Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

AntiSec Movement Continues Assault on Law Enforcement

After announcing they had defaced Websites belonging to more than 70 different law enforcement agencies across the U.S., hacktivist collective Anonymous, as part of the AntiSec movement, declared in a statement posted online that they had released roughly 10GB of data stolen during the compromise, including “hundreds of private email spools, password information, address and social security numbers, credit card numbers, snitch informa

After announcing they had defaced Websites belonging to more than 70 different law enforcement agencies across the U.S., hacktivist collective Anonymous, as part of the AntiSec movement, declared in a statement posted online that they had released roughly 10GB of data stolen during the compromise, including “hundreds of private email spools, password information, address and social security numbers, credit card numbers, snitch information, training files and more.”

Hacktivism #AntiSecThe group said its actions were in response to the arrests of dozens of people last month in connection with last year’s denial-of-service attacks against PayPal as well as the arrest of Jake Davis of Shetland, U.K., whom British authorities have accused of being “Topiary”, a hacker group spokesperson.

According to the hacktivists, they were able to compromise servers at Brooks-Jeffrey Marketing (BJM), an Arkansas company that operates a computer store and an online marketing firm.

“It took less than 24 hours to root BJM’s server and copy all their data to our private servers,” they said in a statement. “Soon after, their servers were taken down and a news article came out suggesting they received advance FBI “credible threat” notice of a “hacking plot”…However we were surprised and delighted to see that not only did they relaunch a few sites less than a week later, but that their “bigger, faster server that offers more security” carried over our backdoors from their original box. This time we were not going to hesitate to pull the trigger: in less than an hour we rooted their new server and defaced all 70+ domains while their root user was still logged in and active.”

Brooks-Jeffrey has remained mum on the incident, and did not respond to a SecurityWeek request for comment before publication.

According to the hacktivists, the stolen credit card information was used to make donations to the American Civil Liberties Union (ACLU), as well as other organizations such as the Bradley Manning Support Network (Manning was the soldier arrested in the WikiLeaks probe) and the Electronic Frontier Foundation.

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.