Need help? Chat now!
Search results for:
A recent article published by NewsOK.com reports that "an informant_" working for the FBI in 2012 coordinated a "_campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil, and Pakistan." The article indicates that (according to documents and interviews with people involved in the attacks) the "informant_" was responsible for directing "_at least one hacker to extract vast amounts of data from the government servers of several countries and upload it to a server monitored by the FBI."
According to the report, the data extracted by the attackers while "exploiting a vulnerability in a popular web hosting software_"included "_bank records to login information\, "according to the_ report. Until recently, this event had been a massive secret – within "_closed sessions of a federal court in New York\, "according to the_ report. The article indicated that the now released court documents do not confirm if the Federal Bureau of Investigation ordered the attacks "_directly\, "but according to this_ report, it is suggested that the U.S. government may have "_used hackers to gather intelligence overseas even as investigators were trying to dismantle hacking groups like Anonymous and send computer activists away for lengthy prison terms."
The report states that Hector Xavier Monsegur, "a prominent hacker_" within the hacker group _Anonymous working under the Internet alias "Sabu\, "coordinated these attacks._
Monsegur had orchestrated "_a string of attacks on high-profile targets including PayPal and MasterCard\, "according to the_ article, and by early 2012 the FBI had arrested him and "_spent months working to help the bureau identify other members of Anonymous." The article continues to state that the details of this "campaign_" could be instrumental in offering continuing "_evidence that the U.S. government has exploited major flaws in Internet security – so-called "zero-day" vulnerabilities like the recent Heartbleed bug – for intelligence purposes."
Read more about these events in the complete article and hear comments from those involved detailing how the vulnerabilities were used to their advantage.
Written by Bryon Turcotte / April 25, 2014