37
Information Warfare Center: www.informationwarfarecenter.com 1 0 20 40 60 80 100 120 140 160 Website defacements 2/11/2013 2/12/20132 2/13/20133 2/14/20134 2/15/20135 2/16/20136 2/17/20137 Attackers Ashiyane Digital Security Team 1923Turk Barbaros-DZ brwsk007 Dr.SHA6H DZ27 HighTech Hmei7 Micky TurkHackArmy The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors include system compromise, social engineering, and even traditional espionage. Obama’s Executive Order on cyber security is sparking the freedom of speech and 4 th amendment debate along with the reintroduction of CISPA from the House Intelligence Committee. Because of this, Internet activists deliver 300000 anti-CISPA signatures to Congress, and Anonymous is now actively targeting US government sites with a declaration of cyber war. For those interested, IWC has release a few small how-to videos related to manual data carving, logical data recovery, forensic imaging, and a video to show how easy it is to connect to the Darknet covertly, setup a Tor hidden service using programs on a USB thumb drive. Visit the resource below and follow the “IWC Cyber Hints” link. http://informationwarfarecenter.com/Videos.html

Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

Information Warfare Center: www.informationwarfarecenter.com

1

0

20

40

60

80

100

120

140

160

Websitedefacements

2/11/2013

2/12/20132

2/13/20133

2/14/20134

2/15/20135

2/16/20136

2/17/20137

Attackers Ashiyane Digital Security Team

1923Turk

Barbaros-DZ

brwsk007

Dr.SHA6H

DZ27

HighTech

Hmei7

Micky

TurkHackArmy

The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors include system compromise, social engineering, and even traditional espionage.

Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate

along with the reintroduction of CISPA from the House Intelligence Committee. Because of this,

Internet activists deliver 300000 anti-CISPA signatures to Congress, and Anonymous is now actively

targeting US government sites with a declaration of cyber war.

For those interested, IWC has release a few small how-to videos related to manual data carving, logical

data recovery, forensic imaging, and a video to show how easy it is to connect to the Darknet covertly,

setup a Tor hidden service using programs on a USB thumb drive. Visit the resource below and follow

the “IWC Cyber Hints” link.

http://informationwarfarecenter.com/Videos.html

Page 2: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

2

Legal (7)

Obama cyber order rekindles differences

DHS, NIST lynchpins to helping cyber order succeed

Obama seen likely to urge Congress to pass cybersecurity laws in State of the Union address

Obama to sign executive order on cybersecurity

Fight cyber crime through information sharing

Obama set to bring back CISPA via executive fiat

Obama and Congress to crack down on cyber security

Government (25)

Anonymous Fails To Shut Down Live Streams Of Obama Address

Army Kills Last Remaining Spy Blimp

Bush family emails hacked, photos and personal gatecode leaked

Cyber Police Skills Gap Warning In UK

Cyber warriors Anonymous plan state-of-union attack

Cyberspying said to target U.S. businesses

DHS, NIST lynchpins to helping cyber order succeed

Do APTs present a credible threat to national security?

Domestic-Drone Industry Prepares For Big Battle With Regulators

Experts Cite Need for Obama's Cybersecurity Action

Hacker investigation continues

Hackers used public alert system for zombie warnings

Intel chairman: Obama's cybersecurity order paves the way for CISPA

Israeli troops swap guns for computers to fight cyberattacks

NASA Data May Have Uncovered Galaxy's Youngest Black Hole

National IT director: SC moving in right direction

Pentagon creates new medal for cyber, drone wars

Police Hold 11 Over Ransomware Scam Affecting Thousands

Police warn of Valentine’s Day fraud online

Raytheon Reveals Social Media Analysis Tool

Seismic Activity Reported In Area Of Previous North Korea Nuclear Tests

Shealy: Security not a priority at Department of Revenue

State making security strides but more work to be done

U.S. Target Of Sustained Cyber Espionage Campaign

U.S. will target foreign-based cyberespionage

Page 3: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

3

Technology (49)

"Facecrooks" site helping you steer clear of scams

Adobe Hit With Zero-Day PDF Attack

Adobe malware report probed; problem follows Flash security fix

Bill Gates Kicked It On Reddit Today

Bit 9 hacked, customers targeted with malware

Class of 2013: The future careers of this year's high school graduates

Comment Group hackers specialize in high-profile targeted hacks

Cyber enemy No. 1

Facebook Fesses Up To Security Breach

Facebook hacked in Zero-Day Attack

FIDO Alliance Says, 'Forget Passwords!'

Froedtert warns patients files may have been compromised

Google Chrome browser blocks websites with malware warnings, including YouTube

Google Play Sends App Buyers' Details To Devs

Highlights from 450 global data breach investigations

'Identity Thief' Increases Awareness of Crime

Infosec pros don't trust their own networks

Jawbone Warns Of Limited MyTalk Hack

Kids Are Hacking Each Other In Games Now

Linux Trailed Windows In Patching Zero-Days In 2012, Report Says

LTE-Advanced advances in new Broadcom modem

Malware-Servicing Websites Rocket 600 Percent, Say Researchers

Microsoft Confirms Kelihos Botnet Return On Its Radar

Microsoft Prepping Massive Security Update To Patch Near-Record 57 Bugs

Microsoft releases 12 bulletins that address 57 vulnerabilities

Montana TV Warns Of Zombie Attack In Prank Hack

One In Five Firms Facing Targeted Attacks

Oracle To Ship Revised Java Fix On February 19

Pakistani News Channel websites hacked by ZCompany Hacking Crew

Panelists advocate employee education, policy for cybersecurity

Password overload: How many can we actually remember?

Report: Marketing Cybercrime to Infect America

Retail Now Accounts for 45% of All Global Data Breaches

RuneScape Spiked With Trojan: 11-Year-Old Kid Writes Malware To Steal Passwords

Scammers Posing as Microsoft Reps to Steal Your Info

Stopping keyloggers before tax season

Students Explore Hacker Methods with Historical Perspective

Survey of GCs sees cybersecurity risk and anxiety

Trustwave: Linux platforms have “worst response time” for patching

Unlocking Ma Bell: How Phone Phreaks Came To Be

Page 4: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

4

UPDATE: Malware Attack Permanently Shuts Down OpenX OnRamp

Valentine’s Day Scammers Give Love a Bad Name

Valentine's Day Scammers Go for the Heart

VMware Administrator Bug Snapped Shut

Week in review: Critical Flash update, Bamital botnet takedown, and children turning into malware developers

What to do when you’ve been hacked

What to do with that old PC

Yahoo 5 Years Behind on Java Security

Zombie Hoax Blamed On Lax Passwords

Mobile (4)

The Five: Smartphone security

Boffins Freeze Phones To Crack Android Crypto

iOS 6.x Hack Allows Personal Data Export, Free Calls

Why Do iPhone And iPad Users Jailbreak? Freedom

Page 5: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

5

FBI News

FBI Law Enforcement Bulletin is Now Online

Government (7)

Consultant for the Florida Department of Transportation Pleads Guilty to Accepting a Bribe

Former Department of Defense Contractor Sentenced to 30 Months in Prison for Smuggling Kickback Proceeds from Afghanistan to the United States

Former Oklahoma Detention Officer Indicted for Making False Statements to the FBI

Guilty Plea Entered by Second Contractor Charged with Paying Bribes to Director of Traffic Engineering

Nine Charged with Conspiracy and Bribery Involving Southern California DMV Offices

NOAH Contractor Richard Hall Sentenced for Conspiracy and Theft from a Program Receiving Federal Funds

Transocean Pleads Guilty, is Sentenced to Pay $400 Million in Criminal Penalties for Criminal Conduct Leading to Deepwater Horizon Disaster

Technology (4)

A Valentine’s Day Warning

Hampton Man Sentenced for Wire Fraud

Looking for Love? Beware of Online Dating Scams

Riverview Woman Pleads Guilty to Tax Fraud Conspiracy and Aggravated Identity Theft

CPKP / Human trafficking(12)

Buffalo Man Pleads Guilty to Possession of Child Pornography

Cape Cod Man Pleads Guilty to Possessing Child Pornography

Charlotte Woman Sentenced for Role in Recruiting 13-Year-Old Girl into Prostitution Organization

Homer Resident Sentenced to 10 Years for Distributing Drugs to Teenage Girls and Possessing Child Pornography

Illinois Man Found Guilty of Sex Trafficking

Indiana Man Indicted on Charges of Sexually Exploiting Kansas Girl

Lummi Tribal Member Sentenced to 14 Years in Prison for Sexually Molesting Young Children

Maryland Man Pleads Guilty to Distribution of Child Pornography

Maryland Man Pleads Guilty to Possession of Child Pornography

Newtown Man Admits Producing Child Pornography

Nicholson Man Charged with Producing Child Pornography

Opelika Man Sentenced to 35 Years in Prison for Producing Child Pornography

Page 6: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

6

Mobile (3)

USB Sharp v1.3.4 iPad iPhone - Multiple Vulnerabilities

Huawei Mobile Partner Poor Permissions

Air Disk Wireless 1.9 iPad iPhone - Multiple Vulnerabilities

Exploits (20)

Brother HL5370 Command Execution / Password Guessing

.NET Framework EncoderParameter Integer Overflow

chillyCMS 1.3.0 Shell Upload / Access Bypass

D-Link DIR-615 Rev H CSRF / Disclosure / Command Injection

Foxit Reader Plugin URL Processing Buffer Overflow

FreeFloat FTP 1.0 Buffer Overflow

IRIS Citations Management Tool Command Execution

Linksys E1500 / E2500 XSS / CSRF / Traversal / Command Injection

Linksys WAG200G XSS / Command Injection

Linksys WRT160N XSS / CSRF / Command Injection

Microsoft Internet Explorer SLayoutRun Use-After-Free (MS13-009)

Novell GroupWise Client gwcls1.dll ActiveX Remote Code Execution

Photodex ProShow Producer 5.0.3297 Buffer Overflow

Photodex ProShow Producer 5.0.3297 Memory Corruption

Polycom HDX Telnet Authorization Bypass

SAP Netweaver Message Server Buffer Overflow

Smoke Loader LFI / File Deletion

Sparx Systems Enterprise Architect 9.3.931 Corporate Password Disclosure

Windows Manage Persistent Payload Installer

VMWare OVF Tools Format String Vulnerability

This section of the CIR is dedicated to inform the public exploits, tools, and whitepapers that may directly affect the security posture of an organization. The term “Proof of Concept (PoC)” is another term for working exploit. Many of these PoCs will eventually find themselves in malicious logic such as viruses, Trojans, and root kits.

