Feeds

Mitnick gets hit by Pakistani crackers

Digital graffiti attack targets reformed hacker

Beginner's guide to SSL certificates

Kevin Mitnick, the notorious former hacker turned security consultant and tech celebrity, has been targeted by Pakistani crackers in a series of web face defacements attacks.

Four websites associated with Mitnick's various ventures were sprayed with digital graffiti on Monday in an apparently personal attack. The sites defensivethinking.com, mitsec.com, kevinmitnick.com and mitnicksecurity.com (which all run on Linux, incidentally) were defaced with offensive messages that said "hacking was for homos", among other things. We'll leave it to psychologists to say what that message says about the perps of the attack, but irony obviously isn't their main stock in trade.

You're 0wn3d, Kev!

The techniques used in the attacks are unclear but are likely technical in nature, quite unlike Mitnick's stock in trade as a hacker - persuading people to hand over sensitive information through various social engineering techniques, an approach largely pioneered by Mitnick prior to his arrest on hacking offences in 1995.

Mitnick spent five years incarcerated as punishment for attacks against Fujitsu, Motorola, Nokia, and Sun Microsystems, among others, prior to his release in January 2000.

As defacement archive Zone-h notes, Mitnick has been targeted by defacers in the past. Soon after a court-ordered ban on Mitnick that prevented him using computers was lifted in 2003 he set up defensivethinking.com. Its Windows-powered website was defaced repeatedly by different crackers during subsequent months. However, the theme of these attacks (archive of examples here) was more "welcome back Kevin" rather than anything more offensive.

Misconfigured FrontPage extensions were used to carry out these attacks, Zone-h reports. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.