comScore

antisec

  1. Tech

    Blue Toad Claims AntiSec’s Leaked Apple UDIDs Are From Them

    Remember those Apple UDIDs leaked by AntiSec last week? A publishing firm known as Blue Toad has come forward saying that the million leaked by the anonymous collective was actually stolen from their database. After some rudimentary checking, Blue Toad found that the data released had a 98% correlation with their own.

    Read on...
  2. Tech

    FBI to AntiSec: Man, We Never Even Met That File

    Earlier today, we reported that hacker group AntiSec had celebrated their Labor Day weekend in the traditional manner: with a barbecue, followed by releasing more than one million (1,000,001, to be precise) identification numbers for Apple products like iPhones and iPads into the wild. The hacker group claimed to have gathered these from a hacked laptop belonging to an FBI agent, but the FBI is now crying foul, claiming they have no idea what file AntiSec is talking about and stating that wherever they got it, it wasn't from the FBI.

    Read on...
  3. Tech

    AntiSec Leaks 1,000,001 Apple UDIDs Obtained From FBI Laptop

    In what looks to be one of the worst privacy disasters yet, the hacking collective known as AntiSec has released a list of 1,000,001 Apple Unique Device Identifiers (UDIDs) that they've allegedly obtained from an FBI breach. This is supposedly from a much larger cache of 12 million UDIDs that the group managed to purloin during their raid. Not only did the files include the UDIDs, but many of these had other identifying information attached, such as usernames, cell phone numbers, and addresses. Lovely.

    Read on...
  4. Tech

    Anonymous Hack Security Consulting Firm, Leak 90,000 Accounts

    Anonymous' latest hack and part of the #antisec project, dubbed Military Meltdown Monday, has compromised some 90,000 accounts belonging to military personnel. The actual target of the attack, Booz Allen Hamilton, a security consulting firm, had the data as a result of the consulting they'd been doing, so while the leak involves military information, no government entity was hacked. Still, it can't feel good for Booz Allen Hamilton, an established security firm, to lose so much private information to a faceless, unorganized hacker group that went so far as to throw a little salt in the wound, saying that Hamilton had "basically...no security measures in place." While this leak looks extremely serious at face value (it includes the words "military", numbers that are over 9000 and seems like it could pertain to national security) it's questionable as to whether or not this hack is anything more than embarrassing and inconvenient. Anonymous claims to have uncovered "treasure chests buried on the islands of government agencies" that will keep their "blackhat friends busy for a while." That being said, the real meat of this leak is login information and although I wasn't able to dig up much information in the way of military security protocol (go figure), it seems to me that a significant part of any military security system that is not boneheadedly simplistic would involve a second form of identification, something physical, like a smart card or a retinal/fingerprint scanner. You know, the reasons you have to capture people alive in order to progress in Splinter Cell. We've yet to see what the blackhat friends might metaphorically dig up on those metaphorical islands, but for now the leak, while mortifying, is probably more of an inconvenience than a national security disaster. (via Gizmodo)

    Read on...
  5. Tech

    After 50 Days, Lulzsec Sails Into the Sunset

    Fifty days since the hacker group Lulzsec burst onto the scene by hacking the X-Factor website, the notorious group has announced that the so-called "Lulz boat" will cease to be. The announcement was posted on Pastebin and through their Twitter account, in keeping with the group's habits. In addition to their press statement, the group also delivered their final data dump. Their final message was more reflective and somber than previous announcements made by the group. In it they recount their exploits, encourage those that have supported them during the past 50 days to continue AntiSec activities, and even mention that the core group consists of six people. While many have speculated about the group's goals and motivations, their final statement suggests that they did it for more than just "the lulz." They write, "we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz." In what may be its final message, Lulzsec pointed their fans toward the hacker group Anonymous in a tweet. While this could be the end of Lulzsec, it's clear that they intend their movement to continue. Read on for the full text of the statement.

    Read on...
  6. Tech

    Report: Lulzsec Steals UK Census Data, One Member Arrested UPDATED

    UPDATE: Lulzsec is now saying that they were unaware of any UK Census attack, and equally unaware of any arrests. More updates follow orginal story below. Last night a post appeared on Pastebin attributed to the hacker group Lulzsec claiming that they had stolen the entirety of the 2011 UK Census data. Shortly thereafter, news outlets began reporting that UK police had taken 19-year old into custody, whom  is reportedly related to the hacker group. From Pastebin:

    Greetings Internets, We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release) Myself and the rest of my Lulz shipmates will then embark upon a trip to ThePirateBay with our beautiful records for your viewing pleasure!
    Unlike previous attacks, the UK Census claim was not accompanied by any announcement over Lulzsec's Twitter feed, which has been the primary mouthpiece of the organization. 

    Read on...
  7. Tech

    LulzSec Launch Decentralized AntiSec Initiative, Hack More Things

    In the past couple of days LulzSec has been up to, well, a lot. After snagging and releasing 62,000 passwords last Thursday, LulzSec celebrated its 1000th twitter post with a mission statement of sorts, calling attention to the fact that they don't need to be bragging about all the targets they've hit and touching on their motivations for doing so. Their 1000th post statement says:
    Do you think every hacker announces everything they've hacked? We certainly haven't, and we're damn sure others are playing the silent game. Do you feel safe with your Facebook accounts, your Google Mail accounts, your Skype accounts? What makes you think a hacker isn't silently sitting inside all of these right now, sniping out individual people, or perhaps selling them off? You are a peon to these people. A toy. A string of characters with a value.This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn't released something publicly.

    Read on...
© 2014 Geekosystem, LLC   |   About UsAdvertiseNewsletterJobsPrivacyUser AgreementDisclaimerContactArchives RSS

Dan Abrams, Founder