

1. Stop hacking Bangladeshi websites and stop all types of access to Bangladeshi Cyber Space completely... 2. Stop killing innocent Bangladeshi citizens at BD-India borders... 3. Stop Tipaimukh Dam... 4. Sign the "Teesta Water Sharing Treaty"... 5.Either stop broadcasting of Indian Media in Bangladesh or let Bangladeshi Media enter India... 6. Stop all Anti-Bangladesh activities of BSF and punish all offenders for their deeds against Bangladesh... 7. Last but not the least, India has to stop all activities which go against Bangladesh in any possible way...Peace is what we all want, war is never the solution !!
http://pastebin.com/KK8fwx7c http://pastebin.com/6rfNtPWT http://pastebin.com/GRwq5ASa According to BCA, '' WELL THIS IS THE DATA I COLLECTED FROM INDIAN FORUM IAS100. SOME OF THE PASSWORD ARE MASTER PASS FOR THEIR EMAIL AND FACEBOOK AND EVERY ONLINE ENTITY. This is not just IAS hack, this is more then that! because most of the people are using same login and passwords on different social networking websites specially orkut and facebook.Last week it was the same Bangladesh Cyber Army that hacked and defaced the Website of Indian High Commission in Singapore and sensitive data was leaked and posted online as the ongoing cyber war between Bangladesh and Indian hackers gets more heat.
The team was set up to "better safeguard the internet security of the armed forces. Internet security was an international problem, affecting civil and military areas. China is still "relatively weak" in internet security protection, and vulnerable to cyber-terrorism.A British intelligence analyst Glenmore Trenear-Harvey added his views on the issue by saying that:
The intelligence agencies of many countries believe that China has elite hacking team within the army for over 5 years. There can be "literally thousands" of hackers within China had been recruited to form a "botnet army", attacking from unsuspecting computers. They can then use this capability either to conduct a denial of service, taking down sites, or acting as a Trojan horse to get within computers and steal information. "As an offensive tool that is very much something the People's Liberation Army would do," he added. "This is not just conventional military powers. Put bluntly, everyone's at it. It is a game anyone can play. For example Japan has a formidable capacity and we have no idea what it is doing with it - and Singapore, Switzerland, Israel," Mr Inkster, who used to work in the British Secret Intelligence Service, warned.Mr Trenear-Harvey added:
It is one of the greatest threats we have, and we have the Communications Electronic Security Group (CESG) advising all Government departments on how to protect themselves. "But do remember that we - the US and UK - are doing this in reverse and we are very successful. It's an incredibly potent weapon which will certainly be utilized."Source: [Channel4]
In a report published by The Washington Free Beacon reports, the The Energy Department has been under massive cyber-attacks, as a result information of its hundreds of employees has been stolen, the officials are not positive over theft of secret information.
"It's a continuing story of negligence," former Energy Department security official Ed McCallum told the Free Beacon, explaining that the department continues to have security problems despite controlling some of the most "sophisticated military and intelligence technology the country owns."The department also put Iran in the line by saying that Iran and China both are after our secrets.
"China continues to develop its capabilities in the cyber arena," the U.S. China Economic and Security Review Commission said in a November 2012 report to Congress. "U.S. industry and a range of government and military targets face repeated exploitation attempts by Chinese hackers as do international organizations and nongovernmental groups including Chinese dissident groups, activists, religious organizations, rights groups, and media institutions."The people's republic of China is under a lot of pressure these days, as the WSJ and NYT has also accused the country for hacking its computers. You can read FreeBeacon's report on U.S. Energy Department Under Cyber-attackshere. Follow @HackRead
We have heard about hacking into each other's cyber territories but editing Wikipedia pages to send you message to the world was never a part of cyber war.
In a recent attack by hackers from Phillipines, the details about “Sabah” were edited and the state was described as being “part of the Sultanate of Sulu”. Sabah is one of the 13 member states of Malaysia while Sulu is an autonomous island province of the Philippines located in the Autonomous Region in Muslim Mindanao (ARMM). Malaysian website The Star reports that results from a Google search on the word “Sabah” at press time yesterday revealed a preview to the Wikipedia page which states: “Sabah is illegitimately considered one of the 13 member states of Malaysia, and is said to be its easternmost state but in fact, it is part of the Sultanate of Sulu. It is located on the northern portion of the island of Borneo.” When contacted the Google, the spokesman said that results, came from its Knowledge Graph, which is an index of hundreds of millions of real-world entities including open sources like Wikipedia. “When a user searches for a query, our algorithm takes information from the Knowledge Graph and presents it in the panel. “We want to make sure the information we provide is as accurate as possible, so we’ve included a link so you can tell us when we may have an inaccuracy in our information,” The Federal Commercial Crime Investigation Department of the country is now investigating the incident. The two countries are currently at war over territory dispute. Follow @HackReadOther then above mentioned hacks, the BD Grey Hat Hackers have been hacking several Indonesian government sites including its finance department and several religious affair and court sites. Link of hacked McDonalds Indonesia website along with its mirror is available below, while list of 914 hacked sites by Dr@cul@ can be found here.McDonald's Hacked by Ablaze Ever BD GREY HAT HACKERS! Hello Indonesia This is Dr@cul@ From BD GREY HAT HACKERS Hope you all Will Be Fine After Watching These Shits :P Never Challenge us.
