despite the fact that emails showed the site administrators knew it was a target for cyber criminals. Most of all, the hack exposed its users secret lives, leaving some of them in despair over what to do. At least three users committed suicide, countless users got blackmailed, and some were publicly outed and doxed. Months earlier, hackers also stole data from hookup website Adult-Friend-Finder, exposing almost 4 million users and their sexual preferences.
The Massive Healthcare Data Spillage
2015 was the year of the healthcare breach, with 55 recorded ones and a whopping 100 million records stolen. The biggest one was the one suffered by the provider Anthem, which lost almost 79 million records. But there were other attacks against other big providers such as Premera and Blue Cross Blue Shield.


For More Updates: Click Here

What Is Anonymous And How Big It Is?



Anonymous is a decentralized hacktivist group that has been into existence since 2003. It is hard to predict the actual size of the group as most of its activities are not commenced in the daylight. Yevgeny Golovchenko, a research student at the University of Copenhagen, did make his efforts to approximate the number of members in the group.
Anonymous, a self-declared collective that has been associated with taking down government websites and fighting ISIS. This question – how big is Anonymous? – is still uncertain as the actual size of the widely distributed group, or a “movement” as it is called now, is hard to predict. And we can’t rely on mere calculations regarding the actual number of members who title themselves as Anonymous.
The collective group has been working on a global platform and the Anonymous members are referred to as “Anons”. LulzSec, founded in May 2011 and AntiSec. which came into existence in June 2011, are two well-known subgroups to Anonymous. Another associated group GhostSec has been in the news after the Charlie Hebdo attacks.
An aggregate sack of flesh – meshed together by wires transistors and Wi-Fi signals – replete with miles of tubes pumping blood, pounds of viscera-filled with vital fluids, an array of live signalling wires, propped up by a skeletal structure with muscular pistons fastened to it, and ruled from a cavernous dome holding a restless control centre, the analog of these fabulously grotesque and chaotically precise systems that, if picked apart, become what we call people.
— this is Anonymous as described by Gabriella Coleman, Professor at McGill University and an anthropologist. She has been a regular observant and a media commentator in accordance to various operations by Anonymous.

The Initial Imprint (2003-2013)