Page 7: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

7

Web (51)

AbanteCart 1.1.3 Cross Site Scripting

0101SHOP CMS SQL Injection

BlackNova Traders SQL Injection

chillyCMS 1.3.0 - Multiple Vulnerabilities

Cometchat - Multiple Vulnerabilities

Cometchat Application - Multiple Vulnerabilities

Cometchat Cross Site Scripting / Code Execution

Demandware Store Cross Site Scripting

D-Link DIR-615 rev H - Multiple Vulnerabilities

Easy Live Shop System SQL Injection Vulnerability

Edimax EW-7206APg / EW-7209APg Redirection / XSS / Header Injection

Edimax EW-7206-APg and EW-7209APg - Multiple Vulnerabilities

Hiverr v2.2 - Multiple Vulnerabilities

IBM Lotus Domino 8.5.3 XSS / CSRF / Redirection

IP.Gallery 4.2.x and 5.0.x Persistent XSS Vulnerability

IRIS Citations Management Tool (post auth) Remote Command Execution

Linksys E1500/E2500 - Multiple Vulnerabilities

Linksys WAG200G - Multiple Vulnerabilities

Linksys WRT160N - Multiple Vulnerabilities

Netgear DGN2200B - Multiple Vulnerabilities

OpenEMR 4.1.1 (ofc_upload_image.php) Arbitrary File Upload Vulnerability

OpenEMR 4.1.1 Shell Upload

OpenPLI OS Command Execution / Cross Site Scripting

OpenPLI v3.0 beta (OpenPLi-beta-dm7000-20130127-272) - Multiple Vulnerabilities

osCommerce 2.3.3 Cross Site Request Forgery

PayPal Cross Site Scripting

Paypal Marketing Cross Site Scripting

Raidsonic IB-NAS5220 / IB-NAS4220-B XSS / Authentication Bypass

Raidsonic IB-NAS5220 and IB-NAS4220-B - Multiple Vulnerabilities

Scripts Genie Domain Trader (catalog.php, id param) - SQL Injection Vulnerability

Scripts Genie Domain Trader SQL Injection

Scripts Genie Gallery Personals (gallery.php, L param) - SQL Injection Vulnerability

Scripts Genie Gallery Personals SQL Injection

Scripts Genie Games Site SQL Injection

Scripts Genie Hot Scripts Clone (showcategory.php, cid param) - SQL Injection Vulnerability

Scripts Genie Pet Rate Pro - Multiple Vulnerabilities

Scripts Genie Top Sites (out.php, id param) - SQL Injection Vulnerability

Scripts Genie Top Sites SQL Injection

Page 8: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

8

Shopping.com API Cross Site Scripting

Sonar 3.4.1 Cross Site Scripting

Sonicwall OEM Scrutinizer 9.5.2 Cross Site Scripting

Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities

Sonicwall Scrutinizer 9.5.2 SQL Injection

Sonicwall Scrutinizer v9.5.2 - SQL Injection Vulnerability

TP-LINK Admin Panel Multiple CSRF Vulnerabilities

TP-Link TL-WA701N / TL-WA701ND - Multiple Vulnerabilities

TP-Link TL-WA701N / TL-WA701ND Directory Traversal / XSS

Transferable Remote 1.1 XSS / LFI / Command Injection

Transferable Remote v1.1 iPad iPhone - Multiple Vulnerabilities

Ultra Light Forum Cross Site Scripting

Ultra Light Forum Persistant XSS Vulnerability

DoS (1)

SAP Netweaver Message Server Multiple Vulnerabilities

Tools (10)

360-FAAR Firewall Analysis Audit And Repair 0.3.9

Bluefog 0.0.4

Haveged 1.7a

ipset_list 2.6

ipset-bash-completion 1.9

Net-War Reaver Wrapper

PHP Kit 1.0

SI6 Networks' IPv6 Tookit 1.3

strongSwan IPsec Implementation 5.0.2

Web Exploitation Engine 0.1

Papers (2)

A Short Guide On ARM Exploitation

Hacking Trust Relationships Between SIP Gateways

The Beginner’s Guide to the Internet Underground v0.41

Page 9: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

9

Mobile

Huawei Secunia Security Advisory 52014

Secunia Security Advisory - Myo Soe has discovered a security issue in Huawei Mobile Partner, which can be exploited by malicious, local users to gain escalated privileges.

Research In Motion (RIM)

Secunia Security Advisory 52168

Secunia Security Advisory - Research In Motion has acknowledged two vulnerabilities in BlackBerry Enterprise Server, which can be exploited by malicious people to compromise a vulnerable system.

Software

Vendor Advisory Description

AbanteCart Secunia Security

Advisory 52165

Secunia Security Advisory - Gjoko Krstic has discovered

multiple vulnerabilities in AbanteCart, which can be

exploited by malicious people to conduct cross-site scripting

attacks.

Accela Secunia Security

Advisory 52200

Secunia Security Advisory - A vulnerability has been

reported in Accela / eAccela BizSearch, which can be

exploited by malicious people to conduct spoofing attacks

Adobe Secunia Security

Advisory 52120

Secunia Security Advisory - Two vulnerabilities have been

reported in Adobe Shockwave Player, which can be exploited

by malicious people to compromise a user's system.

Adobe Secunia Security

Advisory 52166

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Adobe Flash Player and AIR, which can be

exploited by malicious people to disclose certain sensitive

information and compromise a user's system.

Adobe Secunia Security

Advisory 52196

Secunia Security Advisory - Two vulnerabilities have been

reported in Adobe Reader and Adobe Acrobat, which can be

exploited by malicious people to compromise a user's system.

Adobe Technical Cyber

Security Alert 2013-

43A

Technical Cyber Security Alert 2013-43A - Select Adobe

software products contain multiple vulnerabilities. Adobe

has released updates to address these vulnerabilities.

Apache Apache CXF WS-

Security

URIMappingIntercep

tor Bypass

Apache CXF suffers from a vulnerability when a simple

SOAP service is secured with the WSS4JInInterceptor, which

enables WS-Security processing of the request. WS-Security

processing is completely bypassed in the case of a HTTP GET

request, and so access to the service can be enabled by the

URIMappingInterceptor. This vulnerability affects all

versions of Apache CXF prior to 2.5.8, 2.6.5 and 2.7.2. CXF

2.7.1 is not affected by default, however the vulnerability

exists if you are explicitly adding the URIMappingInterceptor

to the default chain.

Page 10: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

10

Apache Apache CXF WS-

Security

UsernameToken

Bypass

Apache CXF suffers from a UsernameToken WS-

SecurityPolicy bypass vulnerability. This vulnerability affects

all versions of Apache CXF prior to 2.5.9, 2.6.6 and 2.7.3.

Apache Secunia Security

Advisory 51988

Secunia Security Advisory - Two security issues have been

reported in Apache CXF, which can be exploited by malicious

people to bypass certain security restrictions.

Atmel Atmel AT91SAM7XC

Crypto Key Recovery

The Atmel AT91SAM7XC series of microprocessors suffer

from a cryptography key recovery vulnerability due to poor

memory management.

CA Secunia Security

Advisory 52192

Secunia Security Advisory - CA has acknowledged a security

issue in CA ControlMinder, which can be exploited by

malicious people to bypass certain security restrictions.

Cisco Secunia Security

Advisory 52109

Secunia Security Advisory - A vulnerability has been

reported in Cisco Unified MeetingPlace, which can be

exploited by malicious people to conduct cross-site scripting

attacks.

Cisco Secunia Security

Advisory 52194

Secunia Security Advisory - A vulnerability has been

reported in Cisco Unified MeetingPlace, which can be

exploited by malicious people to conduct cross-site request

forgery attacks.

Core Secunia Security

Advisory 52215

Secunia Security Advisory - Core Security has reported two

vulnerabilities in SAP NetWeaver, which can be exploited by

malicious people to compromise a vulnerable system.

Drupal Drupal Banckle Chat

7.x Access Bypass

Drupal Banckle Chat third party module version 7.x suffers

from an access bypass vulnerability.

Drupal Drupal Manager

Change For Organic

Groups 7.x Cross Site

Scripting

Drupal Manager Change for Organic Groups third party

module version 7.x suffers from a cross site scripting

vulnerability.

EMC Secunia Security

Advisory 52010

Secunia Security Advisory - A vulnerability has been

reported in EMC AlphaStor, which can be exploited by

malicious people to compromise a vulnerable system.

Empirum Empirum Password

Obfuscation

Empirum version 14.0 from Matrix42 is prone to a trivial

password recovery attack that allows users to obtain

passwords encrypted with the EmpCrypt.exe.

Empirum Empirum Password

Obfuscation

Empirum version 14.0 from Matrix42 is prone to a trivial

password recovery attack that allows users to obtain

passwords encrypted with the EmpCrypt.exe.

Ganglia Secunia Security

Advisory 52100

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Ganglia, which can be exploited by

malicious people to conduct cross-site scripting attacks.

Page 11: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

11

Google Secunia Security

Advisory 52163

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Google Chrome, which can be exploited by

malicious people to disclose certain sensitive information and

compromise a user's system.

HP HP Security Bulletin

HPSBMU02815

SSRT100715 5

HP Security Bulletin HPSBMU02815 SSRT100715 5 - Potential

security vulnerabilities have been identified with HP

SiteScope. The vulnerabilities in SiteScope SOAP features

could be remotely exploited to allow disclosure of

information or code execution. Revision 5 of this advisory.

