Quantcast

Police Equipment Supplier, Antivirus Company Latest Anonymous Targets

March 9, 2012

In continued retaliation for FBI arrests of five LulzSec members earlier this week, hackers affiliated with Anonymous have attacked a law enforcement website and released additional source code previously obtained from the publishers of the Norton Antivirus line of products.

PCMag‘s Sara Yin, the Friday attacks were carried out by members of AntiSec — a cybercrime collective originally co-founded by members of LulzSec and Anonymous — and were the group’s latest acts of retribution following the arrests of five individuals affiliated with the movement in the UK, Ireland, New York, and Chicago.

One of the victim’s of Friday’s hacking activity was New York Ironworks, who Jaikumar Vijayan of Computerworld describes as “a supplier of police equipment and tactical gear” operating out of New York City. Vijayan said that their main website had been “defaced with a rambling message from AntiSec,” adding that the message “expressed support for those who were arrested and anger” at a fellow hacker who is now working with the FBI.

As previously reported here on RedOrbit, that individual is former LulzSec leader Hector Xavier Monsegur, better known by the pseudonym “Sabu.” Monsegur, who according to SlashGear‘s Ben Kersey was arrested in June 2011, is said to have played an instrumental role in the arrests of those five LulzSec members on March 6.

The message posted to the New York Ironwork’s homepage called the attack a “tribute to Jeremy Hammond,” the LulzSec member arrested in Chicago on Monday and one of the men responsible for the attack on the intelligence firm Stratfor on December 25 last year, both Computerworld and BBC News are reporting.

He is facing up to 20 years in prison for stealing the credit card data of 60,000 Stratfor customers and the account information of more than 800,000 of them, Vijayan added.

BBC News also reported that the message said that AntiSec would vow to “fight till the end.” Yin added that they dedicated the post “to our fallen brothers,” that their word “has not been forgotten,” and that “AntiSec is still alive and well.” They also “released hundreds of usernames and passwords, as well as logs indicating the group had gained root access to the website, allowing them to deface the website,” Kersey of Slashgear wrote.

Also on Friday, the organization released a 1.05 GB torrent that contained source code for Symantec’s Norton AntiVirus 2006, along with a note demanding the release of the arrested hackers, Yin said. In February, Anonymous published six-year-old source code from another Symantec product, their pcAnywhere productivity software. The company said at the time that current users should not be effected, but nonetheless recommended that the application should be disabled.

Symantec told the BBC that they had expected the move, and that current Norton users are not at risk.

On Tuesday, a website belonging to antivirus software and Internet security firm Panda Security had also been targeted in retaliation for the arrests. The malware website of Panda Labs was reportedly targeted by the group because Anonymous claimed that they had helped law enforcement officials in the sting operation — accusations which company officials denied in comments made to BBC News earlier this week.

Joss Wright, a research fellow at the Oxford Internet Institute, told the British news organization that the long-term ramifications of this week’s arrest would be.

“The FBI has achieved symbolic victory, but the Anonymous group in its widest sense includes a lot of people, most of who remain unknown,” he said. “We can see that they are threatening more attacks on Fridays and the movement is likely to carry on. But the question is whether any potential leaders — those who help achieve the big hits by dedicating a lot of time and skill — have been scared away.”

On the Net:


Source: RedOrbit Staff & Wire Reports



comments powered by Disqus