In 2003, the very first sightings of Anonymous’ activities were images posted by unknown users tagged as Anonymous on the /b/ board of 4chan website, and they become quite popular. Further, their operations advanced to raiding websites, one famous case was of a Finnish social network website Habbo Hotel, where they blocked access to regular users, given the reason, “closed due to fail and AIDS”.
The users at 4chan started the use of IRC (internet Relay Chat) to play offline pranks as the internet traffic exploded on 4chan. Such acts did attract media attention – a news report was aired on KTTV, a Los Angeles-based unit of FOX network, branded Anonymous as “domestic terrorists” and “internet hate machine”.
In their initial days, Anonymous all was all about mass pranks, trolling events and actions against the internet communities who supported anti-piracy acts. Encyclopedia Dramatic, that came into existence in 2004, served as a platform for the satirical motivations fulfilled by Anonymous.
It was in 2008, when Anonymous tasted the very first bite of hacktivism. Operation Chanology or Project Chanology, a protest against the Church of Scientology was initiated which included a series of digital attacks. 4Chan users were involved in acts of prank-calling Church’s hotline, repeated DDoS attacks, and sending black faxes that led to wastage of ink cartridges, all as a retaliation to the copyright infringement letter published by the church, after a video featuring “Tom Cruise practicing Scientology” surfaced on a blog named Gawker on January 15, 2008.
Eventually, their engagement with the Church of Scientology faded down and the group’s activities nowhere to be noticed by the start of 2010. It was in September 2010 when Anonymous got an opportunity to fine tune their hacking muscles, launched a DDoS and took down the website of Aiplex Software. Aiplex was an Indian company which partnered with film studios and specialised in launching DDoS attacks against websites like The Pirate Bay, which hosted pirated content.
Subsequently, the websites of the Motion Pictures Association of America (MPAA) and the Recording Industry Association of America (RIAA) were also taken down as the part of the protest against the anti-piracy norms. An operation titled “Payback Is a Bitch” launched on September 19, 2010, in which the Mustafa-Al-Bassam( Known as Tflow) and other Anons hacked the website of the anti-piracy group, Copyright Alliance. The following statement was issued after the takedown:
Anonymous is tired of corporate interests controlling the internet and silencing the people’s rights to spread information, but more importantly, the right to SHARE with one another. The RIAA and the MPAA feign to aid the artists and their cause, yet they do no such thing. In their eyes is not hope, only dollar signs. Anonymous will not stand this any longer. The websites of Australian Federation Against Copyright Theft, the U.S. Copyright Office, a British law firm ACS: Law, and many more, were taken down as a part of the Payback operation.
The horizon of the Payback operation was expanded to include “Operation Avenge Assange”, which was in response to the boycott of WikiLeaks by various companies like Amazon, Paypal, MasterCard, and VISA, as the consequence of classified cables concerning the U.S. government were released by WikiLeaks. DDoS attacks were launched against Paypal, PostFinanace and EveryDNS, who denied service to WikiLeaks. The attack also included the website of U.S. Senator Joe Leiberman, who supported the denial of access against WikiLeaks.
In 2009, YouTube allegedly suspended the account of a user Luckywes1234 for having abusive languages in some videos. As a protest, Anonymous in collaboration with eBaum’s World declared March 20, 2009, as the YouTube Porn Day and uploaded numerous videos featuring “hank panky acts”. They repeated the same in 2010.
The succeeding years marked the commencement of Operation Tunisia (2011), which was to support the Arab Spring movements. It also included defacing Tunisian government websites led by various Anons like Sabu, and providing protected access to normal internet users with the help of a script written by Tflow. Another protest, Operation Egypt, was carried out in order facilitate access to websites banned by the government, which was done in collaboration with an activist group called Telecomix.
Another major protest which gained worldwide recognition, included compromising user data of over 100 million Sony accounts, all done in retaliation for making efforts to prevent the hacking of PS3. The attack led to the close-down of Sony’s Play Station Network and Qriocity services for about a month.
Aside of their online presence, Anonymous has also presented themselves in the real world. It was on November 5, 2013, when numerous Anonymous protesters wearing Guy Fawkes Masks, gathered in 400 cities around the world for the commencement of Million Mask March.

Recent Work of Anonymous:

Anonymous and its Anons have continuously signified their presence through various operations and protest actions they’ve conducted from time to time. But in the last couple of years, there is no doubt about the fact that Anonymous has matured from a mere prank-playing group, no matter ISIS calls them idiots, but they’ve imparted their efforts.

#OpOK (2013)

This initiative was focused on helping the victims of Oklahoma Hurricane Sandy disaster in 2013. A widespread mission was initiated which included gathering any sort of information that could be used to identify and find lost victims.
This is an urgent message concerning the absolutely devastating impact of the tornadoes that left a trail of destruction through Oklahoma on 5/20/2013. A new Anonymous operation is being launched known as #OpOK in an effort to assist with the clean-up/recovery effort. There is no limit to who you can help or what you can do… however we ask that you please do something.

#OpSafeWinter

Another operation led by Anonymous, which concerned the homeless people on the streets. The aim of the mission was to raise awareness among various social welfare groups so that any sort of help could be provided to the homeless people.
Laurine Murphy writes for the DailyDot,
“Do something amazing this winter… that’s the point.”
So said the administrator of @OpSafeWinter, the Twitter account heading up public relations for Anonymous’ most ambitious project for 2013 and 2014. We spoke to the Anonymous member via Twitter direct message for an exclusive interview on the umbrella project dubbed #OpSafeWinter. The goal is to get Anons and “civilians” out into the streets all over the world to save lives by giving the homeless and the critically poor the tools they need to survive at least one more season.

Michael Brown & Tamir Rice Shootout (2014)

Anonymous did admit their protest in the two police shootouts, one of Michael Brown, an African American in Ferguson, Missouri and another of Tamir Rice in Cleveland, Ohio. They launched new twitter handles and threatened to take down federal websites if any of the protestors was harmed by the police. In the Tamir case, Anonymous used Been-Verified to disclose the phone number and identity of the involved police officer.

#OpCharlieHebdo (2015)

On the cold day of January 7, 2015, 12 people were shot dead in a death massacre at the office of Charlie Hebdo. Anonymous having intentions to completely “erase” ISIS from the internet, released a video through their Belgian YouTube account in which they promised a response to “al-Qaeda, the Islamic State and other terrorists”. In the video, a man wearing the Guy Fawkes Mask was quoted saying, “We are declaring war against you, the terrorists”, in an electronically distorted voice.

#OpCyberPrivacy (2015)

Another act of vengeance covered in the protest list of Anonymous was in response to the Anti-Terrorism Act, 2015 or C-51 Bill passed by the Parliament of Canada which accorded more powers to the Canadian Intelligence Agencies in order to fight terrorism. They claimed the responsibility of defacing federal websites on June 17, 2015.
A snippet from the video,
Greetings citizens of the world, We are Anonymous. This is Operation Cyber Privacy. This statement is an urgent call to action. As indicated in our most recent video, we have joined forces with Operation C51, as well as our comrades in France, the UK, and beyond. As part of this union, we are calling for a global March of solidarity with Operation C51 on May 30th. Multiple cities in Canada and the United States have already established protests, and you can join them by contacting us on Twitter. If you can’t find a protest in your area – organize one.

#OpKKK (2015)

In this operation, Anonymous announced the revelation of about 1000 names and emails concerning the members of Ku Klux Klan (KKK) and its affiliates. They said in a press release, “You are terrorists that hide your identities beneath sheets and infiltrate society on every level. The privacy of the Ku Klux Klan no longer exists in cyberspace.”
On November 2, 2015, a list of 57 phone numbers and 23 e-mails was published, but Anonymous denied involvement in the same by a tweet made through @Operation_KKK, “#ICYMI #OpKKK was in no way involved with today’s release of information that incorrectly outed several politicians.”

Anonymous Vs. ISIS

Apart from their numerous take-down events from time to time, the hacktivist group has also been in the news for their worldwide cyber-attacks against the Islamic State. The collective also announced its offensive hacking motives to kill ISIS online.
One of the recent attacks was a couple of weeks ago, in which they hacked an ISIS propaganda website and trolled ISIS by posting Viagra ads concerning to a company CoinRx, which promotes itself as the “#1 Bitcoin online pharmacy”. The following message was displayed on the website,
Too Much ISIS. Enhance your calm. Too many people are into this ISIS-stuff. Please gaze upon this lovely ad so we can upgrade our infrastructure to give you ISIS content you all so desperately crave.
The credit for hacking the ISIS Darknet website was bagged by GhostSec, a scion to the Anonymous collective formed to declare a war against ISIS. GhostSec came into light after the Charlie Hebdo terrorist attacks and claimed to have taken down thousands of ISIS twitter accounts and websites. However, they’ve cooperated with the intelligence agencies in the name #OpISIS, but eventually, it was known that their operation backfired a little bit as most of the Twitter account they closed belonged to normal people, not the ISIS.
Anonymous chose December 11, 2015, as the “Anti-ISIS day of Rage”. On this day, the collective has planned to fill the feed of ISIS Twitter handles with pictures of dead ISIS terrorists. This step of Anonymous is being seen as the continuation of its efforts to attack ISIS in response to the Paris attacks.
Greg Housh is one of the public-ally known Anonymous members. These days he is sort of semi-retired from his hacking stuff. Talking to The Washington Post, he told more about what Anonymous is and how it operates.
Housh said that everyone loves to call it “hacking”, but Anonymous also does tons of “research, identifying and monitoring everything out there that ISIS might use to communicate and recruit, and trying to get those channels shut down, be it Twitter accounts, Facebook pages, telegram channels”.
Replying to a question – If you report ISIS accounts, and social media companies shut them down, won’t they just open others? – Housh said that it’s very hard to get followers on Twitter and influencing people once again is difficult.

#OpParis (November 2015)

Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go.
A declaration made by Anonymous after the series of bomb attacks of the city of Paris in November 2015. The hacktivist group was quick to issue a warning to its long-time foe ISIS. The group released two videos that warn ISIS and ask them to “expect a total mobilization on their part.”
Anonymous has already leaked more than 1000 ISIS Twitter Accounts as a part of the #OpParis campaign.

How big is Anonymous?

It is a well-known fact that Anonymous is not a registered organisation nor they’ve any formal structure to account for their operations. Making assumptions about the actual size of the decentralized group spread all around the world only contributes to a vague notion.
However, a commendable effort was made by Yevgeny Golovchenko, a research student at the University of Copenhagen. In a study conducted about six months ago, Golovchenko did arrive at a conclusion only to fathom that the actual size of the collective is far more than what the world has perceived.
On March 29, 2015, Golochenko used a software called Netvizz to harness all the public-ally available data referring to the probable connections possessed by Anonymous on the internet. It was a collection of 2,770 Facebook pages with 51,764 connections gathered after Golovchenko manually trimmed down from a set of 5,470 Facebook pages with 123,625 connections via likes. It is the “absolute minimum size of the page network”, as assumed by the research student.
One could argue that getting Likes is easier for 2,770 pages than for instance 1 page. Hypothetically, the same person could have “Liked” most of the Anonymous pages – although such an endeavor would take hours if not days. Similarly, the same person can use more than one account to Like pages or even Facebook bots. For this reason, the 22.5 million Likes do not necessarily represent 22.5 million people. These challenges occur when counting the number of Likes for any page on Facebook. However, even if only a third of the Likes represent actual Facebook users, the network is surprisingly immense – even to the members of Anonymous who have commented on this paper’s results. Only few mainstream media can match the movement’s enormous internet infrastructure.
— explained Golovchenko.
For the trimming operation, Golovchenko chose three criteria, one of which was to be fulfilled by a page in order to associate it with Anonymous:
  1. Direct association with the movement (“We are Anonymous“)
  2. Direct promotion of the movement’s cause
  3. Use of symbols that characterize the movement
According to Golovchenko, a mere display of the Guy Fawkes Mask is not a criterion enough to qualify as an Anonymous page, the V for Vendetta fame mask is quite popular among the general public.
David Gilbert writes for the IBTimes,
Having gathered all the data, the graduate student set out to visualize his finding, with each point (node) in the graph representing a Facebook page that is associated with Anonymous. If page A gives page B a Like, they become connected with a line. The node size represents the amount of Likes received from others in the network. Colours show different communities.
Analysis of the data shows that while Anonymous really is a global movement, regional groups typically connect with other groups in that region (Europe, Asia, Africa) and while much of the media attention is focused on Anonymous in the US, there are also major nodes in places like Germany, Portugal, Spain, Greece, Brazil and Canada.

Final Words:

The group or movement titled as Anonymous is in existent since 11 years and has been subject to a worldwide criticism by various federal organisations. They describe themselves as “an internet gathering”, and collectively work on various social issues. The notion, whether they’re right or wrong is only a perception that needs to be individualized. And the fact that they’re working against numerous terrorist activities, should be praised for the unintentional efforts they’re contributing.
As far as the legality of their acts is concerned, it is the decision of our lawmakers, whether they put aside a sincere group of people working for social issues, or they coordinate their operations with Anonymous and make this world a better place.
Stay With Us: http://amadahmad.blogspot.com