Feeds

Anonymous runs amock in Israel, Finland, Portugal

Spook sites downed, citizens' data revealed

Protecting users from Firesheep and other Sidejacking attacks with SSL

Anonymous activists marked the 5 November anniversary of the Gunpowder Treason Plot to get up to all sorts of mischief over the weekend.

The websites of Israel’s Mossad and Shin Bet intelligence services as well as the Israel Defence Force were reportedly offline for a brief period over the weekend following a 4 November threat by Anonymous to take down the sites.

The threats came in response to the detention and deportation of 27 Gaza flotilla activists, who had set sail from Turkey for Gaza with supplies aboard two boats, by the Israeli military on Friday. The ships were boarded after ignoring calls to turn back, according to Israeli media reports. It's unclear whether or not the boats contained medical supplies.

Anonymous posted a video protesting the ongoing blockade of Gaza and describing the boarding as "piracy on the high seas". It threatened cyberattack reprisals, however the Israeli government said a subsequent outage of Israeli military websites was down to a "systematic malfunction", Threatpost reports.

All three websites were otherwise alive and kicking during the weekend.

Meanwhile Portuguese hacktivists defaced five their nation's websites, including that of JSD (the youth division of the ruling Social Democratic Party) and Freeport, a mall built despite environmental concerns. The hacks were reportedly carried out by LulzSec Portugal, a previously unknown branch of the infamous hacker crew that merged with Anonymous earlier this year.

Further north, Anonymous Finland claimed responsibility for the publication of personal details of thousands of Finns from hacked government databases on Friday. The group temporarily published a sample of info on 16,000 people as proof of the hack, which it said was easily accomplished using a basic SQL injection attack. The hack was motivated by an apparent desire to shame the government into improving its security.

For all the cyber-strikes taking place in the names of Anonymous over the past few days, the most famous threatened action – an assault on Facebook – never took place. Senior figures in the hacktivist collective distanced themselves from talk of the Facebook attack weeks ago so the lack of action comes as little surprise. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.