Feeds

Security watchers question supposed Facebook hack

Claims of new hacktivist target look like a hoax

5 things you didn’t know about cloud backup

Reported plans by Anonymous to attack Facebook on 5 November appear to be an elaborate hoax by an unknown source.

A manifesto urging net users to "kill Facebook for the sake of your own privacy" was posted on a newly created YouTube channel, FacebookOp, on 16 July. The video features the robotic voice familiar from previous confirmed messages from Anonymous. However the production values have slipped and there are other reasons to doubt the authenticity of the message.

The call to arms has not been repeated or even referenced on any of the Twitter accounts or websites usually used by Anonymous. And there are other reasons to be sceptical. "Pay attention to the strange Twitter name they used and links to websites with adverts," noted veteran security specialist Eugene Kasperky, via Twitter. "The news around #Anonymous to attack #Facebook on Nov 5 most probably is fake."

We asked Anonymous to either confirm or deny the op but have yet to receive a reply. Although members of the loosely knit and anarchic hacktivist collective do their own thing from time to time, the group has previously said particular ops, most notably initial attacks against the Westboro Baptist Church, are nothing to do with it.

The FacebookOp video seems to have gone largely ignored until it was picked up by various media outlets on Tuesday, generating scores of stories during the quietest phase of the annual news cycle.

For the record, the clip slams Facebook for handing over information to government agencies and information security firms, "some who work for authoritarian governments such as Egypt and Syria".

It notes that personal information stored on Facebook can be recovered at any time and dismisses as a "delusion" the notion that improved privacy settings introduced by Facebook help users avoid giving away too much personal information.

"Facebook knows more about you than your family," the manifesto states before urging supporters to prepare for the supposed (unspecified) action on 5 November, the anniversary of the failed 1605 Gunpowder plot to blow up the English parliament and assassinate James I. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.