Thursday, March 7, 2013

Time Warner Cable Support Service Hacked and Defaced by NullCrew


Time Warner Cable Support Service Hacked and Defaced by NullCrew 


Time Warner Cable Inc has had its main website for its cable service hacked and left defaced with its embarrassing administration password.


The attack has been carried out by members of NullCrew who have announced it on twitter and posted a screen capture to freezepage

The main target was TimeWarnerCable.com online support service administration area which is running on port 8888 for web access.
Null Crew members Orbit and Doc gained access via a exploit found in the systems ASP which allowed them further access to be able to escalate user permissions and as a result they found out the administration had an account with the password set as “changeme” which is just shocking to say the least.
The attack has also exposed what is said to be one of the systems SSL key passwords.
The website was also defaced with a dump of information and partial configuration files from the server and at time of publishing the websites defacement was still active via port 8888 which is the administration access.

In recent weeks we have seen more and more high profile targets come under attack by hackers who have left them shamed for lack of security on systems they use.

Gang arrested for hacking Dh7 million from Dubai exchange companies accounts

Gang arrested for hacking Dh7 million from Dubai exchange companies accounts


The Dubai Police have arrested a cyber crime gang who were able to transfer more than Dh7 million from exchange companies in Dubai. Abdul Hamid, a Pakistani heavy machinery dealer, said the hacker intercepted his UK suppliers’ emailed invoices for orders worth about £65,000 (Dh358,882). “I was stunned. The hacker had been stalking me online, waiting until I reached a price agreement with the supplier. He then sent me fake invoices and emails posing as the supplier, so he could get the money instead.” he said. According to police a gang of Asians and Africans work with hackers in order to enter different websites and systems of different companies here in Dubai in order to transfer money inside and outside the country.

61 Year Old Hacker found guilty in Corporate Hacking case by FBI

61 Year Old Hacker found guilty in Corporate Hacking case by FBI


(img is for fun)

A 61 years old Texas man 'Michael Musacchio' found guilty of conspiring to hack into his former employer's computer network by FBI this week.  According to the evidence submitted at trial, from 2002 to 2004, Musacchio was the president of Exel Transportation Services, a third party logistics or inter modal transportation company that facilitated links between shippers and common carriers in the manufacturing, retail, and consumer industries. Between 2004 and 2006, Musacchio along with fellow Exel employees Joseph Roy Brown and John Michael Kelly hack into Exel's computer system for the purpose of conducting corporate espionage.

Pakistan Intelligence agency hacked by Indian hacker


Pakistan Intelligence agency hacked by Indian hacker


Pakistan Intelligence agency

While the rest of the world engaged in cyber security conferences and Anonymous operations, an Indian patriotic hacker used the time to attack Pakistan Intelligence agency ISI.

Hacker going by name "Godzilla" today claimed to hack into one of the server belongs to ISI website (http://isi.org.pk) and gets all possible secret information about Pakistan Intelligence.

According to the information shared by hacker with 'The Hacker News', he claims to have access to Remote Desktop Protocol (RDP) of the server located at 173.193.110.72.

He disclose that System installed with Windows 2008 server standard edition and having three derives i.e C,D,E with operating system in C and Hostname 'AHCORP'

He also claimed to hack into MSSQL server containing 3 databases, with 9 users and located at http://mssql.isi.org.pk, as shown in screenshot taken by him.

ISI hacked


Some partial tables of the database 'msdb' as listed below:
  • bakupfile
  • bakupmediafile
  • bakupmediaset
  • backupset
  • logmarkhistory
  • restorefile
  • restorehistory
  • suspect_pages
Hacker also share the login credentials of the RDP, but because of the sensitive hacking scene, we preferred to not disclose further information. 

Chinese search engine Baidu launches free Antivirus Suite


Chinese search engine Baidu launches free Antivirus Suite

Baidu Antivirus 2013

Chinese search engine Baidu has just launched a security product called Baidu Antivirus 2013. Described as a ultra light weight, easy to use, extremely fast anti-virus program that promises to protect your system from malware, viruses, spyware, adware and other malicious programs.

Most interesting thing is that Baidu Antivirus comes only in English. Back in January, Baidu launched Baidu PC Faster, a software suite designed to fix speed and performance issues.

The program combines the Baidu Antivirus Engine and Baidu Cloud Security Engine with the Avira Antivirus engine to provide you with complete protection against all online threats.
Baidu Antivirus 2013

"Baidu Antivirus offers an easy to use interface with several advanced configuration options as well as quarantine of infected files. It also has an extremely small memory footprint, so you can actually do other things while it is running on your computer. Other features include automatic updates, Host Intrusion Prevention System (HIPS), scan reports and more." description reads.

You can download Baidu Antivirus 2013 here and please note that, its a Chinese product, so use at your own risk !

Snort 2.9.4.1 - Network intrusion detection system


Snort 2.9.4.1 - Network intrusion detection system


Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) . Snort having the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching.

Snort 2.9.4.1   Network intrusion detection system

The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans. Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection.

Improvements in Snort 2.9.4.1
  • Updated File processing for partial HTTP content and MIME attachments.
  • Addition of new config option max_attribute_services_per_host and improve memory usage within attribute table.
  • Handle excessive overlaps in frag3.
  • Stream API updates to return session key for a session.
  • Reduce false positives for TCP window slam events.
  • Updates to provide better encoding for TCP packets generated for respond and react.
  • Disable non-Ethernet decoders by default for performance reasons. If needed, use --enable-non-ether-decoders with configure.

Monday, March 4, 2013

Philippines-Malaysia Cyber war over Sabah land dispute


Philippines-Malaysia Cyber war over Sabah land dispute


Philippines Malaysia Cyber war over Sabah land dispute

A series of websites defacement has been conducted between Philippines and Malaysia over the dispute in the land of Sabah. Hackers claiming to be part of Anonymous group from Malaysian and Filipino and attacking websites of each other.

 It was believed that the first online attacks were made by Malaysians and defaced the government-owned site of the municipality Moal Boal, Cebu, hours after a skirmish erupted between police and Sulu gunmen on Friday.

Meanwhile the online shop of Philippine mobile services provider Globe Telecom was defaced by hackers claiming to be from the "MALAYSIA Cyb3r 4rmy".


 On other side Philippine Cyber Army hackers claiming to have attacked 175 Malaysia-based sites,“Greetings Malaysia! Greetings Government! Stop attacking over our cyberspace or else we will attack your cyber world!” the Philippine hackers.

