12:48 PM
Connect Directly

Anonymous Continues Barrage Of Government Hacks

Hacktivist group Anonymous continues string of cyber attacks on governments worldwide, with attacks on China, Tunisia, Uganda, and the United Kingdom in the last few weeks.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
In the wake of a continuing series of reports of cyber attacks by the Anonymous hacking group against China, the Chinese government admitted Thursday that it had indeed recently fallen prey to those attacks.

Anonymous supporters also claimed to attack Ugandan government websites over the weekend, and said that they planned to begin attacks on United Kingdom government servers. Anonymous also claimed to have hacked the Tunisian prime minister's private email account, and released what it said was his email archive to the Web. The hackers' collective has targeted numerous governments in recent months, including U.S. federal agencies, NATO, and the Israeli government.

As for China, hackers have in the past few weeks defaced websites with messages calling China's government "evil" and warning Chinese Internet users to be "careful" because their "government has been in control of [the] network and filters harmful things."

The attacks have continued in recent days. Over the weekend, the recently launched Twitter handle @AnonymousChina announced the hacking of numerous additional Chinese websites, posting data dumps to Pastebin and Pastebay from alleged Chinese government servers. The @AnonymousChina account also announced its intention to take down Chinese censorship technology.

[ See Anonymous Vs. DNS System: Lessons For Enterprise IT. ]

Anonymous has claimed that its attacks have been in pursuit of Internet freedom. "All these years the Chinese Government has subjected their people to unfair laws and unhealthy processes," stated a recent Pastebin post attributed to the group. "People, each of you suffers from tyranny of that regime. Fight for justice, fight for freedom, fight for democracy."

In a press conference Thursday, Chinese Ministry of Foreign Affairs spokesman Hong Lei admitted that the Chinese government has fallen "victim to Internet hacker attacks," according to a transcript of his remarks.

The so-called Great Firewall of China blocks content that it labels subversive, and China has aggressively pursued online dissidents for years. Within the last few weeks, China's official state-run news service has reported that the country temporarily suspended comments on popular microblogging websites QQ and Weibo, shuttered 16 websites, and arrested six people for spreading rumors online.

However, in response to a question about the attacks, Lei claimed that "China's Internet is open," that Chinese Internet users "enjoy full freedom on the Internet," and that the large number of Chinese Internet users demonstrates the "openness of the Chinese Internet."

The Tunisian emails appear to include months' worth of emails in French and Arabic, including emails about political activity in the country. Anonymous claimed that the cache also includes bank transaction records and invoices from year's Tunisian election campaign.

In the United Kingdom, meanwhile, the government's Home Office website was offline for several hours on Saturday, and Anonymous claimed responsibility.

Secure Sockets Layer isn't perfect, but there are ways to optimize it. The new Web Encryption That Works supplement from Dark Reading shows four places to start. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio