Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/9/2017
10:30 AM
Connect Directly
Twitter
RSS
E-Mail

When Hackers Hack Hackers

Notable cases of internecine cyber squabbles.
3 of 9

Peace Hacks w0rm

Well known in Dark Web marketplaces, a cybercriminal by the handle of Peace_of_Mind got fed up with w0rm's antics. Apparently the Monopoly attack was far from an outlier. Peace claimed that w0rm had been stealing zero-days from certain forums and posting them as his own. What's more, he was irritated at w0rm for blowing the lid off vulnerabilities Peace was using to maintain access to compromised websites and for scamming people Peace knew. In retribution, Peace engaged in some good ol' fashioned cybervandalism, taking the digital spray paint to the website w0rm used to publish proof-of-concept codes and dump data breached from high profile attacks against targets like Wall Street Journal, Vice, and CNET.

Image Source: Adobe Stock

3 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
mikeroch
100%
0%
mikeroch,
User Rank: Apprentice
2/15/2017 | 8:13:56 AM
Re: More Interesting than a Standard Exploit 192.168.1.1
Hello sir, I am absolutely agree with your saying, it is the stuff that shows human tendency, the rivalry between hackers and a piece of show off can also lead to such happenings, where hackers hack hackers.
alphaa10
100%
0%
alphaa10,
User Rank: Strategist
2/11/2017 | 6:48:41 AM
More Interesting than a Standard Exploit Story
As expected, hacker warfare demonstrates only the human tendency for turf-building and defense. What should be great consolation to civilians already hit by hackers is realization even the worst criminal operators are vulnerable, at some point, to some degree. All it takes is a persistent probe, and the rest is literally to worm through the defense perimenter.

The security story of the decade is the massive array of national resources around the world now devoted to state actor exploits-- both leading them and defending against them. By no accident, the NSA just expanded facilities with an architectural antitheis to its inscrutably dark monolith of a building in DC. The new NSA complex, located in the Utah desert, and entirely reflective white, is a virtual black hole for the world's data.

This article is a fresh perspective, but its tedious slide show format should be outlawed. When we readers see the tell-tale slide navigation controls, we already have been negatively conditioned by other slide shows. The fact we read the story, anyway, means your actual reader interest might double with a normal, single "page" article. (Yes, of course, we promise to read and click each ad-- just set them aside for us in a corner.)

Appreciate the links-- that saves us rediscovery, and a lot of time. Besides, DR sometimes offers a unique, gem of a link to richer material-- which is actually likely, since there is simply too much of the stuff to read with the same depth of attention.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Data Loss Spikes Under COVID-19 Lockdowns
Seth Rosenblatt, Contributing Writer,  5/28/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13777
PUBLISHED: 2020-06-04
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TL...
CVE-2020-10548
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10549
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10546
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CVE-2020-10547
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.