Today story take another angle, when Several websites of Philippine local governments have been hacked by the so called “Anonymous Malaysia” 3rd group of hackers with the message: “Well, its time for us to PEACE and stop attacking each other. To end up this way, this is our last defacement and from now on none of us will step or touch ur (sic) country site and none of you are able to touch our country site. If u against (sic) this agreement, we wont accept any apology or excuses #wewillnotgodown.

A statement by hacktivist group Anonymous on pastebin also called for hackers of both countries to stop. "The petty cyber-war will gain us nothing but wrong impressions from ordinary people. Our goal is to peacefully unite the collective consciousness of humanity. We urge our brothers from both countries to sit and talk  Not blabber out words then fight like kids. We have no place for petty arguments and to surrender to provocative actions that we know we can answer with a larger and bolder approach."

As far now, Individual hackers from both parties are appeared to have started the attacks on each other.

HTML5 browser exploit can flood your Hard Drive with junk data


HTML5 browser exploit can flood your Hard Drive with junk data


HTML5 browser exploit can flood your Hard Drive with junk data

Feross Aboukhadijeh, 22-year-old Web developer from Stanford has discovered HTML5 browser exploit can flood your Hard Drive with Cat and Dogs i.e junk data.
Many times a website needs to leave a little data i.e 5-10KB on your computer like a cookie, but HTML5 allow sites to store larger amounts of data (like 5-10 MB). In a proof-of-concept he was able to full up 1 GB of HDD space every 16 seconds.
He created FillDisk.com in order to demonstrate the exploit in HTML5. Once user will visit the website the Web Storage standard allows website to place large amounts of data on your drive. Please note that, It's not a hack and this exploit won't allow attackers to access your computer.

However, Web browsers have the ability to limit just how much space websites can dump onto your hard drive. Firefox's implementation of HTML5 local storage is not vulnerable to this exploit. Whereas Chrome, Safari (iOS and desktop), and IE vulnerable to this.

You can find the source code here. Feross already logged the bug for Chrome and Safari, so the problem there should be fixed soon.

Jailed cyber criminal hacked into prison computer system from Jail


Jailed cyber criminal hacked into prison computer system from Jail

hacker in jail

Old habits seem to die hard for a hacker, a cyber criminal who masterminded a £15 million fraud was allowed to join a prison IT class and hacked into the jail’s computer system.


Nicholas Webber, serving five years in prison for running an internet crime forum Ghost Market, Which allowed those interested in creating computer viruses, partaking of stolen IDs and enjoying private credit card data to congregate.
Webber had been arrested for using fraudulent credit card details to pay for a penthouse suite at the Hilton Hotel in Park Lane, Central London.
The incident occurred back in 2011, but it only came to light recently "At the time of this incident in 2011 the educational computer system at HMP Isis was a closed network. No access to personal information or wider access to the internet or other prison systems would have been possible," A spokesman fοr prison tοƖԁ the Daily Mail reported.
His IT teacher, Michael Fox ,who was employed by Kensington and Chelsea College has now brought a claim for unfair dismissal, saying that it wasn't his fault that Webber ended up in his class. Fox also says he had no idea Webber was a hacker. While the college cleared Fox of committing security breaches, he was made redundant when no alternative work could be found for him.
The hack at the prison triggered a security scare during a lesson but it was not immediately clear what information he managed to access.

Sunday, March 3, 2013

Old School Hackers spying on European governments


Old School Hackers spying on European governments

Old School Hackers spying on European governments

Kaspersky Lab's team of experts recently published a new research report that analyzed that Cyber criminals have targeted government officials in more than 20 countries, including Ireland and Romania with a new piece of malware called 'MiniDuke'.

In a recent attack, malware has infected government computers this week in an attempt to steal geopolitical intelligence. The computers were infected via a modified Adobe PDF email attachment, and the perpetrators were operating from servers based in Panama and Turkey.

According to Kaspersky Lab CEO Eugene Kaspersky,"I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyber world."

208194132

Last week Adobe released an update that patches the Adobe PDF bug (CVE-2013-6040) used in the attack. Once it was opened, the MiniDuke malware would install itself on a victim's computer. It is not known what information the attackers are targeting.

MiniDuke attacks government entities in Belgium, Brazil, Bulgaria, Czech Republic, Georgia, Germany, Hungary, Ireland, Israel, Japan, Latvia, Lebanon, Lithuania, Montenegro, Portugal, Romania, Russian Federation, Slovenia, Spain, Turkey, Ukraine, United Kingdom and United States.

The malware also compromised the computers of a prominent research foundation in Hungary, two thinktanks, and an unnamed healthcare provider in the US.

Tunisian Cyber Army Spree of Attacks on Financial Sites


Tunisian Cyber Army Spree of Attacks on Financial Sites...


Last month a hacker using the handle @TN_cyberarmy who goes by the team or group name of Tunisian Cyber Army had been on a small spree of attacks on financial based websites.
The attacks range from a bank in America to two master card websites being exposed as having XSS exploits in them which are still live weeks later.

First there was 6 small data breaches on some bank based websites which had been posted and announced together

Then the centralebank.com got its database breached and was posted and dumped on and announced via twitter. the site also appears to be offline now and the leaked data has been confirmed as real.

The XSS attacks have been on a master card and American express website, one which i already reported on here and the other is smartpaymastercard.com

m1 amex

The attacks have been carried out in the name of #opBlackSummer which is said to really kick off in the coming months but its unsure exactly what will be in target.
bank list:
  1. http://www.thefriendlybank.com/
  2. http://www.pashupatibank.com/
  3. http://www.bankcap.com/
  4. http://www.nbbl.com.np/
  5. http://www.nbk.cn/

lulzsec.com Sub domain hacked or was it


 lulzsec.com Sub domain hacked or was it 


owned

Updated: Sub domain has been taken over by the FBI, see below..



Today i was alerted to a hack by a group of old school hackers from the late 90′s who have left a sub domain of the well known hacker collective lulzsec hacked.
The attack appears to be a DNS attack as well as a defacement on another site which is currently sharing the same IP (74.220.210.192) that the “defaced” sub domain is currently being hosted on. the main lulzsec website with or without the www shows the the long existing notice that has been taken over by authorities.
The attack has been done by Prime Suspectz who on Zone-h have not made a post to the site since 2005, but that does not mean they have been totally quite over this period. The defacement has a message to lulzsec and anonymous and makes mention of sabu, stating that they remember a older conversation from back in 2004 where he couldn’t hack.
Prime Suspectz & core-project is back!
x-s4nd3r / st4ck / eCORE / coolswallow
LulzSec owned?

