Feeds

Anonymous turns its fire on China

Over 480 gov and biz sites hit by hacktivist blitz

Securing Web Applications Made Simple and Scalable

Hacktivist group Anonymous has finally turned its attention to the People’s Republic of China, claiming to have defaced more than 480 web sites over the past few days including government sites, whilst urging Chinese hackers to join its cause.

The group apparently began its campaign in the region with the launch of its AnonymousChina Twitter account, which seems to have begun tweeting on 30 March.

In a list posted to Pastebin, the group claimed to have defaced over 480 sites, including several belonging to regional Chinese government organisations in areas such as Chengdu and Dalian.

In several separate posts Anonymous also claimed to have hacked and leaked user names, password details, phone numbers and emails from various government sites.

All the sites on the list we tried now appear to have been taken down, although the Wall Street Journal managed to take a screen grab showing the following message in English:

Dear Chinese government, you are not infallible, today websites are hacked, tomorrow it will be your vile regime that will fall. So expect us because we do not forgive, never. What you are doing today to your Great People, tomorrow will be inflicted to you. With no mercy.

According to the WSJ, the message also contained a link to an Anonymous site detailing how Chinese web users can bypass the Great Firewall, although at the time of writing this site appears to have been killed.

Not content with that, the group also posted another message to Pastebin, urging the Chinese people to revolt.

“So, we are writing this message to tell you that you should protest, you should revolt yourself protesting and who has the skills for hacking and programming and design and other ‘computer things’ come to our IRC,” the note read.

This is the first major Anonymous campaign targeting China, which is somewhat strange given the government’s hardline stance on web censorship and human rights - two issues guaranteed to get the group's attention.

In fact, the hacking of several minor regional government sites is unlikely to cause much consternation at Communist Party headquarters, and the group’s messages on Pastebin and posted on the defaced sites will largely have failed to reach their audience given that they were written in English.

Anonymous seems to be working on the latter issue, however, having sent a tweet out calling for help from would-be translators.

Given China’s strict web controls on social media, it’s unlikely that the group will be able to broadcast its message on platforms such as Sina Weibo and Tencent Weibo, so for the time being it’ll have to stick to Twitter – banned in China – and defacing web sites. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.