Preska had already imposed a protective order preventing the release of the countries’ names, which were in Hammond’s statement and in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering the names be redacted.
“While he billed himself as fighting for an anarchist cause, in reality, Jeremy Hammond caused personal and financial chaos for individuals whose identities and money he took and for companies whose businesses he decided he didn’t like,” USA Preet Bharara said in a May statement.
"After Stratfor, I continued to break into other targets, using a powerful “zero day exploit” allowing me admin access to systems running the popular Plesk webhosting platform. Sabu asked me many times for access to this exploit, which I refused to give him."
Sabu continued to supply me w/ lists of vulnerable targets. I broke into numerous websites he supplied, uploaded the stolen email accounts & databases onto Sabu’s FBI server, and handed over passwords and backdoors.
These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of XXXXXXX, XXXXXXXX, XXXX, XXXXXX, XXXXX, XXXXXXXX, XXXXXXX and the XXXXXX XXXXXXX.
[
Letter counts for each listed country:
7 = Austria?
8 = Anguilla?
4 = Iran
6 = Turkey
5 = Italy?
8 = Zimbabwe?
7 = Tunisia?
6 7 = United Kingdom?
Other countries AntiSec hacked:
Brazil, Australia, Columbia
]
In one instance, Sabu & I provided access info to hackers who went on to deface and destroy many government websites in XXXXXX. I don’t know how other info I provided to him may have been used, but I think the government’s collection and use of this data needs to be investigated
28 June 2011
AntiSec posted govt files that appeared to include passwords for several sites associated with the Brazilian government as well as contents of databases belonging to the governments of Australia, Anguilla and Zimbabwe.
It also posted what it said were 2,800 names of members of the right-wing Columbian Black Eagles Special Police Unit.
LulzSec has taken a special interest in Brazil. A key member known as Sabu has opposed censorship there, and the group has a Brazilian offshoot.
7 July 2011
Hacker group Anonymous said late Wednesday that its Antisec movement hacked and defaced Turkish government websites, in protest against new Internet filtering rules that come into force in the country in August.
Hacktivists have posted "secret docs" stolen from an Italian cybercrime unit.
The docs (8GB) were extracted from a system maintained by the Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche (CNAIPIC),
Some of LulzSec's targets included Sony, Nintendo, News Corp., Bethesda Game Studios, the CIA, the FBI, the Arizona State Police and the U.K.'s Serious Organised Crime Agency (SOCA).
10 Oct 2011
The hacker who styles himself "Sabu", erstwhile leader of the LulzSec hacking crew, claims to have a cache of emails copied from the Sun which are being stored on a Chinese server, along with data from a number of other hacks.
In an IRC conversation with Hardcore Charlie, Kaspersky said that he claimed to have cracked cryptographic hashes on the credentials of 100k's of sina[.]com email accounts with the help of another hacker,
who goes by the name of Yama Tough and who is thought to have been involved in the distribution of documents suggesting that the Indian government had put in monitoring systems for Nokia, RIM and Apple smartphones.
On June 25, 2016 at 21:45 UTC DNS root name servers began receiving a high rate of TCP SYN packets in what looks very much like a SYN flood attack, as well as ICMP packets. These packets continued until approximately June 26 00:41 UTC.
All DNS root name server letters received this traffic. DNS root name servers that use IP anycast observed this traffic at a majority of anycast sites.
The source addresses of these particular queries appear to be randomized and distributed throughout the IPv4 address space.
Georgia Tech launches the Cybersecurity Leadership Program – a new effort to educate the C-suite about how to fortify their enterprise and protect data
Dimitri Alperovitch, Georgia Tech alum (MS INFO ’03), co-founder & chief technology officer, CrowdStrike Inc.
Georgia Tech professor Manos Antonakakis
Teresa Shea, exec VP & Dir of Cyber Reboot, In-Q-Tel & former director of Signals Intelligence at the National Security Agency
Ret. Admiral James A. Winnefeld, Jr., frmr vice chair of the Joint Chiefs of Staff & Prof of practice in Georgia Tech’s School of International Affairs
DoJ has secretly filed criminal charges against the WikiLeaks founder, Julian Assange, a person familiar with the case said, a drastic escalation of the government’s yearslong battle with him and his anti-secrecy group.
Top DoJ officials told prosecutors over the summer that they could start drafting a complaint against Assange, current and former LEOs said. The charges came to light late Thursday through an unrelated court filing in which prosecutors inadvertently mentioned them.
“The court filing was made in error,” said Joshua Stueve, a spokesman for the United States attorney’s office for the Eastern District of Virginia. “That was not the intended name for this filing.”
On a wall of fame for stars of the Chinese company were several former employees of Nortel, the Canadian telecommunications giant that suffered a spectacular collapse a decade ago.
“These are (now) Huawei employees associated with great tech accomplishments … & I recognized so many of them,” said Calof, a U. of Ottawa business prof visiting the site w/ MBA students. “At one level you’re proud to be a Canadian, at the same time you’re upset to be Canadian”
The ex-Nortel engineers’ place of honour in Shenzhen underscores how the two companies’ fortunes unfurled for years in striking parallel, and yet with starkly different outcomes.
The defense contractor investigated in 2012 after cellphone videos surfaced of its employees drunk and high on drugs in Afghanistan may have misused almost $135 million of U.S. taxpayer money, an audit finds.
A financial audit done on behalf of the independent Special Inspector General for Afghanistan Reconstruction (SIGAR) alleges Imperatis Corp, formerly Jorge Scientific Corp, couldn’t produce docs to show payments to a subcontractor were allowed under its contract w/ the Army
The IG report, released in April, said either Imperatis should produce the appropriate documents “to demonstrate that the costs invoiced and paid were allowable…” or refund the money to government.