Law Enforcement Agencies are taking their revenge against the Hacktivists who mostly targeted them during the last months. In a deadly and unexpected sequence, the last 40 days have seen the heads of three infamous hacking crews falling under the blows of FBI and Scotland Yard.
One after the other, the key members of LulzSec, CabinCr3w and Team Poison have been arrested and in all but one case (that is the arrest of the alleged members of Team P0ison for which no details are known so far), the events have unveiled some surprises and unexpected details. Moreover, at least three arrests have been possible since the hackers left behind them a trail of mistakes which allowed the investigators to connect the dots and link their twitter accounts to their real identities.
The following table depicts the facts which may be better summarized from the Criminal Complaints which are reported below for:
As you may notice, in two cases, W0rmer and ItsKahuna, the hackers were betrayed by two familiar technologies which are commonly considered dangerous for users’ privacy and identity: social networks and mobile devices. Sabu was the one who really did a “technical mistake” by connecting to an IRC without protecting his IP address with TOR.
Interesting to say is also the different approach of FBI and Scotland Yard. Once discovered the real identities of the hackers the Feds tried to “enroll” them as informants, at least in one case (Sabu) this strategy was winning. At the opposite the Britons immediately caught the alleged culprits without giving any detail about their identity, maybe hoping the arrest could act as a deterrent for the other hackers. Apparently it looks like this latter strategy was not completely successful since the CabinCr3w survivors are threatening authorities, inviting other Blackhats to join them for the revenge.
Last but not least, I cannot help but notice the tweet below for which I remember to have been particularly impressed when I first saw it since, at that time, I considered it a too much imprudent. Consequently I was not that surprised when I saw it quoted in the Criminal Complaint.
Neighbors thank you for having WEP on your router and amazing dl speeds, im quite enjoying it atm—
Kahuna (@ItsKahuna) January 29, 2012
At the end we are becoming more and more familiar with mobile phones and Social Network, so familiar to forget their level of intrusiveness and the related dangers for our privacy. As an example try to verify how many of you and your friend toggle Geo-Tagging off from their phone cameras. (Un)fortunately, it looks like not even the bad guys are immune from this.
- 489,330 hits since November 2010
08/13/2011 - My Post on Android Malware Mentioned on Engadget.
04/14/2011 - The Article Smart Grid: L'ultima Frontiera del Cybercrime published on ICT Security Magazine May 2011.
03/14/2011 - Security Summit 2011: Paolo Passeri guest at Round Table "Mobile Security: Rischi, Tecnologie, Mercato"
02/14/2011 - The Article Gears of Cyberwar published on ICT Security Magazine January 2011.
About This Blog
In this blog I express my personal opinion, which does not necessarily reflects the opinion of my organization, about events and news or interest, concerning information security, winking to mobile world and, why not, to some curious personal event.
Every information is reported with its source.
Anyone intending to use information contained in my post is free to do so, provided that mention my blog in your article.
Top Posts & Pages
- List Of Hacked Celebrities Who Had (Nude) Photos Leaked
- 2013 Cyber Attacks Timeline Master Index
- 2012 Cyber Attacks Statistics
- 2012 Cyber Attacks Timeline Master Index
- 15-31 May 2013 Cyber Attacks Timeline
- March 2013 Cyber Attacks Statistics
- 2013 Cyber Attacks Master Index
- May 2013 Cyber Attacks Statistics
- A (Graphical) World of Botnets and Cyber Attacks
- 1-15 May 2013 Cyber Attacks Timeline
- @taosecurity @Mandiant Sure, could I have more details? - 1 week ago
- 2013 Cyber Attacks Master Index wp.me/p14J6X-2q5 - 1 week ago
- Edward Snowden: the whistleblower behind revelations of NSA surveillance gu.com/p/3gec7/tw via @guardian - 1 week ago
- May 2013 Cyber Attacks Statistics lnkd.in/FFm8cN - 1 week ago
- May 2013 Cyber Attacks Statistics hackmageddon.com/2013/06/09/may… #Infosec #Cybercrime - 1 week ago
- Domino’s Pizza testing pizza-delivering drones fxn.ws/10NTX38 via @hushedfeet - 2 weeks ago
- Hard Work during the WE to post in time the May 2013 Cyber Attacks TImeline lnkd.in/BABPvC I'm abusing of my wife's patience :) - 2 weeks ago
- 15-31 May 2013 Cyber Attacks Timeline wp.me/p14J6X-2pl - 2 weeks ago
- RT @teamcymru: 30million 'wi-fi' credit cards can be plundered by cyber identity thieves exploiting contactless payment technology http://t… - 2 weeks ago