Feeds

Anonymous runs amock in Israel, Finland, Portugal

Spook sites downed, citizens' data revealed

The Essential Guide to IT Transformation

Anonymous activists marked the 5 November anniversary of the Gunpowder Treason Plot to get up to all sorts of mischief over the weekend.

The websites of Israel’s Mossad and Shin Bet intelligence services as well as the Israel Defence Force were reportedly offline for a brief period over the weekend following a 4 November threat by Anonymous to take down the sites.

The threats came in response to the detention and deportation of 27 Gaza flotilla activists, who had set sail from Turkey for Gaza with supplies aboard two boats, by the Israeli military on Friday. The ships were boarded after ignoring calls to turn back, according to Israeli media reports. It's unclear whether or not the boats contained medical supplies.

Anonymous posted a video protesting the ongoing blockade of Gaza and describing the boarding as "piracy on the high seas". It threatened cyberattack reprisals, however the Israeli government said a subsequent outage of Israeli military websites was down to a "systematic malfunction", Threatpost reports.

All three websites were otherwise alive and kicking during the weekend.

Meanwhile Portuguese hacktivists defaced five their nation's websites, including that of JSD (the youth division of the ruling Social Democratic Party) and Freeport, a mall built despite environmental concerns. The hacks were reportedly carried out by LulzSec Portugal, a previously unknown branch of the infamous hacker crew that merged with Anonymous earlier this year.

Further north, Anonymous Finland claimed responsibility for the publication of personal details of thousands of Finns from hacked government databases on Friday. The group temporarily published a sample of info on 16,000 people as proof of the hack, which it said was easily accomplished using a basic SQL injection attack. The hack was motivated by an apparent desire to shame the government into improving its security.

For all the cyber-strikes taking place in the names of Anonymous over the past few days, the most famous threatened action – an assault on Facebook – never took place. Senior figures in the hacktivist collective distanced themselves from talk of the Facebook attack weeks ago so the lack of action comes as little surprise. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.