 Anonymous & LulzSec are the world’s biggest lamerz, they think leaking can make them big haxor? no, you are wrong! u will be never big hacker, ur the biggest lamers of this planet..people like you destroy the hacking scene, you use LOIC and thinking ur big hacker, hahahahaha!
 we are not dead, big lamerz like u must be destroyed, also for sabu (the police snitch), you were the biggest n00b i ever talked to in 2004, using lame ssh exploits u could not even pwn a IE2-box, do not believe the media!! media delivering false news…sabu was the biggest n00b of this century, and nobody gives a fuck about ur lame leakz, anonymous :)

 but the show is not finished yet, we are not dead…we always watching u :)

The other website which shares the same IP as the portal.lulzsec.com currently does is http://pekingporkchop.com/ and that is also displaying the same defacement page leaving one to think that is the main defacement as it shows up in caches as a old unused Joomla  website with no content.
So, lets break this down a bit to see what is going on. The main lulzsec site is owned by FBI, a sub domain has been hijack either by DNS hijack or hackers have control to a cname controller some how and now the site is pointing to another site name pekingporkchop.
Proof that both were on different IP’s at time of publishing.

network-tools-dnsipemail

See a Mirror of the defacement: here and the rest of prime suspects older defacements here
Reverse IP on 74.220.210.192
Also like to make the note of timing of this breach, within weeks of news coming out that sabu has been giving more time away from sentencing to assist police further which has put a lot of anger and upset many people in the community as people who sabu helped get arrested are facing big time behind bars.
So ill leave you to figure out what the hell exactly happened here, so have fun oh and Credit goes to @agd_scorp for alerting me to this.

Updated:
iprc_seized_2010_11

Once again @agd_scorp has alerted me to the sub domain now also being in control of the FBI as well as the other site which appeared to have the deface http://pekingporkchop.com/,
This makes one wonder if the site has actually been seized or was all this just a big hoax of some sort or has the FBI gone and seized another site now due to defacement? make note of the mxtoolbox.com results below which show at time of update all ips were still the same as first publish.

network-tools-dnsipemail2

Once again, ill leave you to think about this one. bu

MVS comunicaciones Hacked, 1,700+ Credentials leaked


MVS comunicaciones Hacked, 1,700+ Credentials leaked 

A Mexican based Telecommunications company who runs various sub company’s has been breached and as a result the credentials of its administration and service users have been leaked.

The company is MVS Comunicaciones (http://www.mvs.com) runs pay television services and is based in mexico.

320px-mvs_comunicaciones_2009_logo
MVS Comunicaciones (MVS) is a Mexicanmedia conglomerate. The company owns MASTV, MVS Radio operator of four national radio networks, MVS Televisión operator and distributor of 7 pay television networks, E-Go wireless broadband internet and 51% of Dish México.
The leak was announced on twitter by hacker using the handle @MexicanH

The leaked data has been posted to pastebin and contains around about 3,000 accounts but many of them are duplicated or using same emails for different systems as there is a few different tables from the sites database, All together there is 1700 non duplicated accounts with emails.
All account credentials vary and some passwords appear to have full encryption while others are lacking this security.

Source: pastebin

Wednesday, February 27, 2013

ABC Australia confirms data breach, target was old micro-sit...


ABC Australia confirms data breach, target was old micro-sit...




Late last night or early this morning, how ever you want to look at it, ABC Australia was breached and heap of personal information had been posted online.


It appears that since then, according to SCmagazine the ABC Australia spokeswomen Sally Cray has confirmed that this data is in fact from ABC and that a old “micro-site” or side site from 2010 was the host of the information that has been leaked to the public.

I can now announce that the exact sub domain that was targeted was makingaustraliahappy.abc.net.au for the 2010 show Making Australia happy in which since the ABC has disabled access to this sub domain. A cached view of the sites registration shows that the leaked personal data is from people who have signed up.
Quote:
Welcome to your first step on the path of happiness. By signing up, you’ll be able to join millions of other Australians as they embark on a three-week happiness program called Get Happy. Test your happiness levels, receive your weekly activities and share your experiences here in Get Happy. Please fill out the fields below.

That form asks for details like gender, age range, names, emails and post code which matches the data form the leak. It is still unclear exactly what was exploited to gain access to the sites database but it sends out a clear message to many sites who often make sub domains for one reason or another then forget about them leaving them open to attacks.

I also give some respect out to the ABC reporters who are doing an excellent job in finding out the details of this breach. They had made the extra step to attempt to contact sources and confirm data etc, this is how all main media should be and lets hope its a start of something new for main media and cyber related issues.

(BOA) Who is on TEKsystems Intel Leak..

Who is on TEKsystems Intel Leak..



NOTES:

Emails titled TACTO are some sort of infiltrator or tip off program with pretty much all of them written emails sent into TEKsystems.
PasteMon Alert are alerts from pastebin.
EWT = Early Warning Team

Intro

First of all some background history on why anonymous is battling Bank of america and where TEKsystems comes into it.
Last year there was a movement called occupy who in really simple terms raised awareness of corrupt bankers and as a result of that a group of hacktivist lashed out at bank of America. It would appear since around that time the bank has hired the services of a security Intel firm named TEKsystems who have managed to infiltrate anonymous and other hacktivist.
This below report is more so focused on TEKsystems, who they are, what they do, what they have been doing and who and where they have been watching. For security reasons i will not be naming any of the said TEKsystems employees who have been labelled as informants.
Who is TEKsystems?


TEKsystems is a sub company of the Allegis Group whose founder also owns the Baltimore Raven.

TEKsystems is a information security group that is hired by company’s and comes on site to manage and control aspect of data and Internet security depending on the client.
It appears that TEKsystems has many people working in the offices of Bank of America and on top of this it has people who appear to be informing to them.
So after going over a lot of information now i have come down to this conclusion by my own judgement only.
The Bank of America has a system called Bank of America Enterprise Media Monitoring (http://emm.bankofamerica.com) which appears to be the core problem of this whole leak.
The system appears to send out automated emails from informants who are infiltrating anonymous and other closely related hacker collectives.
The system appears to have other aspects as well as automated monitoring systems which is expected for any information security group.
What’s in this leak?

