Blog Posts Tagged with "th3j35t3r"

69dafe8b58066478aea48f3d0f384820

The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Hacktivist "The Jester" Draws Crowd at Hacker Halted

October 31, 2011 Added by:Headlines

The Jester had alluded to the fact that he may have actually been physically present at the conference by apparently hiding an encrypted message in one of the conference rooms, tweeting "left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what's there"...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Moralizing, Anonymous, and Digital Vigilantism

October 30, 2011 Added by:Infosec Island Admin

It would seem that Anonymous, Antisec, and LulzSec have already decided to take up the mantle of vigilante’s already. However, the targets have been, for the most part, varied parties that could be seen as hapless victims or as malefactors, it all depends on the point of view really...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Explaining Anonymous, LulzSec, and AntiSec Animus

August 22, 2011 Added by:Infosec Island Admin

Virtual Arkham: Explaining Anonymous, LulzSec, and AntiSec Animus in Our Digital Gotham City: Increasingly over the last year or two I have been seeing analogies both literally, and figuratively between the forces at play and all of it is directly affected by the comic book world of Batman...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Game of Whack-A-Mole: Was Al-Shamukh Hacked?

June 30, 2011 Added by:Infosec Island Admin

Who attacked Shamikh and why? There no evidence cited or even hinted at in the real world that MI6 or MI5 for that matter had anything to do with this. For all they know, it could have been The Jester or someone with like technology that DoS’d them and got them yanked offline by their host...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Attack Disrupts Al-Qaeda Communications

June 30, 2011 Added by:Headlines

“Al-Qaeda's online communications have been temporarily crippled... Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI. This particular event began as a basic domain hijacking, which does tend to happen every so often..."

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The Lulzboat Sailed and All I Got Was This Garbage File

June 26, 2011 Added by:Infosec Island Admin

I expect LulzSec's real legacy will be the creation of more draconian laws by the government as a backlash to their antics. Laws that will make all our lives a bit less private and a lot more prone to being misused. I also expect that the lulz will continue, though at their expense...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Did LulzSec Hack Apple's iCloud and Steal Source Code?

June 24, 2011 Added by:Headlines

An anonymous Pastebin posting from June 21 states that hackers claiming to be part of the LulzSec collective successfully breached Apple's iCloud networks several weeks ago. The posting claims that the intruders mapped the network and "grabbed all their source code and database passwords..."

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

LulzSec: How Not to Run an Insurgency

June 23, 2011 Added by:Infosec Island Admin

LulzSec seems to have misunderstood that secrecy is really really important when you are doing something like a digital insurgency. Sure, you can try to rely on all the technologies like proxies to hide your IP, but, you also have the human element to contend with...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

LulzSec, Jester, and Counter-Intelligence on the Internet

June 20, 2011 Added by:Infosec Island Admin

In the case of LulzSec and Anonymous, they are using many types of systems to protect their anonymity. With the right tools and obfuscation techniques, they feel impervious to attacks, be it from law enforcement or the likes of The Jester. Tactically, they have the advantage in many ways...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Sega Breach Exposes 1.3 Million Accounts

June 20, 2011 Added by:Headlines

In an odd turn of events, the most likely suspect in the attack against Sega, the hacker collective LulzSec, apparently was not involved in this latest event and has offered to help Sega track down the culprits...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Attacks CIA Website, Taunts The Jester

June 16, 2011 Added by:Headlines

The hacker collective known as LulzSec conducted a successful attack against a public-facing website of the CIA on Wednesday. The DDoS attack, which caused periodic outages, was announced with a Twitter message from the group stating, "Tango down - cia.gov - for the lulz..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Patriot Hacker The Jester's Libyan Psyops Campaign

March 29, 2011 Added by:Anthony M. Freed

Libyan Psyops Campaign? The Jester appears to be performing some kind of a bit.ly-obfuscated intermediary-based code injection to plant articles in the The Tripoli Post and The Malta Independent reporting that Gaddafi's troops are suffering from low morale and deserting their posts...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Hacktivist Maintains Attack on Westboro Baptist Church

March 24, 2011 Added by:Headlines

The DoS attacks against WBC sites have now exceeded one month in duration. The Jester uses a DoS tool called XerXeS to perform an application level attack which can be performed by a single low-spec machine with relatively few packets, whereas traditional TCP-based attacks require multiple machines...

Comments  (4)

C787d4daae33f0e155e00c614f07b0ee

The Evolution of Hacking and Enterprise Information Security

February 28, 2011 Added by:Robb Reck

Defending our finances and data are no longer enough to keep our organization safe on the internet. We need to keep our company off of the front page. This new breed of hackers is not going away anytime soon. We need to adapt to them, as they certainly are adapting to circumvent us...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »