Attacks/Breaches
2/6/2012
12:17 PM
100%
0%

Who Is Anonymous: 10 Key Facts

Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.
Previous
1 of 10
Next


The Anonymous "hacktivist" collective, known as much for its self-branding as its anything-goes, anti-authoritarian sense of online comeuppance, first came to public attention in January 2008. The occasion was an internal Scientology video starring Tom Cruise, which had been leaked to YouTube. The church, saying that the video was copyrighted, requested that YouTube remove it. Members of Anonymous, however, took issue with that request, and as part of what it dubbed "Project Chanology," reportedly began launching distributed denial-of-service (DDoS) attacks against Scientology websites, blanketing church centers with prank phone calls and faxes, and "doxing" the church by releasing its sensitive documents into the public domain, for example via peer-to-peer networks.

On January 21, 2008, a YouTube post set the template for future Anonymous proclamations. The video, in this case criticizing the Church of Scientology, includes the now-common Anonymous sign-off: "Knowledge is free. We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us." By the next month, Anonymous claimed that 7,000 people had staged protested outside of Scientology centers around the world, many of them sporting the now-famous, black-and-white Guy Fawkes mask, as worn by the protagonist of the film V for Vendetta to hide his identity. (Notably, in the film, the masses also wore it as they rose up to help overthrow the ruling dictatorship.)

By early 2008, Anonymous--which reportedly grew out of the anarchic 4chan imageboard website--was already pursuing online attacks as a form of nonviolent protest. By 2010, it was launching regular DDoS attacks against pro-copyright websites.

But the group really came to public prominence during its defense of WikiLeaks and its charismatic--if reportedly mercurial--leader, Julian Assange. WikiLeaks, of course, came under fire from the U.S. government after the site obtained video footage from a U.S. helicopter strike in Iraq that killed two Reuters employees, as well as two children. Next, Assange began to coordinate--together with major newspapers in multiple countries--the release of hundreds of thousands of secret U.S. government cables beginning in December 2010.

The government-orchestrated reaction was swift. PayPal and credit-card processors MasterCard and Visa blocked payments to WikiLeaks, which relied on donations to lease server space and pay staff. There's a short lifespan for a whistle-blowing website that can't remain online.

In response, Anonymous mobilized, unleashing its so-called Low Orbit Ion Cannon (LOIC) tool, with which anyone could participate in Anonymous DDoS attacks by lobbing packets at designated website. From there, meanwhile, Anonymous expanded its focus, and backed by what appear to be numerous international chapters, has tackled everything from cartels in Mexico and child pornography file-sharing sites, to takedowns of Israeli government servers and U.S. law enforcement agencies.

Keep reading for a closer look at the group, its offspring organizations, and its infamous hacks. Photo: Anonymous Hollywood Scientology protest, by Jason Scragz, Flickr. Used with permission via a Creative Commons license.

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
rjones2818
50%
50%
rjones2818,
User Rank: Strategist
5/22/2012 | 7:05:52 PM
re: Who Is Anonymous: 10 Key Facts
Interesting article. The Guy Fawkes mask idea is from the graphic novel for 'V for Vendetta' by Alan Moore and David Lloyd.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.