Nagorno-Karabakh is a disputed territory between between Armenia and Azerbaijan, where both countries have been holding peace talks to solve the issue many years.
At the time of publishing this article, all sites were taken offline and some were suspended.
Follow @HackReadA Bangladeshi hacker going with the handle of xlx_xlx from 3xp1r3 Cyber Army has hacked and defaced the official website of Embassy of India in Doha, Qatar.
The hacker left his group’s deface page along with a message against The Board Of Control For Cricket In India’s threat to harm Bangladeshi test cricket status if the country’s cricket board did not supported India during International Cricket Council’s (ICC) voting over cricket rights. The message warns the BCCI against any step taken to harm Bangladeshi cricket team.
- This is for what you wanted to do with our TEST status. Our Cricket is Our Pride! We Love Our BD Cricket Team more then our Life. This is the WARNING for Indian Cricket Board. Don’t try to overrule on our cricket. BCCI and ECB will face the ROAR of BANGLADESHI TIGERS soon. We’re coming to your CYBERSPACE. We’re Watching you. GOOD LUCK.
The deface message also added:
- Cricket was a game of Gentle man. Then India came up & Its become a game of greedy Business man. We Hate India. Save Cricket Save Bangladesh ! W3 n3v3r f0rg3t ! W3 n3v3r f0rgiv3!
Link of targeted website along with its mirror is available below:
http://www.indianembassyqatar.org/
http://zone-h.org/mirror/id/21651289
It seems as if this is a start of a new cyber war over cricket game which is dear to many living in the Sub-continent.
At the time of publishing this article, the website of Indian Embassy in Qatar was restored and working online.
In order to demolish North Korean nuclear facilities, South Korea has decided to develop its own cyber attack tools.
Stuxnet kind of weapons have been proposed by the country’s defence ministry, the same Stuxnet software which was designed to target and destroy Iranian nuclear plants.
Yonhap news agency reported that:
- The South Korean military will carry out missions using the software. The defence ministry prsented its plan to the government on 19th February.”
In 2006, North Korea said it had successfully tested a nuclear weapon, spreading alarm through the region. Intensive diplomatic efforts to try to rein in North Korea’s nuclear ambitions continue.
The development of weapons capable of physically damaging North Korean nuclear plants and missile facilities is the second phase of a strategy that began in 2010, Yonhap said.
The first part of South Korea’s plan, which is continuing, is to conduct online propaganda operations by posting to North Korean social networking and social media services.
- Once the second phase plan is established, the cybercommand will carry out comprehensive cyberwarfare missions,” a senior ministry official said.
The South Korean cyberwarfare command, which will use the weapons, has been dogged by accusations of using its psychological warfare capabilities on its own population to try to influence voters in the run-up to the 2012 presidential elections.
Attempting to use cyberweapons to physically damage critical infrastructure could drastically backfire, Prof Alan Woodward, a computer security expert at the University of Surrey, told the BBC.
- I think it’s very dangerous,” he said. “[The weapon] could end up damaging all sorts of things you never intended it to.”
Once Stuxnet was released, its spread was impossible to predict or control, Prof Woodward said.
The code was designed to target Iranian nuclear enrichment facilities and disrupt a suspected nuclear weapons development programme.
However, the code attacked Siemens control systems used not only in the facilities but also in electrical generation plants, factories and water treatment works.
- You might be targeting one thing, but it could spread,” Prof Woodward said. “All those other forms of infrastructure become vulnerable.”
Malicious code such as Stuxnet does not respect national boundaries. Cyber-attack code developed by South Korea could rebound and end up damaging South Korean infrastructure that uses the same technologies, he said. The code could spread internationally.
In addition, once the attack code is released, malicious hackers or military personnel anywhere in the world would be able to study a sample and use the weapons against another target, Prof Woodward added.
Via BBC.
