15 Nov 2013

For months [June 2011 - March 2012?], Hammond claimed, Sabu guided him as he hacked the Stratfor website & 1000's more.

Before being cut off by Judge Preska, Hammond claimed that foreign government targets included Turkey, Brazil and Iran.

huffpost.com/entry/jeremy-h…
Preska had already imposed a protective order preventing the release of the countries’ names, which were in Hammond’s statement and in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering the names be redacted.
“While he billed himself as fighting for an anarchist cause, in reality, Jeremy Hammond caused personal and financial chaos for individuals whose identities and money he took and for companies whose businesses he decided he didn’t like,” USA Preet Bharara said in a May statement.
"After Stratfor, I continued to break into other targets, using a powerful “zero day exploit” allowing me admin access to systems running the popular Plesk webhosting platform. Sabu asked me many times for access to this exploit, which I refused to give him."
Sabu continued to supply me w/ lists of vulnerable targets. I broke into numerous websites he supplied, uploaded the stolen email accounts & databases onto Sabu’s FBI server, and handed over passwords and backdoors.
These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of XXXXXXX, XXXXXXXX, XXXX, XXXXXX, XXXXX, XXXXXXXX, XXXXXXX and the XXXXXX XXXXXXX.
[
Letter counts for each listed country:
7 = Austria?
8 = Anguilla?
4 = Iran
6 = Turkey
5 = Italy?
8 = Zimbabwe?
7 = Tunisia?
6 7 = United Kingdom?

Other countries AntiSec hacked:
Brazil, Australia, Columbia
]
In one instance, Sabu & I provided access info to hackers who went on to deface and destroy many government websites in XXXXXX. I don’t know how other info I provided to him may have been used, but I think the government’s collection and use of this data needs to be investigated
28 June 2011

AntiSec posted govt files that appeared to include passwords for several sites associated with the Brazilian government as well as contents of databases belonging to the governments of Australia, Anguilla and Zimbabwe.

bits.blogs.nytimes.com/2011/06/28/hac…
It also posted what it said were 2,800 names of members of the right-wing Columbian Black Eagles Special Police Unit.

LulzSec has taken a special interest in Brazil. A key member known as Sabu has opposed censorship there, and the group has a Brazilian offshoot.
7 July 2011

Hacker group Anonymous said late Wednesday that its Antisec movement hacked and defaced Turkish government websites, in protest against new Internet filtering rules that come into force in the country in August.

pcworld.com/article/487006…
25 July 2011

Hacktivists have posted "secret docs" stolen from an Italian cybercrime unit.

The docs (8GB) were extracted from a system maintained by the Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche (CNAIPIC),

theregister.com/2011/07/25/ita…
Data on private firms including Gazprom and Exxon Mobil as well as foreign governments also appears to be among the cache.
16 May 2013

Ryan Cleary AKA Viral, 21
Jake Davis AKA Topiary, 20
Ryan Ackroyd AKA Kayla, 26
Mustafa Al-Bassam AKA T-Flow, 18

networkworld.com/article/216636…
Some of LulzSec's targets included Sony, Nintendo, News Corp., Bethesda Game Studios, the CIA, the FBI, the Arizona State Police and the U.K.'s Serious Organised Crime Agency (SOCA).
10 Oct 2011

The hacker who styles himself "Sabu", erstwhile leader of the LulzSec hacking crew, claims to have a cache of emails copied from the Sun which are being stored on a Chinese server, along with data from a number of other hacks.

theguardian.com/technology/201…
26 April 2012

In an IRC conversation with Hardcore Charlie, Kaspersky said that he claimed to have cracked cryptographic hashes on the credentials of 100k's of sina[.]com email accounts with the help of another hacker,

theguardian.com/technology/201…
who goes by the name of Yama Tough and who is thought to have been involved in the distribution of documents suggesting that the Indian government had put in monitoring systems for Nokia, RIM and Apple smartphones.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Fisher Ames

Fisher Ames Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @nimkef

3 Nov
On 25 June 2016 all of the Internet Domain Name System's root name servers received a high rate of TCP SYN and ICMP traffic.

This event was large, noticeable via external monitoring systems, and fairly unique in nature

root-servers.org/news/events-of…
On June 25, 2016 at 21:45 UTC DNS root name servers began receiving a high rate of TCP SYN packets in what looks very much like a SYN flood attack, as well as ICMP packets. These packets continued until approximately June 26 00:41 UTC.
All DNS root name server letters received this traffic. DNS root name servers that use IP anycast observed this traffic at a majority of anycast sites.

The source addresses of these particular queries appear to be randomized and distributed throughout the IPv4 address space.
Read 4 tweets
1 Nov
25 July 2016
[interesting date]

Georgia Tech launches the Cybersecurity Leadership Program – a new effort to educate the C-suite about how to fortify their enterprise and protect data

pe.gatech.edu/blog/cybersecu…
Presenters and Faculty Include:

Dimitri Alperovitch, Georgia Tech alum (MS INFO ’03), co-founder & chief technology officer, CrowdStrike Inc.

Georgia Tech professor Manos Antonakakis
Teresa Shea, exec VP & Dir of Cyber Reboot, In-Q-Tel & former director of Signals Intelligence at the National Security Agency

Ret. Admiral James A. Winnefeld, Jr., frmr vice chair of the Joint Chiefs of Staff & Prof of practice in Georgia Tech’s School of International Affairs
Read 8 tweets
28 Sep
16 Nov 2018

DoJ has secretly filed criminal charges against the WikiLeaks founder, Julian Assange, a person familiar with the case said, a drastic escalation of the government’s yearslong battle with him and his anti-secrecy group.

H/T @themarketswork

nytimes.com/2018/11/16/us/…
Top DoJ officials told prosecutors over the summer that they could start drafting a complaint against Assange, current and former LEOs said. The charges came to light late Thursday through an unrelated court filing in which prosecutors inadvertently mentioned them.
“The court filing was made in error,” said Joshua Stueve, a spokesman for the United States attorney’s office for the Eastern District of Virginia. “That was not the intended name for this filing.”
Read 12 tweets
28 Sep
20 Feb 2020

On a wall of fame for stars of the Chinese company were several former employees of Nortel, the Canadian telecommunications giant that suffered a spectacular collapse a decade ago.

nationalpost.com/news/exclusive…
“These are (now) Huawei employees associated with great tech accomplishments … & I recognized so many of them,” said Calof, a U. of Ottawa business prof visiting the site w/ MBA students. “At one level you’re proud to be a Canadian, at the same time you’re upset to be Canadian”
The ex-Nortel engineers’ place of honour in Shenzhen underscores how the two companies’ fortunes unfurled for years in striking parallel, and yet with starkly different outcomes.
Read 70 tweets
24 Sep
Section 702: Overview

dni.gov/files/icotr/Se… Image
Section 702: Basics Image
Section 702: The Process Image
Read 10 tweets
24 Sep
13 May 2015

The defense contractor investigated in 2012 after cellphone videos surfaced of its employees drunk and high on drugs in Afghanistan may have misused almost $135 million of U.S. taxpayer money, an audit finds.

washingtonpost.com/blogs/in-the-l…
A financial audit done on behalf of the independent Special Inspector General for Afghanistan Reconstruction (SIGAR) alleges Imperatis Corp, formerly Jorge Scientific Corp, couldn’t produce docs to show payments to a subcontractor were allowed under its contract w/ the Army
The IG report, released in April, said either Imperatis should produce the appropriate documents “to demonstrate that the costs invoiced and paid were allowable…” or refund the money to government.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(