IBM Secunia Security

Advisory 52128

Secunia Security Advisory - A weakness and multiple

vulnerabilities have been reported in IBM Tivoli Application

Dependency Discovery Manager, which can be exploited by

malicious people to conduct spoofing, session fixation, cross-

site scripting, and request forgery attacks.

InfoSphere Secunia Security

Advisory 52140

Secunia Security Advisory - Some weaknesses and a

vulnerability have been reported in InfoSphere Master Data

Management Collaboration Server, which can be exploited by

malicious people to conduct spoofing and cross-site scripting

attacks

IP.Gallery IP.Gallery 4.2.x /

5.0.x Cross Site

Scripting

IP.Gallery versions 4.2.x and 5.0.x suffer from a persistent

cross site scripting vulnerability.

IP.Gallery Secunia Security

Advisory 52144

Secunia Security Advisory - A vulnerability has been

reported in the IP.Gallery module for IP.Board, which can be

exploited by malicious users to conduct script insertion

attacks.

KingView Secunia Security

Advisory 52190

Secunia Security Advisory - A vulnerability has been

reported in KingView, which can be exploited by malicious

people to compromise a user's system.

Lockstep Secunia Security

Advisory 50260

Secunia Security Advisory - worstenbrood has discovered a

vulnerability in Lockstep Systems Backup for Workgroups,

which can be exploited by malicious people to compromise a

user's system.

Microsoft Microsoft Internet

Explorer 8 Use-After-

Free

A use-after-free memory corruption vulnerability was

identified in Microsoft Internet Explorer 8. This allows a

malicious user to remotely execute arbitrary code on a

vulnerable user's machine, in the context of the current user.

The memory corruption happens when the application of a

style sheet performs style computations on the DOM. A

CParaElement node is released but a reference is still kept in

CDoc. This memory is reused when a CDoc relayout is

performed. Microsoft patch MS13-009 addresses this issue.

Page 12: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

12

Microsoft Microsoft Security

Bulletin Summary

For February, 2013

This bulletin summary lists 12 released Microsoft security

bulletins for February, 2013.

Microsoft Secunia Security

Advisory 52122

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Microsoft Internet Explorer, which can be

exploited by malicious people to disclose sensitive

information and compromise a user's system.

Microsoft Secunia Security

Advisory 52129

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Internet Explorer, which can be

exploited by malicious people to compromise a user's system.

Microsoft Secunia Security

Advisory 52130

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Windows, which can be exploited by

malicious people to compromise a user's system.

Microsoft Secunia Security

Advisory 52133

Secunia Security Advisory - Microsoft has acknowledged

multiple vulnerabilities in Microsoft Exchange Server, which

can be exploited by malicious people to cause a DoS (Denial

of Service) and compromise a vulnerable system.

Microsoft Secunia Security

Advisory 52136

Secunia Security Advisory - Microsoft has acknowledged

multiple vulnerabilities in Microsoft FAST Search Server 2010

for SharePoint, which can be exploited by malicious people to

cause a DoS (Denial of Service) and compromise a vulnerable

system.

Microsoft Secunia Security

Advisory 52138

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Windows, which can be exploited by

malicious users to cause a DoS (Denial of Service).

Microsoft Secunia Security

Advisory 52143

Secunia Security Advisory - A vulnerability has been

reported in Microsoft .NET Framework, which can be

exploited by malicious people to compromise a user's system.

Microsoft Secunia Security

Advisory 52156

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Microsoft Windows, which can be exploited

by malicious, local users to gain escalated privileges.

Microsoft Secunia Security

Advisory 52157

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Microsoft Windows, which can be exploited

by malicious, local users to gain escalated privileges.

Microsoft Secunia Security

Advisory 52158

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Windows, which can be exploited by

malicious people to cause a DoS (Denial of Service).

Microsoft Secunia Security

Advisory 52162

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Windows, which can be exploited by

malicious, local users to gain escalated privileges.

Microsoft Secunia Security

Advisory 52164

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Microsoft Windows, which can be exploited

by malicious people to disclose certain sensitive information

and compromise a user's system.

Page 13: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

13

Microsoft Secunia Security

Advisory 52184

Secunia Security Advisory - A vulnerability has been

reported in Microsoft Windows, which can be exploited by

malicious people to compromise a user's system.

Microsoft Secunia Security

Advisory 52223

Secunia Security Advisory - Walied Assar has discovered a

vulnerability in Microsoft Windows, which can be exploited

by malicious, local users to cause a Denial of Service (DoS).

Microsoft Technical Cyber

Security Alert 2013-

43B

Technical Cyber Security Alert 2013-43B - Select Microsoft

software products contain multiple vulnerabilities. Microsoft

has released updates to address these vulnerabilities.

Moxa Secunia Security

Advisory 52141

Secunia Security Advisory - A weakness has been reported in

Moxa EDR-G903 Series, which can be exploited by malicious

people to conduct brute force attacks.

Newscoop Secunia Security

Advisory 51921

Secunia Security Advisory - Pawel Haldrzynski has

discovered a vulnerability in Newscoop, which can be

exploited by malicious people to conduct cross-site scripting

attacks.

NextGEN Secunia Security

Advisory 52137

Secunia Security Advisory - Henrique Montenegro has

discovered a weakness in the NextGEN Gallery plugin for

WordPress, which can be exploited by malicious people to

disclose certain system information.

Nuance Secunia Security

Advisory 52119

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Nuance PDF Reader, which can be exploited

by malicious people to compromise a user's system.

OpenStack Secunia Security

Advisory 52139

Secunia Security Advisory - A vulnerability has been

reported in OpenStack Keystone, which can be exploited by

malicious people to cause a DoS (Denial of Service).

Pidgin Secunia Security

Advisory 52178

Secunia Security Advisory - Multiple vulnerabilities have

been reported in Pidgin, which can be exploited by malicious

people to manipulate certain data, cause a DoS (Denial of

Service), and compromise a user's system.

Ruby Secunia Security

Advisory 52075

Secunia Security Advisory - A vulnerability has been

reported in the json gem for Ruby, which can be exploited by

malicious people to bypass certain security restrictions.

Ruby Secunia Security

Advisory 52112

Secunia Security Advisory - Two vulnerabilities have been

reported in Ruby on Rails, which can be exploited by

malicious people to bypass certain security restrictions and

compromise a vulnerable system.

Ruby Secunia Security

Advisory 52193

Secunia Security Advisory - A vulnerability has been

reported in the nori gem for Ruby, which can be exploited by

malicious people to compromise a vulnerable system.

Symantec Secunia Security

Advisory 52219

Secunia Security Advisory - Two vulnerabilities have been

reported in Symantec Encryption Desktop, which can be

exploited by malicious, local users to gain escalated

privileges.

Page 14: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

14

VirusScan Secunia Security

Advisory 52147

Secunia Security Advisory - A vulnerability has been

reported in VirusScan Enterprise and Host Intrusion

Prevention, which can be exploited by malicious, local users

to potentially gain escalated privileges.

WebSphere Secunia Security

Advisory 52176

Secunia Security Advisory - Multiple vulnerabilities have

been reported in WebSphere Message Broker, which can be

exploited by malicious people to bypass certain security

restrictions, manipulate certain data, and cause a DoS (Denial

of Service).

WebSphere Secunia Security

Advisory 52191

Secunia Security Advisory - A vulnerability with an

unknown impact has been reported in WebSphere Cast Iron

Cloud Integration.

WordPress Secunia Security

Advisory 50836

Secunia Security Advisory - Charlie Eriksen has discovered

two vulnerabilities in the WP Online Store plugin for

WordPress, which can be exploited by malicious people to

disclose potentially sensitive information.

WordPress Secunia Security

Advisory 52079

Secunia Security Advisory - Henrique Montenegro has

discovered a vulnerability in the Pinboard theme for

WordPress, which can be exploited by malicious people to

conduct cross-site scripting attacks.

Xen Secunia Security

Advisory 52071

Secunia Security Advisory - A weakness has been reported in

Xen, which can be exploited by malicious, local users in a

guest virtual machine to cause a DoS (Denial of Service).

Page 15: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

15

Linux / Unix Advisories

Distro Advisory Description

Debian Debian Security Advisory 2612-2

Debian Linux Security Advisory 2612-2 - This update to the previous ircd-ratbox DSA only raises the version number to ensure that a higher version is used than a previously binNMU on some architectures.

Debian Debian Security Advisory 2619-1

Debian Linux Security Advisory 2619-1 - A buffer overflow was found in the e1000e emulation, which could be triggered when processing jumbo frames.

Debian Debian Security Advisory 2620-1

Debian Linux Security Advisory 2620-1 - Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.

Debian Debian Security Advisory 2622-1

Debian Linux Security Advisory 2622-1 - Multiple vulnerabilities have been found in OpenSSL

Debian Debian Security Advisory 2623-1

Debian Linux Security Advisory 2623-1 - Kevin Cernekee discovered that a malicious VPN gateway can send crafted responses which trigger stack-based buffer overflows.

Debian Debian Security Advisory 2624-1

Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

Debian Debian Security Advisory 2624-1

Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

Debian Debian Security Advisory 2625-1

Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

Debian Debian Security Advisory 2625-1

Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

Debian Secunia Security Advisory 52038

Secunia Security Advisory - Debian has issued an update for xen-qemu-dm-4.0. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

Debian Secunia Security Advisory 52180

Secunia Security Advisory - Debian has issued an update for rails. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

Page 16: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

16

Debian Secunia Security Advisory 52209

Secunia Security Advisory - Debian has issued an update for openssl. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service) of the application using the library.

Mandriva Mandriva Linux Security Advisory 2013-009

Mandriva Linux Security Advisory 2013-009 - The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service via a Client: Diffie-Hellman Key Exchange Init packet. The updated packages have been upgraded to the 0.5.4 version which is not affected by this issue.