Writing a news about cyber attack is incomplete without mentioning India and Pakistan, where both countries are known for their skillful hackers and defacers.
Keeping up with their cyber war, a Pakistani based hacker going with the handle of rOOX from Team MadLeets has hacked and defaced the server of Indian Ministry of Railway, which includes around 47 domains.
The hacker left a deface page along with a message on all hacked websites which was expressed in following words:
Hacked By r00x you GoT 0wn3d By rOOX . Just a Security reminder :) Contact: r00x@ymail.com We are TeaM MADLEETS.
It seems as if hacker found some kind of security flaw allowing him to takeover the server and deface it with his page.
Links of targeted websites along with their mirrors are available here.
If you are following TeaM MADLEETS, you may know that this is not the first time when they have successfully defaced high profile government domains. Read the complete list of their hacks by clicking here.
At the same time, this is not the first time when Indian ministry of railway has been hacked. In past, a Pakistani hackers from ‘Ainab‘ and The Hackers Army had also defaced the same server.
At the time of publishing this article, all defaced domains were restored and working online.
For years, American aerospace industry has allegedly been infiltrated by a shadowy group of hackers believed to be affiliated with Chinese military. US space industry’s trading partners have also not been spared by this group, revealed a US-based cyber security company CrowdStrike.
CrowdStrike officials have declared People’s Liberation Army 12 bureau’s unit 61486 based in Shanghai responsible for attacking American and numerous other western networks. These cyber-assaults date back to as far as 2007. CrowdStrike states that this group has managed to target communication, space, and aerospace sectors through “popular productivity applications such as Adobe Reader and Microsoft Office to deploy custom malware through targeted email attacks,” reported Reuters.
Image Credit: Business Insider
The list of accusations has been outlined in a 62 page report published by CrowdStrike on Monday which involves blames like phishing emails and using Trojan horse document. This group, informally known as Putter Panda, conducts forensic investigations for clients enduring offensive security violations. For instance, whenever a target clicks on a specific document or downloads it, they can easily take over their entire computer. This power is then used by the hackers for stealing housing blueprints, serves, list of clients and other highly sensitive data, reported Ars Technica.
Researchers have acknowledged that “Putter Panda is a determined adversary group, conducting intelligence-gathering operations targeting the Government, Defense, Research, and Technology sectors in the United States, with specific targeting of the US Defense and European satellite and aerospace industries. The PLA’s GSD Third Department is generally acknowledged to be China’s premier Signals Intelligence (SIGINT) collection and analysis agency, and the 12th Bureau Unit 61486, headquartered in Shanghai, supports China’s space surveillance network.”
CrowdStrike published this report to show how deep-rooted this problem is. The report arrived just three weeks after the surprise move from US Justice Department of impeaching People’s Liberation Army hacker unit’s five members. They were accused of stealing US trade secrets.
Chinese spokespersons denied the legitimacy of the Department’s assertions on the basis that the US National Security agency has already launched such attacks.
Jiang Jun, an official representative for the state Internet Information Office informed pro-government Xinhua News Agency: “For a long time, governments and enterprises of a few countries have gathered sensitive information on a large scale, taking advantage of their monopoly in the market and technological edge. They not only seriously undermine the interests of their clients but also threaten cyber security of other countries.”
Jun’s response provoked Dmitri Alperovitch, co-founder CrowdStrike who also authorized disclosure of this report on Monday, to access US intelligence and Justice Department officials for consultation.
“After the Chinese response, where they basically said this is all fabricated, we said why don’t we unleash something that’s undeniable,” Alperovitch informed Reuters.
The post Chinese military hacked U.S. aerospace industry for seven years: Report appeared first on Hack Read.
A group of Armenian hackers going with the handle of Monte Melkonian Cyber Army (MMCA) have claimed to conduct cyber attack on Azerbaijani cyber space that includes defacement of several websites and a DDoS attack up to 300GB.
In an exclusive conversation with one of the representative of MMCA, we were told that the reason behind this attack is ongoing border clashes between Armenia and Azerbaijan.
Hackers left a deface page along with a warning message to Azerbaijan over ongoing conflict. The deface page also includes pictures of Armenian soldiers died during the conflict.
A screenshot of deface page with a warning message.
A screenshot of digital attack map showing DDoS of Azerbaijani sites
Digital attack map
List of targeted website is available here.
This is the first time that we have covered Armenian hackers targeting Azerbaijani websites. In past the Azerbaijani hackers were more active against Armenian cyber space including the defacement of Armenian President and other government Ministries in June 2014.
The post Armenian hackers attack Azerbaijan websites amid border clashes appeared first on Hack Read.