Attacks/Breaches
2/6/2012
12:17 PM
Connect Directly
RSS
E-Mail
50%
50%

Who Is Anonymous: 10 Key Facts

Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.
Previous
1 of 10
Next


The Anonymous "hacktivist" collective, known as much for its self-branding as its anything-goes, anti-authoritarian sense of online comeuppance, first came to public attention in January 2008. The occasion was an internal Scientology video starring Tom Cruise, which had been leaked to YouTube. The church, saying that the video was copyrighted, requested that YouTube remove it. Members of Anonymous, however, took issue with that request, and as part of what it dubbed "Project Chanology," reportedly began launching distributed denial-of-service (DDoS) attacks against Scientology websites, blanketing church centers with prank phone calls and faxes, and "doxing" the church by releasing its sensitive documents into the public domain, for example via peer-to-peer networks.

On January 21, 2008, a YouTube post set the template for future Anonymous proclamations. The video, in this case criticizing the Church of Scientology, includes the now-common Anonymous sign-off: "Knowledge is free. We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us." By the next month, Anonymous claimed that 7,000 people had staged protested outside of Scientology centers around the world, many of them sporting the now-famous, black-and-white Guy Fawkes mask, as worn by the protagonist of the film V for Vendetta to hide his identity. (Notably, in the film, the masses also wore it as they rose up to help overthrow the ruling dictatorship.)

By early 2008, Anonymous--which reportedly grew out of the anarchic 4chan imageboard website--was already pursuing online attacks as a form of nonviolent protest. By 2010, it was launching regular DDoS attacks against pro-copyright websites.

But the group really came to public prominence during its defense of WikiLeaks and its charismatic--if reportedly mercurial--leader, Julian Assange. WikiLeaks, of course, came under fire from the U.S. government after the site obtained video footage from a U.S. helicopter strike in Iraq that killed two Reuters employees, as well as two children. Next, Assange began to coordinate--together with major newspapers in multiple countries--the release of hundreds of thousands of secret U.S. government cables beginning in December 2010.

The government-orchestrated reaction was swift. PayPal and credit-card processors MasterCard and Visa blocked payments to WikiLeaks, which relied on donations to lease server space and pay staff. There's a short lifespan for a whistle-blowing website that can't remain online.

In response, Anonymous mobilized, unleashing its so-called Low Orbit Ion Cannon (LOIC) tool, with which anyone could participate in Anonymous DDoS attacks by lobbing packets at designated website. From there, meanwhile, Anonymous expanded its focus, and backed by what appear to be numerous international chapters, has tackled everything from cartels in Mexico and child pornography file-sharing sites, to takedowns of Israeli government servers and U.S. law enforcement agencies.

Keep reading for a closer look at the group, its offspring organizations, and its infamous hacks. Photo: Anonymous Hollywood Scientology protest, by Jason Scragz, Flickr. Used with permission via a Creative Commons license.

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rjones2818
50%
50%
rjones2818,
User Rank: Moderator
5/22/2012 | 7:05:52 PM
re: Who Is Anonymous: 10 Key Facts
Interesting article. The Guy Fawkes mask idea is from the graphic novel for 'V for Vendetta' by Alan Moore and David Lloyd.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio