Attacks/Breaches
2/13/2012
12:23 PM
50%
50%

CIA Website Hacked, Struggles To Recover

Anonymous and other hacktivists also left their marks on the U.S. Census Bureau, Interpol, and Mexico, as well as law enforcement websites in Alabama and Texas.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
An Anonymous-related Twitter channel claimed Friday that the group had successfully taken down the CIA's public-facing website.

The CIA website reportedly remained inaccessible several hours after the attack, then appeared to be offline intermittently for the rest of the weekend, as well as on Monday, in the face of what appeared to be a distributed denial of service (DDoS) attack. Anonymous had previously been making a habit of targeting the FBI on Fridays.

The CIA has acknowledged that it's been having website issues, but hasn't publicly commented on the cause. Interestingly, it's not clear if Anonymous was indeed responsible. "We'd remind media that if we report a hack or ddos attack, it doesn't necessarily mean we did it...FYI," according to a tweet from YourAnonNews, which is a reliable source of information about Anonymous activities.

[ Worried? Check out 10 Strategies To Fight Anonymous DDoS Attacks. ]

Saturday, hackers announced via Pastebin--with a shout-out to Anonymous and AntiSec--that they'd hacked the U.S. Census Bureau, and they listed the names of stolen database tables. The same day, the website of Interpol was also knocked offline, although the attack wasn't the work of Anonymous. Instead, via a Pastebin post, a group known as Black Tuesday (tagline: "We'r revolution of your mind!) claimed credit.

"We'r not Anonymous! Stop calling us a part of them:[ Yeap, we support their ideas, but we have own ideas at all!" according to a Twitter post made by the group.

Regardless, members of Anonymous have been busy. As part of the Anonymous anti-law enforcement effort AntiSec, the group released Friday what it said were 730 MB of emails plus a database of information from Mexico's Chamber of Mines, aka "Camimex." In a Pastebin post, "AnonMex" said the attack was in retaliation for mining syndicates working in parts of Mexico without consulting with the indigenous population.

Last week, pro-Anonymous hackers CabinCr3w and w0rmer hit the Texas Department of Public Safety, and detailed what they'd stolen, which included contact information for training centers. The hackers also released what it said were two Excel spreadsheets allegedly stolen in the attack. While one appeared to contain non-sensitive training center contact information, the other appeared to be a dummy file used to disguise a known piece of spyware called "BadSRC."

The same two hackers last week also launched an attack against the Alabama Department of Public Safety, and released seven spreadsheets containing information on sex offenders as well as victims, as well as a database of vehicle information for offenders.

Much of that information, however, was redacted. "Inspection of the spreadsheets indicates that no names were dumped, but it might be possible to recognize particular cases of child sexual abuse or rape by the dates of the arrests and the description of the crime and victim's age if a case had been reported in the media or occurred in a small town," said Databreaches.net. "Similarly, while offenders' names were not included in the data dump, their vehicle information and license plate number were. It's not clear whether the hackers also acquired other files or databases that would enable identification of what appear to be unique IDs."

In another attack, CabinCr3w and w0rmer, as well as another hacker known as Kahuna, hacked into a website for the Mobile, Ala. police department, to protest "recent racist legislation," according to the Pastebay post announcing the attack. "Because of your police being lazy when it comes to data security, we have acquired the following information of over 46,000 citizens of the state of Alabama," said the attackers.

The stolen data included people's full legal names, social security numbers, birth dates, and criminal records. But the hackers involved told Databreaches.net that they'd purposefully chosen to release only a redacted subset of the data they'd obtained, and then deleted all of the data.

Hacks of Comodo and DigiNotar exposed weakness in the Secure Sockets Layer protocol. The new Dark Reading supplement shows you what's being done to fix it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?