Mandriva Mandriva Linux Security Advisory 2013-010

Mandriva Linux Security Advisory 2013-010 - Multiple security issues were identified and fixed in OpenJDK. The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues.

Mandriva Mandriva Linux Security Advisory 2013-011

Mandriva Linux Security Advisory 2013-011 - The Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a IFRAME element. Cross-site request forgery vulnerability in the Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions. The updated packages have been patched to correct these issues.

Mandriva Mandriva Linux Security Advisory 2013-012

Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

Mandriva Mandriva Linux Security Advisory 2013-012

Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

Page 17: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

17

Red Hat Red Hat Security Advisory 2013-0248-01

Red Hat Security Advisory 2013-0248-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.

Red Hat Red Hat Security Advisory 2013-0249-01

Red Hat Security Advisory 2013-0249-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.

Red Hat Red Hat Security Advisory 2013-0250-01

Red Hat Security Advisory 2013-0250-01 - ELinks is a text-based web browser. ELinks does not display any images, but it does support frames, tables, and most other HTML tags. It was found that ELinks performed client credentials delegation during the client-to-server GSS security mechanisms negotiation. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. This issue was discovered by Marko Myllynen of Red Hat. All ELinks users are advised to upgrade to this updated package, which contains a backported patch to resolve the issue.

Red Hat Red Hat Security Advisory 2013-0253-01

Red Hat Security Advisory 2013-0253-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. It was found that an excessive amount of information was logged when invalid tokens were requested, resulting in large log files. An attacker could use this flaw to consume an excessive amount of disk space by requesting a large number of invalid tokens. The CVE-2013-0247 issue was discovered by Dan Prince of Red Hat.

Page 18: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

18

Red Hat Red Hat Security Advisory 2013-0254-01

Red Hat Security Advisory 2013-0254-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes several vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB13-05, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content.

Red Hat Red Hat Security Advisory 2013-0256-01

Red Hat Security Advisory 2013-0256-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0257-01

Red Hat Security Advisory 2013-0257-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Page 19: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

19

Red Hat Red Hat Security Advisory 2013-0258-01

Red Hat Security Advisory 2013-0258-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0259-01

Red Hat Security Advisory 2013-0259-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0261-01

Red Hat Security Advisory 2013-0261-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. An attack technique was found against the W3C XML Encryption Standard when block ciphers were used in cipher-block chaining mode. A remote attacker could use this flaw to conduct chosen-ciphertext attacks, leading to the recovery of the entire plain text of a particular cryptogram by examining the differences between SOAP responses sent from JBoss Web Services.

Red Hat Secunia Security Advisory 52142

Secunia Security Advisory - Red Hat has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks

Page 20: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

20

Red Hat Secunia Security Advisory 52154

Secunia Security Advisory - Red Hat has issued an update for java-1.7.0-openjdk. This fixes multiple vulnerabilities, which can be exploited by by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Red Hat Secunia Security Advisory 52155

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-openjdk. This fixes multiple vulnerabilities, which can be exploited malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Red Hat Secunia Security Advisory 52183

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise Application Platform and JBoss Enterprise Web Platform. This fixes a security issue and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

Red Hat Secunia Security Advisory 52203

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

Slackware Slackware Security Advisory - OpenSSL Updates

Slackware Security Advisory - New openssl packages are available for Slackware 14.0, and -current to fix a bug in openssl-1.0.1d.

Slackware Slackware Security Advisory - Pidgin Updates

Slackware Security Advisory - New pidgin packages are available for Slackware 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.

SUSE Secunia Security Advisory 52077

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52135

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks.

SUSE Secunia Security Advisory 52148

Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library.

SUSE Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system

SUSE Secunia Security Advisory 52150

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.

SUSE Secunia Security Advisory 52151

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.

Page 21: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

21

SUSE Secunia Security Advisory 52152

Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52153

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52159

Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks.

SUSE Secunia Security Advisory 52160

Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

SUSE Secunia Security Advisory 52204

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact.

Ubuntu Secunia Security Advisory 52172

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

Ubuntu Secunia Security Advisory 52174

Secunia Security Advisory - Ubuntu has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

Ubuntu Secunia Security Advisory 52205

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

Ubuntu Ubuntu Security Notice USN-1716-1

Ubuntu Security Notice 1716-1 - It was discovered that gnome-screensaver did not start automatically after logging in. This may result in the screen not being automatically locked after the inactivity timeout is reached, permitting an attacker with physical access to gain access to an unlocked session.

Ubuntu Ubuntu Security Notice USN-1717-1

Ubuntu Security Notice 1717-1 - Sumit Soni discovered that PostgreSQL incorrectly handled calling a certain internal function with invalid arguments. An authenticated attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service.

Page 22: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

22

Ubuntu Ubuntu Security Notice USN-1719-1

Ubuntu Security Notice 1719-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1720-1

Ubuntu Security Notice 1720-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1721-1

Ubuntu Security Notice 1721-1 - It was discovered that curl incorrectly handled SASL authentication when communicating over POP3, SMTP or IMAP. If a user or automated system were tricked into processing a specially crafted URL, an attacker could cause a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service.

Ubuntu Ubuntu Security Notice USN-1722-1

Ubuntu Security Notice 1722-1 - It was discovered that jQuery incorrectly handled selecting elements using location.hash, resulting in a possible cross-site scripting (XSS) issue. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.

Ubuntu Ubuntu Security Notice USN-1723-1

Ubuntu Security Notice 1723-1 - Richard J. Moore and Peter Hartmann discovered that Qt allowed redirecting requests from http to file schemes. If an attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. This issue only affected Ubuntu 11.10, Ubuntu 12.04 LTS, and Ubuntu 12.10. Stephen Cheng discovered that Qt may report incorrect errors when ssl certificate verification fails. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1724-1

Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1724-1

Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.

Page 23: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

23

Ubuntu Ubuntu Security Notice USN-1725-1

Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.

Ubuntu Ubuntu Security Notice USN-1725-1

Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.

Ubuntu Ubuntu Security Notice USN-1726-1

Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1726-1

Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Page 24: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

24

: (556)

Notifier L Domain OS View

40

services.casa.gov.au/coa Win 2003 mirror

40

survey.casa.gov.au/040.htm Win 2003 mirror

:::Torres:::

dsm.gov.tr Unknown mirror

UGBrazil LAMMER and DDOSSER

apps.peugeot.pt Linux mirror

[IN]SecInjection

semec.urupa.ro.gov.br Linux mirror

[IN]SecInjection

www.urupa.ro.gov.br Linux mirror

1923Turk

bandaeng.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

chaengnoi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

derd.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

dky.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

donkaeo.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

donklong.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

duanbaknoi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

duthung.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

huadon.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

huadong.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

huamueang.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

khaennoi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

kkk.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

kns.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

kty.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

kuchan.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

kudkung.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

laengpaen.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

laohung.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

laoyai.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

lmk.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

maha.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

maphrik.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nadee.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nakham.yst1.go.th/aL_Pars.htm Win 2008 mirror

This section of the CIR is dedicated to inform the public of website defacements that have targeted either larger organizations or government agencies. The perpetrators of these attacks are all over the world and have different reasons for hacking that range from curiosity to hacktavism to state sponsored espionage/cyber warfare activity.

Page 25: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

25

1923Turk

nalu.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

namoom.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nasamai.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

naweing.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nd.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nf.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nited.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nongbok.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nonghin.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nonghoi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nongruea.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nongyang.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