The download-able leak file was 266MB rar file when uncompressed it totals 320MB and comes with 2 text files and a folder named allTexts which contains the 5 main sub directory’s detailed below.
Text files

  • keywords.txt
  • bofa_release.txt
Five main folders

  • emails
    • Contains 418 emails in text format from contacts and alert systems from late 2011 to late 2012. (see below for people mentioned)
  • excel
    • 17 text files with information about certain attacks and what to do.
  • idf
    • two excel files, one nothing, the other contains a database extraction with what appears to be statistics or current results from the alert or early warning system tags that TEKsystems runs.
  • osint-files
    • 37,515 total text files which all have numeric based names. these appear to be different reports generated from research or Intel gathering from other company’s and websites over a decent period of time.
  • powerpoint-xml
    • Global information security threat Management update’s from 2011,2012. These updates are reports with what appears to be the complied data from a lot of the emails and events over the past 12months that have been related to anonymous and other collectives.
Where have they been

Source

Information

IRC: Cryto-IRC Channels: #mmn IRC: Voxanon Channels: #opfreeassange IRC: anonops Channels: #OpNewblood, Antisec, #anonops, #LulzsecReborn, #DDoS, #operationfreedom, #OpGreece, #stopCISPA,opbildeberg Pastebin What appears to be a pastebin monitoring tool that picks up on keywords and sends the raw paste via email in text format. Twitter Auto alerts from set keywords Tweet deck Auto alerts from string searchs and filtering with tweetdeck search features. News Feeds News feeds from many different information security sources including this site. Who has been mentioned?

The below is a complete chart of the names i have found within the leaked emails.
These below names may either be referenced to or directly linked to but either way they are coming up on TEKsystems Intel alerts and informant provided information.
Name/Screen name


Mentioned in

Jackel
247. 4_30_2012 – EWT – TACTO – Jackal WePay Account UGNazi
26. 10_23_2012 – Four Credit Cards Posted, Possible Links to UGNazi254. 5_6_2012 – Four UGnazi Members Arrested 273. 5_17_2012 – UGNazi Group Claims to Take Visa.com Down 274. 5_17_2012 – Update 1 to TACTO_ UGNazi Group Claims to Take Visa.com Down 275. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down 276. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down 277. 5_17_2012 – Update 4 to TACTO_ UGNazi Group Claims to Take Visa.com Down
279. 5_17_2012 – FLASH INITIAL – UGNazi claims to take down Visa, VisaEurope, CIA and others
282. 5_17_2012 – UGNazi Group Claims to Take Discover.com Down
285. 5_18_2012 – EWT – TACTO – Dox on UgNazi
287. 5_21_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS
288. 5_22_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS
289. 5_22_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS
304. 5_31_2012 – EWT – TACTO – UgNazi is Back
325. 6_15_2012 – EWT TACTO – Google’s MarkMonitor compromised…
348. 7_2_2012 – EWT TACTO – Pending Cyber Action Against Cap…
GreyWarden
275. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down AnonnBrasil
275. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down


AnonymousOwn3r
275. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down 276. 5_17_2012 – Update 2 to TACTO_ UGNazi Group Claims to Take Visa.com Down

DestructiveSec
01. 12_19_2011 – TACTO – LulzXmas
36. 1_3_2012 – EWT – TACTO-OPFiresail in Danger_
32. 1_3_2012 – EWT – TACTO-Update DestructivSec
41. 1_3_2012 – EWT – TACTO – d0x on DestructivSec

Anontastic
01. 12_19_2011 – TACTO – LulzXmas


Izz ad-din al-Qassam
01. 10_30_2012 – DDoS defacings,
exploits, warnings, tango downs." rel="nofollow" class="internal_category">Attacks_ Variant Foreseen in 2006 (Bank Info Security)
02. 10_31_2012 – Citi banking site briefly down, bank declines to discuss cause (Reuters)
03. 10_23_2012 – Daily Intelligence Summary, 23 October 2012
07. 10_23_2012 – EWT Shift Report
20. 10_23_2012 – Izz Ad-Din Al-Qassam Cyber Fighters Group Takes Break From Hacking Banks To Celebrate Eid Al-Adha Holiday

FawkesSecurity
23. 10_25_2012 – FawkesSecurity Posts Tango Down for onlinebanking.pnc.com
04. 10_25_2012 – Daily Intelligence Summary, 25 October 2012

p0isAn0N
02. 12_21_2011 – TACTO – p0isAn0N
39. 1_3_2012 – EWT- TACTO – p0isAn0n and f0rsaken possibly one in the same

DoxCak3
03. 12_21_2011 – TACTO – Operation Hiroshima
08. 12_27_2011 – TACTO – Next Data Dump Time

SkyLion
03. 10_24_2012 – Pastebin.com is Receiving a DDoS Attack

Anon1241
03. 10_24_2012 – Pastebin.com is Receiving a DDoS Attack

VizFoSho
04. 10_23_2012 – EWT – TACTO – Anonymous Bomb Threat

adiga_hackers
04. 10_24_2012 – Daily Cyber Threat Highlights – 24 October 2012
27. 10_23_2012 – TACTO Hilf-ol-Fozoul post regarding OpAbabil

Hargikas
04. 10_25_2012 – Daily Intelligence Summary, 25 October 2012

CabinCr3w
05. 12_23_2011 – TACTO – Money Trail
17. 12_30_2011 – EWT – TACTO
19. 12_31_2011 – EWT – TACTO
23. 1_1_2012 – EWT – TACTO

AnonOps
06. 12_25_2011 – TACTO – Credit Card Info 10. 12_28_2011 – TACTO – SpecialForces.com 128. 2_24_2012 – EWT TACTO

_f0rsaken
07. 12_26_2011 – TACTO – Donations|
16. 12_31_2011 – EWT – TACTO
39. 1_3_2012 – EWT- TACTO – p0isAn0n and f0rsaken possibly one in the same
89. 1_28_2012 – TACTO – Bank Transfer Day
106. 2_9_2012 – EWT – TACTO – Hack on BofA175. 3_20_2012 – EWT – TACTO-Skype_XMPP Communication Avenues for Hacking

OoPsRevolution
08. 12_27_2011 – TACTO – Next Data Dump Time

YourAnonNews
09. 12_27_2011 – TACTO – Email Release
45. 1_5_2012 – TACTO – Source Code
104. 2_7_2012 – EWT – TACTO – Symantec Source Code Info174. 3_20_2012 – EWT TACTO_ #MayDay AnonymousIRC
10. 12_28_2011 – TACTO – SpecialForces.com

uk_anonymous
11. 10_24_2012 – EWT TACTO – @uk_anonymous #BlackMirrorProjec… _SPiN
11. 12_28_2011 – TACTO – Bank Related

TehWongZ
11. 12_28_2011 – TACTO – Bank Related
41. 1_3_2012 – EWT – TACTO – d0x on DestructivSec

sl1mmer
11. 12_28_2011 – TACTO – Bank Related

Anorcho_Rage
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AmeraSec1
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonOps_Eritrea
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Anonymous_SoCal
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

VictoryOWS
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

tikaambre
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonOPSSweden
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

105. 2_8_2012 – EWT – TACTO-Bank Threat
AnonPT
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonRioNews
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

RealTeamAsh
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonNCarolina
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Anon_GovWatchCA
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Punkboyinsf
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

kyAnonyky
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

LegionRussia
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

FailSecEU
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Anon_Central
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

SaudiAnonymous1
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Anon_Central
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

WayzZx
12. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

xNero44
12. 10_31_2012 – EWT Shift Report

yteixnaAnon
12. 10_31_2012 – EWT Shift Report

LulzSecEurope
14. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

Lion_Of_Legion
14. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonOpsLegion
14. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

AnonUK
14. 10_24_2012 – EWT TACTO – Twitter User Calls for DDoS Attack on Russian Bank

106. 2_9_2012 – EWT – TACTO – Hack on BofA
Ag3nt47
14. 10_30_2012 – TACTO New Ag3nt47 Blogspot eze
14. 12_29_2011 – TACTO – Credit Card Dump from hacked website

T0x1c
15. 12_30_2011 – EWT – TACTO
24. 1_1_2012 – TACTO – Bank Related
26. 1_2_2012 – EWT – TACTO

OpCensor
16. 12_31_2011 – EWT – TACTO

DJ-TAM
18. 12_31_2011 – TACTO – Credit Card Release

JakeTheGod
19. 10_23_2012 – PasteMon Alert

JimenezTheGod
19. 10_23_2012 – PasteMon Alert

26. 10_23_2012 – Four Credit Cards Posted, Possible Links to UGNazi

Shmoop
19. 10_23_2012 – PasteMon Alert

DT4NK
19. 10_23_2012 – PasteMon Alert

Drone
19. 10_23_2012 – PasteMon Alert

UG
19. 10_23_2012 – PasteMon Alert

On3iroi
20. 12_31_2011 – EWT – TACTO
41. 1_3_2012 – EWT – TACTO – d0x on DestructivSec

SwenKa123
20. 12_31_2011 – EWT – TACTO

Teamp0isoN
21. 12_31_2011 – EWT – TACTO

26. 1_2_2012 – EWT – TACTO

27. 1_2_2012 – EWT – TACTO

33. 1_3_2012 – EWT – TACTO-Update on TeaMp0isoN deleting Tweets

Sector 404
21. 12_31_2011 – EWT – TACTO

___MaStA
22. 12_31_2011 – EWT – TACTO

M45K
25. 10_23_2012 – TACTO Credit Card Dump on Pastebin

Uran0n
26. 1_2_2012 – EWT – TACTO

AnonymousSV_503
26. 1_2_2012 – EWT – TACTO

USAnonymous
26. 1_2_2012 – EWT – TACTO

Zer0Cool
26. 10_23_2012 – Four Credit Cards Posted, Possible Links to UGNazi

NullCrew
26. 10_23_2012 – Four Credit Cards Posted, Possible Links to UGNazi

D0ct0rdoc
27. 1_2_2012 – EWT – TACTO

unusedcrayon
27. 1_2_2012 – EWT – TACTO

CulturalHistory
27. 1_2_2012 – EWT – TACTO

AnonDaily
29. 1_3_2012 – TACTO – Financial Industry

UrbanP1rate
31. 1_3_2012 – EWT – TACTO – Pastebin DDOS Attack

Hex000101
32. 1_3_2012 – EWT – TACTO-Update DestructivSec

Netzblockierer
33. 1_3_2012 – EWT – TACTO-Update on TeaMp0isoN deleting Tweets

PLF4LIFE
34. 1_3_2012 – EWT – TACTO-d0x of Senator Richard John Santorum

GiveMeThatJuice
34. 1_3_2012 – EWT – TACTO-d0x of Senator Richard John Santorum

ItsKahuna
34. 1_3_2012 – EWT – TACTO-d0x of Senator Richard John Santorum

p4r_king
34. 1_3_2012 – EWT – TACTO-d0x of Senator Richard John Santorum

anch00
36. 1_3_2012 – EWT – TACTO-OPFiresail in Danger_

testeux1
37. 1_3_2012 – EWT – TACTO-testux1 turning to .gov defacements

AgentMcQueen
37. 1_3_2012 – EWT – TACTO-testux1 turning to .gov defacements

wesleypipes12
37. 1_3_2012 – EWT – TACTO-testux1 turning to .gov defacements

0xOmar
38. 1_3_2012 – EWT – TACTO-Israeli data dump (anonymouSabu)56. 1_15_2012 – EWT – TACTO57. 1_16_2012 – EWT – TACTO

Group-XP
38. 1_3_2012 – EWT – TACTO-Israeli data dump (anonymouSabu)

anonymouSabu
38. 1_3_2012 – EWT – TACTO-Israeli data dump (anonymouSabu)

OpCensorThis_
40. 1_3_2012 – TACTO – Bank Related71. 1_22_2012 – TACTO – MasterCard down74. 1_23_2012 – TACTO – Stratfor Email Teaser 375. 1_24_2012 – EWT – TACTO-FI Threat

belowring0
41. 1_3_2012 – EWT – TACTO – d0x on DestructivSec

Anon_Domini
43. 1_3_2012 – EWT – TACTO-JAN 5th STOP SOPA STORM

gN3mes1s
44. 1_5_2012 – EWT – TACTO-SYMANTEC SOURCE CODE OWNEED

yarai1978
44. 1_5_2012 – EWT – TACTO-SYMANTEC SOURCE CODE OWNEED

YamaTough
45. 1_5_2012 – TACTO – Source Code 46. 1_6_2012 – FLASH INITIAL_ Symantec & NAV Source Code breach

