The CIA website reportedly remained inaccessible several hours after the attack, then appeared to be offline intermittently for the rest of the weekend, as well as on Monday, in the face of what appeared to be a distributed denial of service (DDoS) attack. Anonymous had previously been making a habit of targeting the FBI on Fridays.
The CIA has acknowledged that it's been having website issues, but hasn't publicly commented on the cause. Interestingly, it's not clear if Anonymous was indeed responsible. "We'd remind media that if we report a hack or ddos attack, it doesn't necessarily mean we did it...FYI," according to a tweet from YourAnonNews, which is a reliable source of information about Anonymous activities.
[ Worried? Check out 10 Strategies To Fight Anonymous DDoS Attacks. ]
Saturday, hackers announced via Pastebin--with a shout-out to Anonymous and AntiSec--that they'd hacked the U.S. Census Bureau, and they listed the names of stolen database tables. The same day, the website of Interpol was also knocked offline, although the attack wasn't the work of Anonymous. Instead, via a Pastebin post, a group known as Black Tuesday (tagline: "We'r revolution of your mind!) claimed credit.
"We'r not Anonymous! Stop calling us a part of them:[ Yeap, we support their ideas, but we have own ideas at all!" according to a Twitter post made by the group.
Regardless, members of Anonymous have been busy. As part of the Anonymous anti-law enforcement effort AntiSec, the group released Friday what it said were 730 MB of emails plus a database of information from Mexico's Chamber of Mines, aka "Camimex." In a Pastebin post, "AnonMex" said the attack was in retaliation for mining syndicates working in parts of Mexico without consulting with the indigenous population.
Last week, pro-Anonymous hackers CabinCr3w and w0rmer hit the Texas Department of Public Safety, and detailed what they'd stolen, which included contact information for training centers. The hackers also released what it said were two Excel spreadsheets allegedly stolen in the attack. While one appeared to contain non-sensitive training center contact information, the other appeared to be a dummy file used to disguise a known piece of spyware called "BadSRC."
The same two hackers last week also launched an attack against the Alabama Department of Public Safety, and released seven spreadsheets containing information on sex offenders as well as victims, as well as a database of vehicle information for offenders.
Much of that information, however, was redacted. "Inspection of the spreadsheets indicates that no names were dumped, but it might be possible to recognize particular cases of child sexual abuse or rape by the dates of the arrests and the description of the crime and victim's age if a case had been reported in the media or occurred in a small town," said Databreaches.net. "Similarly, while offenders' names were not included in the data dump, their vehicle information and license plate number were. It's not clear whether the hackers also acquired other files or databases that would enable identification of what appear to be unique IDs."
In another attack, CabinCr3w and w0rmer, as well as another hacker known as Kahuna, hacked into a website for the Mobile, Ala. police department, to protest "recent racist legislation," according to the Pastebay post announcing the attack. "Because of your police being lazy when it comes to data security, we have acquired the following information of over 46,000 citizens of the state of Alabama," said the attackers.
The stolen data included people's full legal names, social security numbers, birth dates, and criminal records. But the hackers involved told Databreaches.net that they'd purposefully chosen to release only a redacted subset of the data they'd obtained, and then deleted all of the data.
Hacks of Comodo and DigiNotar exposed weakness in the Secure Sockets Layer protocol. The new Dark Reading supplement shows you what's being done to fix it. (Free registration required.)