Feeds

Underground forum r00t-y0u.org gets pwned

S'kiddie defacement or law enforcement sting?

Using blade systems to cut costs and sharpen efficiencies

A notice on underground cybercrime forum r00t-y0u.org on Thursday suggested the site had become part of a law enforcement sting operation. However hacker hijinks and mischief making seem equally likely explanations for the incident, at the time of writing.

r00t-y0u.org's home page has been replaced by an jpg image notice stating that the previous cybercrime activity on the site has been logged and will be passed on to appropriate law enforcement agencies. It's unclear who posted the advisory, which was spotted by security researcher Mikko Hypponen of F-Secure, or even whether it is genuine.

No law enforcement agency is identified on the notice.

roots you, sir.

Roots you, sir.

Chris Boyd, a security researcher at Facetime, and long time nemesis of s'kiddies, cautions that several underground hacking forums were defaced recently and the r00t-y0u incident might be related. Bearing this important caveat in mind, the notice on r00t-y0u.org states.

This underground form has been monitored by law enforcement - every post, private message and all registration information has been captured. All member IP addressed and have been logged and identification processes are now underway.

The creation and distribution of malware, denial of service attacks and accessing stolen information are serious crimes.

The notice goes on to suggest arrests will follow.

Every movement on this forum has been tracked and where there is information to suggest a person has committed a criminal act, referrals will be forwarded to the relevant authority in each jurisdiction. There have already been a number of arrests as a result of current investigations. This message should serve as a warning not to engage in criminal activity.

Law enforcement infiltration of underground forums is rare but not unprecedented. The DarkMarket carder forum was famously taken over in a months-long FBI sting last year. Around 56 people worldwide were arrested over their involvement their activities on DarkMarket, which posed as a forum for identity thieves, carders, and other cybercrooks.

Defacement of underground forums is a far more common incident. Motives might include a desire to discredit a rival forum, among other reasons. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.