nonkoy.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

phontan.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

phuehi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

plub.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

ponbang.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

psk.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

saingam.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

sampai.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

samran.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

samrong.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

sap.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

spn.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

tatthong.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

tecnicatura.corforiocolorado.g... Linux mirror

1923Turk

thungmon.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

tno.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

tongton.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

toongtae.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

wankru.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

wts.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

yangdiao.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

yangnoi.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

yk.yst1.go.th/aL_Pars.htm Win 2008 mirror

1923Turk

y-tech.yst1.go.th/aL_Pars.htm Win 2008 mirror

1o1or1not1

khuqldb7.gov.vn Win 2003 mirror

3n_byt3

www.khaokhansong.go.th/Home.php Linux mirror

AL.MaX HaCkEr

ecm.regione.veneto.it Linux mirror

AL.MaX HaCkEr

www.comune.castiglioneacasauri... Linux mirror

AL.MaX HaCkEr

www.geinfo.usp.br Linux mirror

AlbanianHackersCrew

www.drc.gov.bt Linux mirror

Amirh03in

www.stkc.go.th/content/189390 Linux mirror

anon

cpd.gov.kw Linux mirror

AnonymousZ

kpad.gorontalokab.go.id Linux mirror

AnonymousZ

tipikor.pn-gorontalo.go.id Linux mirror

ArabHaCk

www.gex.fr Linux mirror

Ashiyane Digital Security Team

elearning.anamai.moph.go.th/as... Linux mirror

Page 26: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

26

Ashiyane Digital Security Team

saton.go.th/crypt0.htm Linux mirror

Ashiyane Digital Security Team

truat.go.th/crypt0.htm Linux mirror

Ashiyane Digital Security Team

villaamelia.gob.ar Linux mirror

Ashiyane Digital Security Team

villaamelia.gov.ar Linux mirror

Ashiyane Digital Security Team

www.bjmbgl.gov.cn/newshow.php?... Linux mirror

Ashiyane Digital Security Team

www.criancaecologica.sp.gov.br... Win 2003 mirror

Ashiyane Digital Security Team

www.paoordonchai.go.th/thm/300... Linux mirror

Ashiyane Digital Security Team

www.wlhtjjw.gov.cn/admin/cx/20... FreeBSD mirror

Azy Martin

nilg.gov.bd Linux mirror

b0x

docs.whmcs.com/images/ FreeBSD mirror

Baader Meinhof

acoitacavalo.prodepa.gov.br/in... Linux mirror

Baader Meinhof

mercurio.detran.pa.gov.br/inde... Linux mirror

Baader Meinhof

ns1.detran.pa.gov.br/index.html Linux mirror

Baader Meinhof

www.detran.pa.gov.br/index.html Linux mirror

Barbaros-DZ

cs.sqds.gov.cn Win 2008 mirror

Barbaros-DZ

dl.lnzxw.gov.cn Win 2003 mirror

Barbaros-DZ

dytjj.gov.cn Win 2003 mirror

Barbaros-DZ

lgtw.luogang.gov.cn/dz.htm Win 2003 mirror

Barbaros-DZ

ny.gaotai.gov.cn Win 2003 mirror

Barbaros-DZ

ny.yuanjiang.gov.cn Win 2003 mirror

Barbaros-DZ

oa.bzqts.gov.cn Win 2008 mirror

Barbaros-DZ

plg1.obec.go.th/administration... Linux mirror

Barbaros-DZ

shicai.wangqing.gov.cn/dz.cer Win 2003 mirror

Barbaros-DZ

sl.tx.gov.cn Win 2003 mirror

Barbaros-DZ

snnm.gssn.gov.cn Win 2008 mirror

Barbaros-DZ

www.cmi3.obec.go.th/images/axd... Linux mirror

Barbaros-DZ

www.cri4.obec.go.th/index3.html Linux mirror

Barbaros-DZ

www.cti2.obec.go.th/1/dz.txt Linux mirror

Barbaros-DZ

www.dalimz.gov.cn Win 2003 mirror

Barbaros-DZ

www.jidong.gov.cn/dz.htm Win 2003 mirror

Barbaros-DZ

www.ncsj.gov.cn Win 2003 mirror

Barbaros-DZ

www.wh-aic.gov.cn/dz.htm Win 2003 mirror

Barbaros-DZ

www.zxdj.gov.cn Linux mirror

Bazinqa

www.dogubayazitmuftulugu.gov.tr Linux mirror

BlackHacker

www.campohidalguense.gob.mx/fo... Linux mirror

bogel

www.pn-pangkalanbun.go.id Linux mirror

bogel

www.pn-tamianglayang.go.id Linux mirror

bogel

www.probolinggokab.go.id Linux mirror

brwsk007

dflzw.wfjj.gov.cn/505.txt Win 2003 mirror

brwsk007

map.jshrss.gov.cn/505.txt Win 2003 mirror

brwsk007

www.cbcrmz.gov.cn/data/505.txt Win 2003 mirror

brwsk007

www.comune.anguillaraveneta.pd... Win 2003 mirror

brwsk007

www.comune.bellino.cn.it/cgi-b... Win 2003 mirror

brwsk007

www.comune.castellar.cn.it/cgi... Win 2003 mirror

brwsk007

www.comune.cavallermaggiore.cn... Win 2003 mirror

brwsk007

www.comune.lagnasco.cn.it/cgi-... Win 2003 mirror

brwsk007

www.comune.pagno.cn.it/cgi-bin... Win 2003 mirror

brwsk007

www.comune.pontechianale.cn.it... Win 2003 mirror

Page 27: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

27

brwsk007

www.comune.sanfront.cn.it/cgi-... Win 2003 mirror

brwsk007

www.comune.scarnafigi.cn.it/cg... Win 2003 mirror

brwsk007

www.comune.trichiana.bl.it/Doc... Win 2008 mirror

brwsk007

www.comune.verzuolo.cn.it/cgi-... Win 2003 mirror

brwsk007

www.djinfo.gov.cn/fck/UpLoad1/... Win 2003 mirror

brwsk007

www.dywghj.gov.cn/505.txt Win 2003 mirror

brwsk007

www.ecf.gov.cn/wusir/505.txt Win 2008 mirror

brwsk007

www.jngxrk.gov.cn/505.txt Win 2003 mirror

brwsk007

www.promueve.gob.bo/505.txt Win 2003 mirror

brwsk007

www.qx.gov.cn/505.txt Win 2008 mirror

brwsk007

www.tldmw.gov.cn/505.txt Win 2003 mirror

brwsk007

www.ylzjsw.gov.cn/Foosun_Data/... Win 2003 mirror

c0cain

www.ruiznayarit.gob.mx Linux mirror

c0d3-X-1337

maps.google.co.mw Linux mirror

c4

www.municarampoma.gob.pe/es/im... Linux mirror

Code inject0r

npfs-minfa.gov.pk Linux mirror

ColdHackers

menemenmesem.gov.tr Linux mirror

CrashBandicot69

www.kpp.ambon.go.id/MosTa.html Linux mirror

Cyb3rSec

lslab.lscore.ucla.edu Linux mirror

d3str0yers

www.consep.gob.ec/noticias/Ind... Linux mirror

DaiLexX

radtrials.mgh.harvard.edu/17sh... Linux mirror

DaiLexX

www.korem091asn.mil.id/images/... Linux mirror

DaiLexX

www.pn-blora.go.id Linux mirror

DevilCode

congresocam.gob.mx F5 Big-IP mirror

DevilCode

w3.lebanonembassy.my/shell.dia... Linux mirror

DevilCode

webdav.nencki.gov.pl FreeBSD mirror

DevilzSec

www6.excise.go.th/NEW_WEB/acti... Linux mirror

Dr.Freak

deosurat.gov.in Linux mirror

Dr.Freak

hesco.gov.pk/htmls/newsmediama... Win 2003 mirror

Dr.Freak

police.nferoze.gos.pk Win 2008 mirror

Dr.Freak

www.pakistanarmy.gov.pk/AWPRev... Win 2008 mirror

Dr.SHA6H

calbir.gov.tr Linux mirror

Dr.SHA6H

semecjeremoabo.ba.gov.br Linux mirror

Dr.SHA6H

www.ictd.gov.bd Linux mirror

Dr.SHA6H

www.mairie-thoiry.fr Linux mirror

Dr.SHA6H

www.moedu.gov.bd/images/ Linux mirror

Dr.SHA6H

www.moind.gov.bd/images/ Linux mirror

Dr.SHA6H

www.mopme.gov.bd/images/ Linux mirror

Dr.SHA6H

www.mosict.gov.bd/images/ Linux mirror

Dr.SHA6H

www.nlaso.gov.bd Linux mirror

Dr.SHA6H

www.nmst.gov.bd/templates/ Linux mirror

Dr.SHA6H

www.reprimin.gov.lk Linux mirror

Drac-101code

lektur.kemenag.go.id Linux mirror

Drac-101code

puspenda.kemenag.go.id Linux mirror

drie88

pn-gresik.go.id/errors.htm Linux mirror

Dz Mafia

ssk4.obec.go.th/main/dz.txt Linux mirror

DZ Mafia

www.brm4.obec.go.th/salary14/d... Linux mirror

DZ Mafia

www.cri1.obec.go.th/count.txt Linux mirror

Page 28: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

28

DZ Mafia

www.kri3.obec.go.th/plans/dz.txt Linux mirror

DZ Mafia

www.lpn1.obec.go.th/kmc/resear... Linux mirror

DZ Mafia

www.npt1.obec.go.th/test1/dz.txt Linux mirror

DZ Mafia

www.plg.obec.go.th/images/dz.txt Linux mirror

DZ27

arrayade.cef.fr/v2/ Linux mirror

DZ27

avanceaularge.cef.fr Linux mirror

DZ27

catho92.levallois.cef.fr/wordp... Linux mirror

DZ27

catho94-fontenay.cef.fr Linux mirror

DZ27

