Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

CIA Website Hacked, Struggles To Recover

Anonymous and other hacktivists also left their marks on the U.S. Census Bureau, Interpol, and Mexico, as well as law enforcement websites in Alabama and Texas.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
An Anonymous-related Twitter channel claimed Friday that the group had successfully taken down the CIA's public-facing website.

The CIA website reportedly remained inaccessible several hours after the attack, then appeared to be offline intermittently for the rest of the weekend, as well as on Monday, in the face of what appeared to be a distributed denial of service (DDoS) attack. Anonymous had previously been making a habit of targeting the FBI on Fridays.

The CIA has acknowledged that it's been having website issues, but hasn't publicly commented on the cause. Interestingly, it's not clear if Anonymous was indeed responsible. "We'd remind media that if we report a hack or ddos attack, it doesn't necessarily mean we did it...FYI," according to a tweet from YourAnonNews, which is a reliable source of information about Anonymous activities.

[ Worried? Check out 10 Strategies To Fight Anonymous DDoS Attacks. ]

Saturday, hackers announced via Pastebin--with a shout-out to Anonymous and AntiSec--that they'd hacked the U.S. Census Bureau, and they listed the names of stolen database tables. The same day, the website of Interpol was also knocked offline, although the attack wasn't the work of Anonymous. Instead, via a Pastebin post, a group known as Black Tuesday (tagline: "We'r revolution of your mind!) claimed credit.

"We'r not Anonymous! Stop calling us a part of them:[ Yeap, we support their ideas, but we have own ideas at all!" according to a Twitter post made by the group.

Regardless, members of Anonymous have been busy. As part of the Anonymous anti-law enforcement effort AntiSec, the group released Friday what it said were 730 MB of emails plus a database of information from Mexico's Chamber of Mines, aka "Camimex." In a Pastebin post, "AnonMex" said the attack was in retaliation for mining syndicates working in parts of Mexico without consulting with the indigenous population.

Last week, pro-Anonymous hackers CabinCr3w and w0rmer hit the Texas Department of Public Safety, and detailed what they'd stolen, which included contact information for training centers. The hackers also released what it said were two Excel spreadsheets allegedly stolen in the attack. While one appeared to contain non-sensitive training center contact information, the other appeared to be a dummy file used to disguise a known piece of spyware called "BadSRC."

The same two hackers last week also launched an attack against the Alabama Department of Public Safety, and released seven spreadsheets containing information on sex offenders as well as victims, as well as a database of vehicle information for offenders.

Much of that information, however, was redacted. "Inspection of the spreadsheets indicates that no names were dumped, but it might be possible to recognize particular cases of child sexual abuse or rape by the dates of the arrests and the description of the crime and victim's age if a case had been reported in the media or occurred in a small town," said Databreaches.net. "Similarly, while offenders' names were not included in the data dump, their vehicle information and license plate number were. It's not clear whether the hackers also acquired other files or databases that would enable identification of what appear to be unique IDs."

In another attack, CabinCr3w and w0rmer, as well as another hacker known as Kahuna, hacked into a website for the Mobile, Ala. police department, to protest "recent racist legislation," according to the Pastebay post announcing the attack. "Because of your police being lazy when it comes to data security, we have acquired the following information of over 46,000 citizens of the state of Alabama," said the attackers.

The stolen data included people's full legal names, social security numbers, birth dates, and criminal records. But the hackers involved told Databreaches.net that they'd purposefully chosen to release only a redacted subset of the data they'd obtained, and then deleted all of the data.

Hacks of Comodo and DigiNotar exposed weakness in the Secure Sockets Layer protocol. The new Dark Reading supplement shows you what's being done to fix it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CVE-2021-34067
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
CVE-2021-34068
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.