Top members of hacking group Anonymous arrested after LEADER 'betrays them and works with FBI for six months'
Leader of computer hacking group LulzSec identified as unemployed dad-of-two Hector Xavier Monsegu
Secretly arrested last June and pleaded guilty to hacking charges in August
Has reportedly been working with FBI to bring down top hackers ever since
Court papers released Tuesday portray him as ringleader of hacking groups
Five members from UK, Ireland and US face charges
Leader of computer hacking group LulzSec identified as unemployed dad-of-two Hector Xavier Monsegu
Secretly arrested last June and pleaded guilty to hacking charges in August
Has reportedly been working with FBI to bring down top hackers ever since
Court papers released Tuesday portray him as ringleader of hacking groups
Five members from UK, Ireland and US face charges
Jerermy Hammond from Chicgo, Illinois
Ryan Cleary
Jake Davis
Donncha O’Cearrbhail of Ireland
The suspects reportedly include four LulzSec members - two men from Great Britain and two from Ireland - and one member of Anonymous - an American named Jeremy Hammond from Chicago.
Three were arrested and two were charged with conspiracy, Fox News reported. Hammond was arrested and appeared before a federal judge in Chicago before he was transferred to New York.
'This is devastating to the organization,' an FBI official told the channel. 'We’re chopping off the head of LulzSec.'
Three were arrested and two were charged with conspiracy, Fox News reported. Hammond was arrested and appeared before a federal judge in Chicago before he was transferred to New York.
'This is devastating to the organization,' an FBI official told the channel. 'We’re chopping off the head of LulzSec.'
LULZSEC AND ANONYMOUS
Anonymous is the umbrella term used to represent an internet subculture – a collection of online individuals, or 'hacktivists', who share common ideas of anti-censorship and freedom of speech on the internet.
They have carried out cyber attacks on Visa, MasterCard, PayPal and Amazon, and have threatened to take down Facebook and Twitter servers.
Although it is not formerly affiliated with it, the group has connections with the lesser-known hacking group LulzSec.
LulzSec, short for Lulz Security, is an offshoot of Anonymous and some members have been parts of both collectives .
LulzSec is an elite computer hacker group that has claimed responsibility for several high-profile, debilitating cyber attacks.
Their big hits include the compromising of user account data from Sony Pictures and taking the CIA website offline.
They also attacked Fox.com, leaking the names of more than 7,000 X Factor contestants, and the PBS Newshour website, where they posted a story claiming that slain killer Tupac was still living and in New Zealand.
The group aims to cause mayhem as well as manipulate flaws in security and passwords systems.
Anonymous is the umbrella term used to represent an internet subculture – a collection of online individuals, or 'hacktivists', who share common ideas of anti-censorship and freedom of speech on the internet.
They have carried out cyber attacks on Visa, MasterCard, PayPal and Amazon, and have threatened to take down Facebook and Twitter servers.
Although it is not formerly affiliated with it, the group has connections with the lesser-known hacking group LulzSec.
LulzSec, short for Lulz Security, is an offshoot of Anonymous and some members have been parts of both collectives .
LulzSec is an elite computer hacker group that has claimed responsibility for several high-profile, debilitating cyber attacks.
Their big hits include the compromising of user account data from Sony Pictures and taking the CIA website offline.
They also attacked Fox.com, leaking the names of more than 7,000 X Factor contestants, and the PBS Newshour website, where they posted a story claiming that slain killer Tupac was still living and in New Zealand.
The group aims to cause mayhem as well as manipulate flaws in security and passwords systems.
CANDY....(gift from Anonymous-Rxdzz)
Download link
extabit
megashare
minus
minus
uploadany
ziddu
HOW TO GET THE CANDY ONCE YOU HAVE DOWNLOADED THE FILE
first check the file MD5:
e7d0984f7bb632ee19d8dda1337e9fba
(lol yes, a "1337" there for the lulz, God is in the detail)
then decrypt the file using openssl:
openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz
password is:
antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6
then uncompress:
tar -xvzf decryptedfile.tar.gz
and then check file integrity using the MD5 included in the password u used to
decrypt before:
579d8c28d34af73fea4354f5386a06a6
^ yeah that one.
if everything looks fine
then perhaps it is.
enjoy it!
there you have. 1,000,001 Apple Devices UDIDs linking to their users and their
APNS tokens.
the original file contained around 12,000,000 devices. we decided a million would be
enough to release.
we trimmed out other personal data as, full names, cell numbers, addresses,
zipcodes, etc.
not all devices have the same amount of personal data linked. some devices
contained lot of info.
others no more than zipcodes or almost anything. we left those main columns we
consider enough to help a significant amount of users to look if their devices
are listed there or not. the DevTokens are included for those mobile hackers
who could figure out some use from the dataset.
file contains details to identify Apple devices.
ordered by:
Apple Device UDID, Apple Push Notification Service DevToken, Device Name,
Device Type.
We never liked the concept of UDIDs since the beginning indeed.
Really bad decision from Apple.
fishy thingie.
Download link
extabit
megashare
minus
minus
uploadany
ziddu
HOW TO GET THE CANDY ONCE YOU HAVE DOWNLOADED THE FILE
first check the file MD5:
e7d0984f7bb632ee19d8dda1337e9fba
(lol yes, a "1337" there for the lulz, God is in the detail)
then decrypt the file using openssl:
openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz
password is:
antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6
then uncompress:
tar -xvzf decryptedfile.tar.gz
and then check file integrity using the MD5 included in the password u used to
decrypt before:
579d8c28d34af73fea4354f5386a06a6
^ yeah that one.
if everything looks fine
then perhaps it is.
enjoy it!
there you have. 1,000,001 Apple Devices UDIDs linking to their users and their
APNS tokens.
the original file contained around 12,000,000 devices. we decided a million would be
enough to release.
we trimmed out other personal data as, full names, cell numbers, addresses,
zipcodes, etc.
not all devices have the same amount of personal data linked. some devices
contained lot of info.
others no more than zipcodes or almost anything. we left those main columns we
consider enough to help a significant amount of users to look if their devices
are listed there or not. the DevTokens are included for those mobile hackers
who could figure out some use from the dataset.
file contains details to identify Apple devices.
ordered by:
Apple Device UDID, Apple Push Notification Service DevToken, Device Name,
Device Type.
We never liked the concept of UDIDs since the beginning indeed.
Really bad decision from Apple.
fishy thingie.
Tidak ada komentar:
Posting Komentar