catholique-cherbourg.cef.fr Linux mirror

DZ27

communaute-sfx.cef.fr Linux mirror

DZ27

dev2.cef.fr/tisserands/wp-cont... Linux mirror

DZ27

fmjweb.catholique.fr Linux mirror

DZ27

jjsf-nantes.cef.fr Linux mirror

DZ27

musiquesacree-nantes.sites.cef... Linux mirror

DZ27

nd-rumengol-quimper.cef.fr Linux mirror

DZ27

paroissechancelade.catholique.... Linux mirror

DZ27

paroisse-marcel-callo-61.cef.f... Linux mirror

DZ27

paroisse-poissy-78.catholique.... Linux mirror

DZ27

paroissesaintemarguerite-paris... Linux mirror

DZ27

paroissestfrontstetienneperigu... Linux mirror

DZ27

paroisse-stjogeo-nantes.cef.fr Linux mirror

DZ27

paroissetroisermites.catholiqu... Linux mirror

DZ27

perigordcentre.catholique.fr/D... Linux mirror

DZ27

quimper-steir-odet.cef.fr/wp-c... Linux mirror

DZ27

rivage-nantes.cef.fr/DZ27.html Linux mirror

DZ27

saintecroixenchateaubriant-nan... Linux mirror

DZ27

saintnizier-lyon.catholique.fr Linux mirror

DZ27

st-paul-val-allier-cl.cef.fr//... Linux mirror

DZ27

vincennes-saintmande.catholiqu... Linux mirror

DZ27

www.aumonerie13-paris.cef.fr//... Linux mirror

DZ27

www.catho92-bagneux.cef.fr/DZ2... Linux mirror

DZ27

www.catholiques-en-laye-78.cef... Linux mirror

DZ27

www.centre-naudieres-nantes.ce... Linux mirror

DZ27

www.cofaec.cef.fr/imgcol/DZ27.... Linux mirror

DZ27

www.comune.bella.pz.it Linux mirror

DZ27

www.doyennedebain35.cef.fr/DZ2... Linux mirror

DZ27

www.eglise-breiziroise.cef.fr/... Linux mirror

DZ27

www.fillesdejesus.catholique.f... Linux mirror

DZ27

www.forum.cef.fr/test/DZ27.html Linux mirror

DZ27

www.funcionjudicial-santaelena... Linux mirror

DZ27

www.marguerittes.catholique.fr... Linux mirror

DZ27

www.musiquesacree-nantes.cef.f... Linux mirror

DZ27

www.ndesperance-paroisse38.cef.fr Linux mirror

DZ27

www.nd-nazareth-paris.cef.fr/p... Linux mirror

DZ27

www.notredame-clermont.cef.fr/... Linux mirror

DZ27

www.notre-dame-de-nantes.cef.f... Linux mirror

DZ27

www.paroissechampagne-lyon.cat... Linux mirror

DZ27

www.paroisse-epernay.cef.fr/DZ... Linux mirror

Page 29: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

29

DZ27

www.paroisse-francaise-barcelo... Linux mirror

DZ27

www.paroisse-joinville94.cef.fr Linux mirror

DZ27

www.paroisse-nd-lespieux.cef.f... Linux mirror

DZ27

www.paroissestecatherinedupeti... Linux mirror

DZ27

www.paroisse-st-manoire.cathol... Linux mirror

DZ27

www.paroisse-stsebastiensurloi... Linux mirror

DZ27

www.stdidier-limonest-lyon.cat... Linux mirror

DZ27

www.vergeze.catholique.fr/inde... Linux mirror

DZ27

www.veuves-chretiennes.cef.fr/... Linux mirror

Evil Genius Cyber Crimes

clothing.pof.gov.pk/categories... Solaris 9/10

mirror

EXPL()IT3R-Z

kgdcl.gov.bd/index.html Linux mirror

F15

www.sopley.gov.uk/syria.htm FreeBSD mirror

FAKE EBOZ

erzincan.gov.tr/index.php?opti... Linux mirror

FernandoAVT @BrDeface

www.novaesperancadosul.rs.gov.... Linux mirror

FurkHan

trabzonatk.gov.tr/noldu.html Linux mirror

Gabby

bpth-jm.go.id FreeBSD mirror

gaza hacker team

www.basra.gov.iq Linux mirror

gaza hacker team

www.moc.gov.iq/index.php Linux mirror

gaza hacker team

www.nsa.gov.iq Linux mirror

gaza hacker team

www.wasitic.gov.iq Linux mirror

gbs

www.comune.patti.me.it/babyqq.php Linux mirror

ghost-dz

mekhala.dwr.go.th/main/gh.html Win 2003 mirror

ghost-dz

www.10wsk.mil.pl/10wsk1/gh.html Linux mirror

ghost-dz

www.concytec.gob.pe/prospecta2... Linux mirror

ghost-dz

www.forestierenchef.gouv.qc.ca... Linux mirror

ghost-dz

www.impulsopanama.gob.pa/gh.html Linux mirror

ghost-dz

www.jmg.gov.my/gh.html Linux mirror

ghost-dz

www.kvawyai.go.th/gh.html Linux mirror

ghost-dz

www.mindeporte.gob.ve/bolivari... Linux mirror

ghost-dz

www.municocachacra.gob.pe/gh.html Linux mirror

ghost-dz

www.phichitpao.go.th/gh.html Linux mirror

ghost-dz

www.risaralda.gov.co/sitio/dep... Linux mirror

guba

www.midia.uff.br Linux mirror

h311 c0d3

gmail.com.mw Linux mirror

h311 c0d3

kaspersky.mw Linux mirror

h311 c0d3

www.google.com.mw Linux mirror

H3ll-dz

bappeda.bengkulukota.go.id/dz.php Linux mirror

Hacked By ProCracker'z Team

obras.mdcaracoto.gob.pe Linux mirror

Hacked Kaan Reis

pemmas.probolinggokota.go.id Linux mirror

Hacked Kaan Reis

www.armadillodelosinfanteslp.g... Linux mirror

Haxorsistz

edohmkp.gov.pk Linux mirror

Haxorsistz

www.merseysideprobationtrust.g... FreeBSD mirror

HighTech

alinea.defensoria.gob.sv Unknown mirror

HighTech

apps.citroen.pt Linux mirror

HighTech

biblioteca.comune.porcari.lu.it Linux mirror

HighTech

cemss2009.df.gob.mx Win 2003 mirror

HighTech

cemss2010.df.gob.mx Win 2003 mirror

Page 30: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

30

HighTech

cmdca.niteroi.rj.gov.br Unknown mirror

HighTech

cultura.niteroi.rj.gov.br Unknown mirror

HighTech

defesadoconsumidor.niteroi.rj.... Linux mirror

HighTech

dids.crs.gov.ng Win 2008 mirror

HighTech

fan.niteroi.rj.gov.br Unknown mirror

HighTech

governo.niteroi.rj.gov.br Linux mirror

HighTech

neltur.niteroi.rj.gov.br Unknown mirror

HighTech

pet.ufma.br/computacao/ck.htm Linux mirror

HighTech

portal.komnasham.go.id Linux mirror

HighTech

smct.niteroi.rj.gov.br Linux mirror

HighTech

sst.niteroi.rj.gov.br Linux mirror

HighTech

web.sedam.ro.gov.br Linux mirror

HighTech

www.cemss2008.df.gob.mx Win 2003 mirror

HighTech

www.cmquatis.rj.gov.br Linux mirror

HighTech

www.comune.badia-tedalda.ar.it Linux mirror

HighTech

www.comune.barberinovaldelsa.f... Linux mirror

HighTech

www.comune.bibbona.li.it Linux mirror

HighTech

www.comune.bibbona.livorno.it Linux mirror

HighTech

www.comune.campagnatico.gr.it Linux mirror

HighTech

www.comune.camporgiano.lu.it Linux mirror

HighTech

www.comune.careggine.lu.it/x.htm Linux mirror

HighTech

www.comune.casteldelpiano.gr.it Linux mirror

HighTech

www.comune.castellazzara.gr.it Linux mirror

HighTech

www.comune.castellina-marittim... Linux mirror

HighTech

www.comune.castelnuovo-di-garf... Linux mirror

HighTech

www.comune.castelnuovodigarfag... Linux mirror

HighTech

www.comune.castelnuovo-di-val-... Linux mirror

HighTech

www.comune.castiglionedigarfag... Linux mirror

HighTech

www.comune.cinigiano.gr.it Linux mirror

HighTech

www.comune.comano.ms.it Linux mirror

HighTech

www.comune.fosciandora.lu.it Linux mirror

HighTech

www.comune.fosdinovo.ms.it Linux mirror

HighTech

www.comune.gallicano.lu.it Linux mirror

HighTech

www.comune.giuncugnano.lu.it Linux mirror

HighTech

www.comune.impruneta.fi.it Linux mirror

HighTech

www.comune.larciano.pt.it Linux mirror

HighTech

www.comune.licciananardi.ms.it Linux mirror

HighTech

www.comune.marcianodellachiana... Linux mirror

HighTech

www.comune.marcianodellachiana... Linux mirror

HighTech

www.comune.massarosa.lu.it Linux mirror

HighTech

www.comune.minucciano.lu.it Linux mirror

HighTech

www.comune.montalcino.si.it Linux mirror

HighTech

www.comune.pescaglia.lu.it Linux mirror

HighTech

www.comune.piazzaalserchio.lu.it Linux mirror

HighTech

www.comune.pievefosciana.lu.it Linux mirror

HighTech

www.comune.pievesantostefano.a... Linux mirror

HighTech

www.comune.poggiorsini.ba.it Win 2008 mirror

HighTech

www.comune.pomarance.pi.it Linux mirror

Page 31: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

31

HighTech

www.comune.ponte-buggianese.pt.it Linux mirror

HighTech

www.comune.porcari.lu.it Linux mirror

HighTech

www.comune.quarrata.pistoia.it Linux mirror

HighTech

www.comune.roccalbegna.gr.it Linux mirror

HighTech

www.comune.san-romano-in-garfa... Linux mirror

HighTech

www.comune.sassetta.li.it Linux mirror

HighTech

www.comune.seggiano.gr.it Linux mirror

HighTech

www.comune.sillano.lu.it Linux mirror

HighTech

www.comune.trequanda.si.it Linux mirror

HighTech

www.comune.trequanda.siena.it Linux mirror

HighTech

www.comune.vagli-sotto.lu.it Linux mirror

HighTech

www.comune.vagli-sotto.lucca.it Linux mirror

