Feeds

Hackers lash out at Islamic Usenet group

Cyber Vigilantes

  • alert
  • submit to reddit

Build a business case: developing custom apps

S'kiddies have taken out the mail server used by the moderators of an Islamic Usenet group in the latest of a serious of untargeted attacks by "vigilante" hackers following last week's terrorist attacks on the US.

The admin of soc.religion.islam told us that hackers threw a mail attack against its server over the weekend which crashed the old machine it used.

"The email originated as a flood attack against the newsgroup from a machine at a Canadian ISP, but since the newsgroup [soc.culture.islam] is moderated it was converted into a mail bomb by their NNTP server," an admin at the hosting site told us.

Service has now been restored and people can once again post to the newsgroup, none of the postings to which we looked through advocated the use of terror tactics.

The FBI has warned against the likelihood of collateral damage from DDoS attacks mounted by "vigilante" hackers who have decided to mount electronic attacks against the Internet infrastructure of Moslem countries associated with terrorism.

A defacement attack on www.terrorism.uk.com by The Dispatchers, a group which has been singled out for criticism by the FBI, showed the risks of this "vigilante" approach. Terrorism.uk.com is run by the Special Risks Terrorism Team, whose parent company Aon Corporation is based in the World Trade Centre, Newsbytes reports.

In effect, The Dispatchers have hit out at one of the victims of the attack.

Other hackers, most notably the Chaos Computer Club (CCC), have criticised The Dispatchers, a loose-knit collective of more than 60 defacers. The Internet needs to be left open for communication at a time of high international tension, CCC argues. ®

Assault on America: complete coverage

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?