Feeds

4chan pwns Christians on Facebook

Unholy hack

5 things you didn’t know about cloud backup

The denizens of notorious imageboard 4chan are up to mischief again with an attack on Christians over the weekend.

Login details and passwords from an unnamed social networking or dating site for Christians* were posted as a file called "christian.txt" on 4chan. The information was spread among hackers, some of whom hit on the idea of hacking into the Facebook accounts of exposed users.

Given consumer password security is usually poor, it's no surprise that many victims used the same login credentials on both sites, which is one possible route of attack. Or it could be that email accounts associated with profiles at the Christian dating website were hit first, before Facebook account passwords were reset. The Next Web reports that Paypal and Amazon accounts were affected by the same hack, a factor that strongly suggests victims' email accounts might have been compromised.

Either way, once Facebook accounts were pwned the denizens of 4chan wasted no time posting unflattering or inflammatory remarks or images before waiting for victims' friends to pile in. In some instances pranksters commented while posing as the actual account owner.

Examples of the pranks perpetrated including claiming a "no sex before marriage" Christian wanted to thank her lover for a memorable night after months of abstinence, but had posted the thank you note in a status update, which all her contacts could see, rather than a private message. Racist messages and comments about dental hygiene were also included.

The ensuing chaos was captured in screenshots and reposted onto 4chan, the site that was the spawning pool for the Anonymous (Project Chanology) campaign against Scientology, as well as the birthplace of numerous internet memes.

Samples of the screenshots and more details on the attack can be found in a post on the Coffee Desk blog here. ®

* HardOCP reckons the passwords came from Abilene Christian University, though this remains unconfirmed.

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?