HighTech

www.comune.villa-basilica.lu.it Linux mirror

HighTech

www.comune.villacollemandina.l... Linux mirror

HighTech

www.comune.villafranca.ms.it Linux mirror

HighTech

www.defensoria.pb.gov.br Linux mirror

HighTech

www.educaciongarantizada.df.go... Win 2003 mirror

HighTech

www.giovani.comune.certaldo.fi.it Linux mirror

HighTech

www.lavoripubblici.comune.borg... Linux mirror

HighTech

www.pcdob.org.br Linux mirror

HighTech

www.pirai.rj.gov.br/seceducacao/ Linux mirror

HighTech

www.prefeituradmc.ba.gov.br Linux mirror

HighTech

www.prepasi.df.gob.mx Win 2003 mirror

HighTech

www.qzgsl.gov.cn/index.htm Win 2003 mirror

HighTech

www.vaseguro.df.gob.mx Win 2003 mirror

HighTech

www.www2.comune.greve-in-chian... Linux mirror

HighTech

xyx.yygt.gov.cn Win 2003 mirror

Hmei7

angthong.dlt.go.th/x.txt Linux mirror

Hmei7

eaudit.jpa.gov.my/x.txt Win 2003 mirror

Hmei7

folklore.culture.go.th/x.txt Win 2008 mirror

Hmei7

gw-ifsp.ufscar.br/x.txt Linux mirror

Hmei7

hpc6.anamai.moph.go.th/x.txt Linux mirror

Hmei7

joomla149.pap.gov.pk/x.txt Linux mirror

Hmei7

kmcenter.rid.go.th/kcitc/2011/... Linux mirror

Hmei7

lnx.comune.santeliafiumerapido... Linux mirror

Hmei7

nakha.mahasarakham.police.go.t... Linux mirror

Hmei7

pmd.kemendagri.go.id/images/x.txt Linux mirror

Hmei7

webtmp.imb.uq.edu.au/x.txt Linux mirror

Hmei7

www.alcaldiasuchitoto.gob.sv/x... F5 Big-IP mirror

Hmei7

www.casacivil.ma.gov.br/x.txt Linux mirror

Hmei7

www.comune.candia.to.it/public... Win 2003 mirror

Hmei7

www.ecemar.aer.mil.br/images/x... Linux mirror

Hmei7

www.fmrp.usp.br/x.txt Linux mirror

Hmei7

www.inspect6.moe.go.th/osmie6/... Linux mirror

Hmei7

www.mesci.gov.cv/x.txt Unknown mirror

Hmei7

www.mkh.go.th/densil/images/x.txt Linux mirror

Hmei7

www.mnm-nok.gov.hu/images/x.txt Linux mirror

Hmei7

www.munitartagal.gob.ar/websit... Win 2008 mirror

Page 32: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

32

Hmei7

www.otp.go.th/images/x.txt Win 2003 mirror

Hmei7

www.sedbarranquilla.gov.co/sed... Linux mirror

HTC 28 DZ

c2i.univ-perp.fr/lesite/index2... Linux mirror

Indishell

financebatagram.gov.pk Linux mirror

Indishell

www.fcbalochistan.gov.pk Linux mirror

indramayu cyber

kwbcmalukupapua.beacukai.go.id Linux mirror

indramayu cyber

www.jdih.dumaikota.go.id Linux mirror

Iran Security Team

comune.antonopoulou.it/images/ Win 2003 mirror

Iran Security Team

comune.brunoribis.it Win 2003 mirror

Iran Security Team

nl.sulsel.go.id/pic/ Win 2003 mirror

Iran Security Team

qldtda.sokhcn.cantho.gov.vn Win 2008 mirror

Iranian DataCoders Security Team

cixitour.cixi.gov.cn/zxylzx.asp Win 2003 mirror

Iranian DataCoders Security Team

www.sycourt.gov.cn Win 2003 mirror

Iranian DataCoders Security Team

www.wlrk.gov.cn/deface.html Win 2003 mirror

Jas0nz666

kapongan.situbondokab.go.id Linux mirror

Jas0nz666

pa-pasarwajo.go.id/html/index.... Linux mirror

Jr. r00t

comune.barile.pz.it/license.html Linux mirror

kwgdeface

aunap.gov.co Linux mirror

Learner

www.hbipo.gov.cn/Learner.htm Win 2003 mirror

LeDerpina

dprd.kapuashulukab.go.id/x-cyb... Linux mirror

LORD H

milicialviv.gov.ua FreeBSD mirror

LORD H

utmlviv.gov.ua FreeBSD mirror

LOv3rDns

dbdomain.nic.hn Linux mirror

LOv3rDns

people.csail.mit.edu/yupeng/ Linux mirror

LOv3rDns

portal.mcafee.com Win 2003 mirror

LOv3rDns

unite.coca-cola.com Linux mirror

LUN4T1C0

login.hospitalbagre.gov.co Linux mirror

LUN4T1C0

mlkttv.gov.vn/x.txt Win 2003 mirror

LUN4T1C0

muniparcoy.gob.pe/index.php Linux mirror

MadNet

publicart.culture.ntpc.gov.tw Win 2003 mirror

Maxney

tst.hp.com.cn/sacc/ Win 2008 mirror

McStone

www.fontierras.gob.gt Linux mirror

memek

www.acer.com.tn Linux mirror

MetalsoftHackersTeam

www.sicpy.gov.py/agenda/ Linux mirror

mhDx92

guchengzi.gov.cn/news.php?clas... Win 2003 mirror

mhDx92

l-tax.panjin.gov.cn/xs.php?cla... Win 2003 mirror

mhDx92

www.ccjsw.gov.cn/xxgk/gkml_sho... Unknown mirror

mhDx92

www.dwlgjjq.gov.cn/xs.php?id=376 Win 2003 mirror

mhDx92

www.ldwrc.gov.cn/xs.php?classi... Win 2003 mirror

Micky

arpusda.purworejokab.go.id/ind... Linux mirror

Micky

bapelluh.purworejokab.go.id Linux mirror

Micky

bapermasdes.purworejokab.go.id Linux mirror

Micky

bappeda.purworejokab.go.id Linux mirror

Micky

bpbd.purworejokab.go.id Linux mirror

Micky

dilatanak.purworejokab.go.id Linux mirror

Micky

dinakertransos.purworejokab.go.id Linux mirror

Micky

dinhubkominpar.purworejokab.go.id Linux mirror

Micky

dipertanhut.purworejokab.go.id Linux mirror

Page 33: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

33

Micky

dp2kad.purworejokab.go.id Linux mirror

Micky

dpu.purworejokab.go.id Linux mirror

Micky

kec-bagelen.purworejokab.go.id Linux mirror

Micky

kec-banyuurip.purworejokab.go.id Linux mirror

Micky

kec-bayan.purworejokab.go.id Linux mirror

Micky

kec-bruno.purworejokab.go.id Linux mirror

Micky

kec-butuh.purworejokab.go.id Linux mirror

Micky

kec-gebang.purworejokab.go.id Linux mirror

Micky

kec-grabag.purworejokab.go.id Linux mirror

Micky

kec-kaligesing.purworejokab.go.id Linux mirror

Micky

kec-loano.purworejokab.go.id Linux mirror

Micky

kec-ngombol.purworejokab.go.id Linux mirror

Micky

kec-pituruh.purworejokab.go.id Linux mirror

Micky

kec-purwodadi.purworejokab.go.id Linux mirror

Micky

kppt.purworejokab.go.id Linux mirror

Micky

lh.purworejokab.go.id Linux mirror

Micky

pengairan.purworejokab.go.id Linux mirror

Micky

rsud-sarashusada.purworejokab.... Linux mirror

Micky

setwan.purworejokab.go.id/inde... Linux mirror

Micky

www.ncxh.gov.cn/x.txt Win 2003 mirror

misafir

www.cmjaguare.es.gov.br/site/ Linux mirror

misafir

www.comune.modigliana.fc.it Linux mirror

misafir

www.sungnoen.go.th Win 2003 mirror

MoroccanHunters

www.ba-phalaborwa.gov.za Linux mirror

mr-trouk

www.camaraguaraci.sp.gov.br Linux mirror

MrWanz

districtcourtssindh.gos.pk Win 2008 mirror

MrWanz

sindhinformation.gos.pk Win 2008 mirror

Nameless-XZ

www.takwang.go.th/newsdetails.... Linux mirror

Newbie Tulen

arif.cirebonkab.go.id/x.php Linux mirror

NewbieHacker061099.php

bdkambon.kemenag.go.id/index.php Linux mirror

NewbieHacker061099.php

bdkbandung.kemenag.go.id Linux mirror

NewbieHacker061099.php

bdkpadang.kemenag.go.id Linux mirror

NewbieHacker061099.php

blajakarta.kemenag.go.id Linux mirror

NewbieHacker061099.php

blamakassar.kemenag.go.id Linux mirror

NewbieHacker061099.php

pa-labuha.go.id/images/index.php Linux mirror

Nob0dy

www2.doh.gov.ph Linux mirror

No-Name Crew

library.vsi.esdm.go.id//detail... Linux mirror

nouse

ajgc.csfdc.gov.cn Linux mirror

nouse

muangmuk.go.th/index.php Linux mirror

nouse

phangngaculture.go.th Linux mirror

Over-X

forums.microsoft.com.mk/defaul... Win 2008 mirror

Over-X

www.jeep.com.mk/dz.html Win 2008 mirror

PaneLFaReSi

www.battalgazihem.gov.tr Linux mirror

q8unkn0wn

www.saimbeyli.gov.tr Win 2008 mirror

r00t-x

www.fto.gov.pk/x.txt Solaris 9/10

mirror

r00t-x

www.pakboi.gov.pk/x.txt Win 2003 mirror

Riad

tireboluram.gov.tr Linux mirror

Page 34: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

34

rooterror

gadtonsupa.gob.ec Linux mirror

rooterror

www.ssffaa.gob.cl/wp-content/ Linux mirror

rooterror

www.ssffaa.gov.cl/wp-content/ Linux mirror

rooterror

www.taisha.gob.ec Linux mirror

S.V Crew

www.rayonslp.gob.mx/directorio... Linux mirror

s13doeL

naa.gov.kh/images/z.txt Linux mirror

s13doeL

southernleyte.gov.ph/z.txt Linux mirror

s13doeL

www.fundaciteportuguesa.gob.ve... Linux mirror

SA3D HaCk3D

www.zjzx.gov.cn/x.txt Win 2003 mirror

SA3D HaCk3D

www.zqwoman.gov.cn/x.txt Win 2003 mirror

SaccaFrazi

bkk2500.kalasin3.go.th/view.ph... Win 2003 mirror

Sa-Dz

www.alvarado.tolima.gov.co/tol... Win 2008 mirror

sahrawihacker

www.epsnepal.gov.np/details.ph... Linux mirror

SanFour25

comune.viticuso.fr.it/csc.php Linux mirror

SanFour25

ufrr.br/Dz.php Linux mirror