cyber_War_News
48. 1_10_2012 – EWT – TACTO- United Beauty DB Leak 5208 Users

CAPOORRAVIP
50. 1_12_2012 – TACTO – Pastebin

AnonOpGreece
52. 1_12_2012 – EWT – TACTO-OpItaly, DDOS on gonverno.it

HabraFeed
54. 1_13_2012 – EWT – TACTO

anastayseea
55. 1_13_2012 – EWT – TACTO

ncaproni
55. 1_13_2012 – EWT – TACTO

ZionOps
57. 1_16_2012 – EWT – TACTO

Nightmare
57. 1_16_2012 – EWT – TACTO

MoFoPlz
64. 1_19_2012 – TACTO – OSF Threat

Star_Fawkes
65. 1_19_2012 – EWT – TACTO- Upcoming Protest

Remi
66. 1_20_2012 – EWT – TACTO-FI Threat

zipwip
66. 1_20_2012 – EWT – TACTO-FI Threat

vegas
66. 1_20_2012 – EWT – TACTO-FI Threat

embed
66. 1_20_2012 – EWT – TACTO-FI Threat

Anonymous5
68. 1_20_2012 – EWT – TACTO-opmegaupload paste to LOIC Cannon

Zandos
68. 1_20_2012 – EWT – TACTO-opmegaupload paste to LOIC Cannon

owsmeditation
93. 2_2_2012 – EWT-TACTO

OccupyBham
99. 2_6_2012 – EWT TACTO

maxicat
99. 2_6_2012 – EWT TACTO

OpSyria
105. 2_8_2012 – EWT – TACTO-Bank Threat

lulzfinancial
105. 2_8_2012 – EWT – TACTO-Bank Threat

SgtSecondary
108. 2_9_2012 – EWT – TACTO-Bank Threat

OpBlack0ut
110. 2_10_2012 – EWT – TACTO-UN Hacked again by Casi

casi
110. 2_10_2012 – EWT – TACTO-UN Hacked again by Casi

ANONYMOUSLULZ1
112. 2_12_2012 – EWT TACTO

PurpleLulzArmy
112. 2_12_2012 – EWT TACTO

telecomix
112. 2_12_2012 – EWT TACTO

eighty6
114. 2_13_2012 – FLASH INITIAL_ Threat of attack ‘in a matter of weeks’ against the American Banking System by LulzSec member

LulzSec
114. 2_13_2012 – FLASH INITIAL_ Threat of attack ‘in a matter of weeks’ against the American Banking System by LulzSec member176. 3_21_2012 – TACTO – LulzSec Back

occupy1liberty
115. 2_14_2012 – TACTO – Break Up with BofA LulzSec47
119. 2_25_2012 – TACTO – Video of HOIC Attack on Capital One Website

anon_4freedom (SEPO)
122. 2_16_2012 – TACTO – FI Threat124. 2_20_2012 – TACTO – FI Threat143. 3_3_2012 – EWT TACTO – Sepo announcing new bank hacks on the way

science_goddess
126. 2_22_2012 – TACTO – Defaced ATM

AnonSikko
127. 2_24_2012 – EWT TACTO

AnonRogue
128. 2_24_2012 – EWT TACTO

AnonIRS
128. 2_24_2012 – EWT TACTO

Rogue
132. 2_26_2012 – EWT – TACTO- Credit Cards Posted

WikiLeaks
133. 2_27_2012 – EWT TACTO134. 2_27_2012 – EWT TACTO (Update)356. 7_12_2012 – EWT TACTO – WikiLeaks vs VISA393. 8_8_2012 – EWT TACTO – WikiLeaks DDoSed Again

AnonymousIRC
133. 2_27_2012 – EWT TACTO134. 2_27_2012 – EWT TACTO (Update) wikicables
133. 2_27_2012 – EWT TACTO134. 2_27_2012 – EWT TACTO (Update)

OccupyWallSt
135. 2_27_2012 – EWT TACTO

OccupySD
139. 3_1_2012 – TACTO – 1down, 2 to go

worthoftheworld
142. 3_2_2012 – EWT TACTO Picket at Banks in Alameda, CA146. 3_4_2012 – EWT TACTO Possible Occupy Oakland Activity Tonight150. 3_6_2012 – EWT TACTO Occupy Oakland Bank Activity 6 MAR 1500-1700PST

IceCreamBloc
142. 3_2_2012 – EWT TACTO Picket at Banks in Alameda, CA

SeeFreshFilms
144. 3_3_2012 – EWT TACTO Occupy San Jose Shutting Down BofA Locations

OccupyWallStNYC
145. 3_4_2012 – EWT TACTO Occupy Wall Street Bank Action

OaklandElle
146. 3_4_2012 – EWT TACTO Possible Occupy Oakland Activity Tonight

AaronEndre
151. 3_8_2012 – EWT – TACTO

ReutersLegal
155. 3_8_2012 – EWT – TACTO – BofA Whistleblower

CommanderX
156. 3_1_2012 – TACTO – New IRC VoxAnon

Skunk
157. 3_10_2012 – TACTO – Notable IRC Chat

Cons0le
157. 3_10_2012 – TACTO – Notable IRC Chat

JM511
159. 3_10_2012 – EWT – TACTO- Credit Cards Posted

Occupy_Mass
161. 3_13_2012 – EWT TACTO_ Occupy Boston Protests 14-15 MAR

Palsimon
162. 3_15_2012 – EWT TACTO_ BofA Protests 15 MAR RodSoto
165. 3_16_2012 – TACTO – Latest MS12-020 Exploitation Notes

luigi_auriemma
166. 3_16_2012 – EWT TACTO MS12-2012 Exploit

k_sOSe
167. 3_16_2012 – EWT – TACTO – Cridex – Updated Target List

aionescu
173. 3_18_2012 – MS12-020 based on Luigi PoC

phantom4life
175. 3_20_2012 – EWT – TACTO-Skype_XMPP Communication Avenues for Hacking

r3n3g4d3
175. 3_20_2012 – EWT – TACTO-Skype_XMPP Communication Avenues for Hacking

vanita5
175. 3_20_2012 – EWT – TACTO-Skype_XMPP Communication Avenues for Hacking

itgirljs
177. 3_22_2012 – EWT – TACTO – MS12-020 Metasploit

Heh
178. 3_22_2012 – EWT – TACTO – SecurityStateBk.com Defaced

Mauritania Hacker Team
179. 3_23_2012 – EWT – TACTO – Bank of Israel Hacked

OccupyManJose
180. 3_23_2012 – EWT TACTO – Bank Protests in San Jose

dianadotj
187. 3_28_2012 – EWT – TACTO – Phishing BofA Scam

Cysiek
190. 3_31_2012 – TACTO – Follow Up on GoladmanSachs

NaX
190. 3_31_2012 – TACTO – Follow Up on GoladmanSachs

happypuppy
190. 3_31_2012 – TACTO – Follow Up on GoladmanSachs

AnonGlobNews
192. 3_31_2012 – FLASH UPDATE 1 – Anonymous targeting Goldman Sachs in DDOS channel

