Feeds

Romanian hacking group downs tools

HackersBlog crew weary of the road

Internet Security Threat Report 2014

A controversial Romanian hacker group famous for exposing security shortcomings on corporate and anti-virus websites has disbanded.

The HackersBlog collective said it was calling it a day because their unpaid work in exposing SQL injection vulnerabilities was eating up the members' free time and had become boring.

Well then, we’ve gotten to that point where most of the team members had "enough" of it. Dont wacko on this. We are not pulling the plug because of any external factors or of fear. We simply dont have the time and desire to continue. Contrary to many opinions, we do have a private life.

Recent disclosures by HackersBlog on website security have been contested by the firms involved, including BT, the Daily Telegraph and Camelot. In signing off, HackersBlog fired back at what it claims is a culture of "corporate spin" in responding to the disclosure of website security flaws. An update, posted on Tuesday by 2fingers and entitled This is the end, in an apparent Doors/Jim Morrison tribute, explains.

Large companies will never admit to the problems they have, no matter how large they are. This is common practice in the business and it serves maintaining their public image clean. Don’t swallow the bait. Official notes are only meant to disinform and mislead you from the truth about the dangers you were exposed to

HackersBlog thanked media outlets that have reported fairly on its work, singling out local radio station RadioLynx, IT news website Softpedia and El Reg for special mention. The group added that it hoped other security researchers and hackers would pick up the baton of website in-security disclosure it has carried over recent weeks.

The Romanian hacker group came to prominence in early February after posting about website security vulnerabilities on the websites of security vendors, such as Kaspersky Lab and BitDefender, posting obfuscated screenshots to back up their concerns. More recently the group, whose most famous member is a hacker called Unu, moved onto scouring for database flaws involving the websites of large UK businesses.

HackersBlog applied scruples to its work that meant it avoided revealing website problems that had a high risk of exploitation, or distributing data obtained from vulnerable websites.

An interview with the group, by security researcher Rik Ferguson of Trend Micro, that goes into its motivation and methods in greater depth can be found here. ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.