SanFour25

www.comune.pinosullaspondadell... Unknown mirror

SanFour25

www.comune.rosa.vi.it/csc.php Linux mirror

SanFour25

www.vilareal.pcp.pt Linux mirror

SCUD

www.phayao.m-society.go.th Win 2008 mirror

SeCuR!TY ** DR@G0N

secure.dss.cahwnet.gov/cdss/ Win 2008 mirror

SeCuR!TY ** DR@G0N

www.garden.harvard.edu/?p=2020 Linux mirror

sH3LL05Dz

www.m-culture.gov.dz/mc2/fr/li... Linux mirror

Soly

www.mahrukat.gov.sy Linux mirror

SouTHRaNDA

www.1128.syzefxis.gov.gr/robot... Linux mirror

Spyware

bpptepus.gunungkidulkab.go.id/... Linux mirror

Spyware

dishubkominfo.gunungkidulkab.g... Linux mirror

Spyware

dkp.gunungkidulkab.go.id Linux mirror

Spyware

inspektorat.gunungkidulkab.go.id Linux mirror

Spyware

jdih.gunungkidulkab.go.id Linux mirror

Spyware

pertanian.gunungkidulkab.go.id Linux mirror

Spyware

peternakan.gunungkidulkab.go.i... Linux mirror

Spyware

sosnakertrans.gunungkidulkab.g... Linux mirror

Spyware

ulp.gunungkidulkab.go.id Linux mirror

Spyware

www.dekranasda.gunungkidulkab.... Linux mirror

Spyware

www.gunungkidulkab.go.id Linux mirror

srabithail

fb.mol.gov.sa/blog/ Win 2008 mirror

surabayagetar

kpud-kedirikab.go.id/cp.html Linux mirror

surg4bij4k

cts.pn-prabumulih.go.id/x.htm Linux mirror

surg4bij4k

perkara.pn-prabumulih.go.id/x.htm Linux mirror

Swan

papersmart.un.org/rss.xml Unknown mirror

syrian_dragon

mod.gov.lb/x.txt Win 2008 mirror

syrian_dragon

moe.gov.lb/x.txt Win 2008 mirror

syrian_dragon

neo.gov.lb/x.txt Win 2008 mirror

syrian_dragon

olivepress.moe.gov.lb/x.txt Win 2008 mirror

syrian_dragon

petroleum.gov.lb/x.txt Win 2008 mirror

syrian_dragon

www.cfd.gov.lb/x.txt Win 2008 mirror

syrian_dragon

www.ict.pcm.gov.lb/x.txt Win 2008 mirror

syrian_dragon

www.lari.gov.lb/x.txt Win 2008 mirror

Page 35: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

35

syrian_dragon

www.mfe.gov.lb/x.txt Win 2008 mirror

syrian_dragon

www.ministryinfo.gov.lb/x.txt Win 2008 mirror

syrian_dragon

www.ministryofdisplaced.gov.lb... Win 2008 mirror

t3ziz

tqm.northedu.gov.sa Linux mirror

The.Psiqopat

distanakan.tabalongkab.go.id Linux mirror

THE-AjaN

www.isuzu.com.gt Win 2003 mirror

TheExtraterrestrial

www.wnpg.lipi.go.id/login/ Linux mirror

TheHackersArmy

jeremiah.cityofbalanga.gov.ph Linux mirror

TurkHackArmy

fadc2012.media.gov.kw/index.ph... Win 2003 mirror

TurkHackArmy

midea.com.sg Linux mirror

TurkHackArmy

municanas.gob.pe Linux mirror

TurkHackArmy

munieladelanto.gob.gt/index.php Win 2008 mirror

TurkHackArmy

pa-sambas.go.id Linux mirror

TurkHackArmy

singkok.go.th Linux mirror

TurkHackArmy

smedan.gov.ng Linux mirror

TurkHackArmy

www.srsrf.gov.cn Win 2003 mirror

U_!!v!!_N

www.nscdc.gov.ng Linux mirror

ulow

www.4949.go.kr/a.htm Win 2003 mirror

ulow

www.fnxww.gov.cn/a.htm Win 2003 mirror

ulow

www.nema.go.ke/index.php?optio... Linux mirror

umutcon

safranboluhem.gov.tr Win 2008 mirror

uykusuz001

law.zjds.gov.cn/tr.txt Win 2003 mirror

VanPersie

www.geriatria.mz.gov.pl/FCK/va... Linux mirror

vaultHunter

www.comune.sora.fr.it Win 2003 mirror

VIRuS-baghdad

art.gov.sa/forums/ Linux mirror

Viscount

www.disdik.pelalawankab.go.id Linux mirror

Viscount

www.disperindagsar.pelalawanka... Linux mirror

waseem_Gujjar

www.communityclinic.gov.bd Linux mirror

x0x0

www.uncapsa.org/LIBRARYJournal... Win 2003 mirror

xatli

nfa.gov.ge/index.php?lang_id=E... Linux mirror

Xcrusher

pta-yogyakarta.go.id Linux mirror

xevil

bcaceh.beacukai.go.id Linux mirror

Xtremee_Killar

pepco.gov.pk/chk.php FreeBSD mirror

Xtremee_Killar

www.nidw.gov.bd/blog/ Linux mirror

Xtremee_Killar

www.peshawarhighcourt.gov.pk/n... Linux mirror

Z0mbi3_Ma

www.sahcfiji.com Linux mirror

Z0mbi3_Ma

www.suzuki.az/news/ Linux mirror

Z0mbi3_Ma

www.suzukidelcaribe.com/foro/D... Win 2008 mirror

Z0mbi3_Ma

www.suzukipr.com/foro/Discusio... Win 2008 mirror

Z4R4THUSTR4

igdr.univ-rennes1.fr/seminaire... FreeBSD mirror

Z4R4THUSTR4

www.biomodel.ufv.br Unknown mirror

Zikou-16

www.boavista.rr.gov.br/noticia... Linux mirror

ZoRRoKiN

barbadospolice.gov.bb/about-us/ Win 2003 mirror

ZoRRoKiN

lawcourts.gov.bb/Samu.htm Win 2003 mirror

ZoRRoKiN

www.msikorea.kr/webedit/img/no... Win 2008 mirror

ZoRRoKiN

www.navet.government.bg/assets... Linux mirror

zuanbinjai

sier.cedrssa.gob.mx/owner.txt Win 2008 mirror

Page 36: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

36

N° Notifier Single def. Mass def. Total def. Homepage def. Subdir def. 1 Barbaros-DZ 3404 164 3568 1193 2375 2 Ashiyane Digital Security Team 2578 3388 5966 1166 4800 3 Hmei7 2319 1372 3691 738 2953 4 LatinHackTeam 1428 1276 2704 2254 450 5 iskorpitx 1322 953 2275 784 1491 6 Fatal Error 1032 1145 2177 1797 380 7 chinahacker 886 1342 2228 4 2224 8 MCA-CRB 852 625 1477 372 1105 9 By_aGReSiF 749 1424 2173 802 1371

10 3n_byt3 644 1882 2526 858 1668 11 HEXB00T3R 604 630 1234 405 829 12 Red Eye 579 1551 2130 2093 37 13 uykusuz001 554 159 713 38 675 14 brwsk007 537 187 724 24 700 15 Mafia Hacking Team 496 589 1085 322 763 16 Swan 496 258 754 219 535 17 Digital Boys Underground Team 461 442 903 179 724 18 Iran Black Hats Team 458 326 784 417 367 19 1923Turk 434 1569 2003 436 1567 20 misafir 424 434 858 226 632 21 Over-X 423 1585 2008 1302 706 22 DeltahackingSecurityTEAM 415 443 858 232 626 23 ZoRRoKiN 397 204 601 115 486 24 D.O.M 392 645 1037 824 213 25 kaMtiEz 391 390 781 238 543 26 HighTech 389 1779 2168 1754 414 27 Triad 375 315 690 397 293 28 [#elite top team] 362 303 665 570 95 29 sinaritx 359 98 457 160 297 30 k4L0ng666 353 1206 1559 222 1337 31 core-project 313 325 638 629 9 32 Ma3sTr0-Dz 313 736 1049 300 749 33 linuXploit_crew 312 166 478 478 0 34 Turkish Energy Team 311 224 535 319 216 35 ISCN 275 128 403 102 301 36 !nf3rN.4lL 263 376 639 177 462 37 NeT-DeViL 253 258 511 335 176 38 Poizonb0x 251 3 254 254 0 39 eMP3R0r TEAM 240 308 548 136 412 40 PowerDream 237 164 401 174 227 41 Vezir.04 234 111 345 152 193 42 KHG 233 281 514 210 304 43 S4t4n1c_S0uls 230 144 374 311 63 44 Hi-Tech Hate 223 6 229 229 0 45 XTech Inc 223 328 551 548 3 46 BeLa 210 123 333 147 186 47 m0sted 209 207 416 107 309 48 spook 209 31 240 40 200 49 Prime Suspectz 205 0 205 205 0 50 the freedom 198 136 334 22 312

Page 37: Attackers - Information Warfare Center€¦ · 18/02/2013  · Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate ... Obama's cybersecurity

CIR

37

Top 10 Ports Top 10 Source IPs

by Reports by Targets by Sources

Port Reports

23 1276855

22 1152147

80 1045632

445 996167

53 964842

21 809988

179 780139

137 711749

1433 462882

3389 419828

Port Targets

22 98387

5900 77287

1433 70677

23 69992

445 69544

3389 68065

443 65394

3306 64133

4899 45257

5060 43317

Port Source

6890 73307

445 46870

57778 19347

57695 18997

57694 18990

7170 18967

7257 18832

7263 18691

7205 18597

22613 18528

IP Address Reports Target IPs First Seen Last Seen

069.175.126.170 (US) 1,802,509 138,054 2012-07-11 2013-02-18

218.026.089.179 (CN) 414,283 131,918 2012-12-26 2013-02-17

097.074.127.004 (US) 237,560 105,785 2013-02-03 2013-02-17

060.211.241.131 (CN) 245,702 105,139 2012-09-29 2013-02-18

211.066.184.087 (CN) 309,733 97,912 2012-12-22 2013-02-17

117.079.091.214 (CN) 265,532 95,884 2013-01-27 2013-02-17

069.175.054.106 (US) 1,342,941 87,302 2012-07-14 2013-02-18

176.010.035.241 (IS) 246,343 84,081 2013-01-26 2013-02-18

005.199.133.223 () 115,780 72,983 2013-02-04 2013-02-18

060.191.111.085 (CN) 207,698 72,833 2012-06-26 2013-02-18

: DC3 DISPATCH [email protected]

FBI In the New [email protected] Zone-h www.zone-h.org Xssed www.xssed.com Packet Storm Security www.packetstormsecurity.org Sans Internet Storm Center isc.sans.org Exploit Database www.exploit-db.com Exploits Database www.exploitsdownload.com Hack-DB www.hack-db.com Infragard www.infragard.org ISSA www.issa.org Information Warfare Center informationwarfarecenter.com Secunia www.secunia.org Tor Network