Dragonskull
198. 4_1_2012 – TACTO – Goldman Sachs HOIC

SpiritusNL
197. 4_1_2012 – 1 APR Expected Launch of LulzsecReborn

LulzcartReborn
197. 4_1_2012 – 1 APR Expected Launch of LulzsecReborn

lulzboatR
197. 4_1_2012 – 1 APR Expected Launch of LulzsecReborn

Bdoggg42
206. 4_7_2012 – EWT – TACTO- Credit Cards Posted

MalSec
207. 4_8_2012 – CISPA Supporters Targeted with DDoS

TeamMalSec
207. 4_8_2012 – CISPA Supporters Targeted with DDoS

MalSecRO
207. 4_8_2012 – CISPA Supporters Targeted with DDoS

MalSecCN
207. 4_8_2012 – CISPA Supporters Targeted with DDoS

makeBoApay
218. 4_16_2012 – Protest Activity at BofA Locations 4_16 , 5_6-5_9 257. 5_8_2012 – MakeBoAPay 8 MAY Protest Activities

OccupyJim
218. 4_16_2012 – Protest Activity at BofA Locations 4_16 , 5_6-5_9

AstralGh0st
219. 4_17_2012 – EWT – TACTO – GoldmanSachs XSS

melissa_lynne
220. 4_19_2012 – EWT TACTO – yourbofa.com Twitter

BlairMiller9
220. 4_19_2012 – EWT TACTO – yourbofa.com Twitter

Anonpanda
225. 4_22_2012 – EWT – TACTO – Credit Card Information IRC

L0NGwave99
228. 4_26_2012 – TACTO – Visual Report showing attack on NASDAQ from L0NGwave99236. 4_29_2012 – EWT – TACTO – L0NGwave99 Update

deborahhorne
230. 4_27_2012 – EWT – TACTO – Homemade Bomb

Laurelai
239. 4_29_2012 – EWT – TACTO

barrett brown
239. 4_29_2012 – EWT – TACTO

JessicaSMarks
240. 4_29_2012 – EWT – TACTO – System Failure Claim

Checkit
255. 5_7_2012 – TACTO – DDoS target priority list

Sunki
248. 4_30_2012 – EWT – TACTO – Government Credit Card Info

YD
248. 4_30_2012 – EWT – TACTO – Government Credit Card Info

th3j35t3r
269. 5_13_2012 – EWT – TACTO – @th3j35t3r Info271. 5_14_2012 – EWT – TACTO – @th3j35t3r Info UPDATE272. 5_14_2012 – EWT – TACTO – @th3j35t3r Info UPDATE cubespherical
269. 5_13_2012 – EWT – TACTO – @th3j35t3r Info

ThaCosmo
273. 5_17_2012 – UGNazi Group Claims to Take Visa.com Down 282. 5_17_2012 – UGNazi Group Claims to Take Discover.com Down

le4ky
287. 5_21_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS 338. 6_22_2012 – Anonymous Attack on G4S

fakudolphin
287. 5_21_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS

JoshTheGod
287. 5_21_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS 288. 5_22_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS 289. 5_22_2012 – EWT – TACTO – UgNazi Leaking DB of WHMCS 294. 5_24_2012 – EWT – TACTO – JoshTheGod’s IPs

wikiboat
291. 5_23_2012 – WikiBoat makes Fox News, BAC is Mentioned Directly

anonymoose
293. 5_24_2012 – EWT – TACTO – IRC Talk

sharpie
293. 5_24_2012 – EWT – TACTO – IRC Talk

Notion
293. 5_24_2012 – EWT – TACTO – IRC Talk

Syn
293. 5_24_2012 – EWT – TACTO – IRC Talk

LulzDog
293. 5_24_2012 – EWT – TACTO – IRC Talk

AnonTeenUSA
295. 5_24_2012 – OpNewSon Operation Commencement Time Posted297. 5_25_2012 – Update 2 to TACTO_ OpNewSon Operation Commencement Time Posted296. 5_25_2012 – Update 1 to TACTO_ OpNewSon Operation Commencement Time Posted AnonymousWiki
295. 5_24_2012 – OpNewSon Operation Commencement Time Posted297. 5_25_2012 – Update 2 to TACTO_ OpNewSon Operation Commencement Time Posted296. 5_25_2012 – Update 1 to TACTO_ OpNewSon Operation Commencement Time Posted

TheWikiBoat
299. 5_25_2012 – EWT – TACTO – TheWikiBoat Conversation320. 6_12_2012 – EWT TACTO – TheWikiBoat DB Leak – ProductSu… 348. 7_2_2012 – EWT TACTO – Pending Cyber Action Against Cap… 355. 7_11_2012 – EWT TACTO – WikiBoat Wednesday occupydowntown
301. 5_28_2012 – Operation Defense Bank of America Protest 291500-2000PSTMAY12, Ventura, CA


kennethlipp
302. 5_29_2012 – EWT – TACTO – Flame Attack


anonops_live
321. 6_9_2012 – EWT TACTO – INTEL Database Hack

anon_online
322. 6_11_2012 – EWT TACTO – Barclays_ Ministry of Lulz Threa…

Reckz0r
329. 6_18_2012 – EWT TACTO – Claimed Hack of Visa and Mastercard336. 6_20_2012 – EWT TACTO – @Reckz0r Exposed – By c0mrade

.c0mrade
307. 6_1_2012 – .c0mrade Hacks navy.mil and Releases User Data330. 6_18_2012 – .comrade Claims Internal Access to Citi and Bank of America332. 6_18_2012 – TACTO – Cisco Zero Day333. 6_19_2012 – INITIAL – Hacker claims access to Bank of America networks335. 6_20_2012 – EWT TACTO – TACTO_ .Comrade Posts Possible B…336. 6_20_2012 – EWT TACTO – @Reckz0r Exposed – By c0mrade 349. 7_2_2012 – EWT TACTO – Possible Breach of TrendMicro and Sykes
352. 7_6_2012 – EWT TACTO – .c0mrade Threatens to Release Em…
405. 8_15_2012 – EWT TACTO – BofA Emails Listed


SwaggSec
309. 6_3_2012 – SwaggSec Group Claims to hack China Telecom and Warner Bros.

Ashiayne Digital Security Team
337. 6_21_2012 – INITIAL – Iranian hacker group may retaliate for attacks against the
Central Bank of Iran and Ministry of Oil339. 6_22_2012 – UPDATE 1 – Iranian hacker group may retaliate for attacks against the Central Bank of Iran and Ministry of Oil340. 6_22_2012 – FLASH FINAL – Iranian hacker group may retaliate for attacks against the Central Bank of Iran

RedBaronlulz
348. 7_2_2012 – EWT TACTO – Pending Cyber Action Against Cap…

CERT_Italia
349. 7_2_2012 – EWT TACTO – Possible Breach of TrendMicro and Sykes

dream34
351. 7_5_2012 – EWT TACTO – ATM Destroyed

CoachWolfVA
353. 7_7_2012 – EWT TACTO – BofA ATM Unsecured in Virginia

IonCuber
355. 7_11_2012 – EWT TACTO – WikiBoat Wednesday

danneh
355. 7_11_2012 – EWT TACTO – WikiBoat Wednesday

AnonymousWWN
366. 7_16_2012 – EWT TACTO – Operation Robin Hood Reactivated…

MidasBank
367. 7_18_2012 – EWT TACTO – ITWallStreet.com Hacked and Data…

57UN
371. 7_24_2012 – EWT TACTO – Nvidia Froum Hacked

Zer0Pwn
373. 7_26_2012 – EWT TACTO – Possible Hack of World Trade Org…

ratdogfreak’s
378. 7_30_2012 – EWT TACTO – Operation at BofA Branch 18 AUG …

Team Digi7al
385. 8_4_2012 – EWT TACTO – itcdc.com hacked, 1 BofA email p…

Kx499
392. 8_8_2012 – EWT TACTO – Credit Card Compromise

Theurgia_Goetia
410. 8_18_2012 – EWT TACTO – OpBilderberg FaceBook Page Delet…413. 8_19_2012 – EWT TACTO – OpBilderberg Posts Bank of Engla…

Sunki
248. 4_30_2012 – EWT – TACTO – Government Credit Card Info

YD
248. 4_30_2012 – EWT – TACTO – Government Credit Card Info Which operations have they watched?

After researching all the intel gathered and leaked i have come across the below operations.


Operation Name

Mentioned in

Hiroshima 03. 12_21_2011 – TACTO – Operation Hiroshima
05. 12_23_2011 – TACTO – Money Trail
42. 1_3_2012 – EWT – TACTO-d0x OpHiroshima d0x Puig Philip counselor within the Government of Andalusia

LulzXmas 01. 12_19_2011 – TACTO – LulzXmas
10. 12_28_2011 – TACTO – SpecialForces.com
11. 12_28_2011 – TACTO – Bank Related
13. 12_29_2011 – TACTO – SONY
47. 1_6_2012 – FLASH UPDATE – 5_ STRATFOR (vendor) hacked, client list released, credit cards exposed74. 1_23_2012 – TACTO – Stratfor Email Teaser 3

Ababil 03. 10_23_2012 – Daily Intelligence Summary, 23 October 2012
12. 10_23_2012 – PasteMon Alert
27. 10_23_2012 – TACTO Hilf-ol-Fozoul post regarding OpAbabil

opbanksru 04. 10_24_2012 – Daily Cyber Threat Highlights – 24 October 2012

OpRobinHood 07. 12_26_2011 – TACTO – Donations18. 12_31_2011 – TACTO – Credit Card Release89. 1_28_2012 – TACTO – Bank Transfer Day387. 8_5_2012 – EWT TACTO – OpRobinHood_ Targeting Wal-Mart …

BlackMirrorProject 11. 10_24_2012 – EWT TACTO – @uk_anonymous #BlackMirrorProjec…

OpVendetta 13. 10_25_2012 – PasteMon Alert
15. 10_25_2012 – PasteMon Alert

OpMayhem 13. 12_29_2011 – TACTO – SONY

OpEndHunger 15. 12_30_2011 – EWT – TACTO

OpFiresale 36. 1_3_2012 – EWT – TACTO-OPFiresail in Danger_

SOPA 43. 1_3_2012 – EWT – TACTO-JAN 5th STOP SOPA STORM 256. 5_8_2012 – 120507 1717 – TACTO – UPDATE DDoS target priority list

Italy 52. 1_12_2012 – EWT – TACTO-OpItaly, DDOS on gonverno.it

opmegaupload 67. 1_20_2012 – FLASH INITIAL_ Nasdaq named as DDoS target 66. 1_20_2012 – EWT – TACTO-FI Threat69. 1_20_2012 – EWT – TACTO- opmegaupload Target List68. 1_20_2012 – EWT – TACTO-opmegaupload paste to LOIC Cannon75. 1_24_2012 – EWT – TACTO-FI Threat77. 1_24_2012 – EWT – TACTO-opmegaupload Targets and code
78. 1_24_2012 – EWT – TACTO-opmegaupload target fbi.gov


OpGlobalBlackout 119. 2_25_2012 – TACTO – Video of HOIC Attack on Capital One Website120. 2_15_2012 – TACTO – OpGlobalBlackout Pastes

opdefense 212. 4_12_2012 – DDoS Attack on Symantec.com 213. 4_13_2012 – EWT – TACTO – Fsround.org 215. 4_15_2012 – DDoS Target Change to csc.com (CISPA Supporter) 216. 4_15_2012 – UPDATE to TACTO_ DDoS Target Change to csc.com (CISPA Supporter) 217. 4_15_2012 – UPDATE II to TACTO_ DDoS Target Change to csc.com (CISPA Supporter)234. 4_27_2012 – UPDATE II to TACTO_ CISPA Bill Passed by House of Representatives 4_26_12 301. 5_28_2012 – Operation Defense Bank of America Protest 291500-2000PSTMAY12, Ventura, CA


OpNewSon 295. 5_24_2012 – OpNewSon Operation Commencement Time Posted
297. 5_25_2012 – Update 2 to TACTO_ OpNewSon Operation Commencement Time Posted296. 5_25_2012 – Update 1 to TACTO_ OpNewSon Operation Commencement Time Posted298. 5_25_2012 – EWT – TACTO – VoxAnon IRC Update300. 5_29_2012 – EWT – TACTO – OpNewSon314. 6_8_2012 – TACTO – OpNewSon Part 2 and 3

OPPayback 29. 1_3_2012 – TACTO – Financial Industry

OpWestPapua 19. 12_31_2011 – EWT – TACTO
23. 1_1_2012 – EWT – TACTO

TYLER 265. 5_11_2012 – TACTO – TYLER discussion266. 5_12_2012 – UPDATE TACTO – TYLER Chat Room (Transcript)267. 5_12_2012 – UPDATE TACTO – TYLER Discussion (Chat Log)311. 6_6_2012 – TACTO – Tyler – Project Mayhem Details