Feeds

Anonymous takes out Indian CERT as attacks continue

DDoS aplenty in retaliation for site blocking order

Build a business case: developing custom apps

Hacktivist group Anonymous continued its attacks on the Indian government and creative industries at the weekend by taking out the web sites of the national CERT and the country’s President in retaliation for widespread blocks on video and file sharing sites.

The group’s @opindia_revenge Twitter account documented the latest attacks, which also appeared to take offline the web site of film company and broadcaster Reliance Big Entertainment, and government portal india.gov.in.

All are now back online, having apparently been struck by a DDoS attack on Saturday or Sunday.

In a more unusual attack, the group also defaced the web site of an apparently innocent company – ABC Krishi Equipments – which makes agricultural machinery, in an apparent warning to the government.

“Government wouldn't want this to happen on their website ryt? They shud know we are still watching,” the group tweeted.

The attacks were first heralded over a week ago in a YouTube message from the hacktivist group which called out the Department of Telecommunications for effectively ordering Internet Service Providers to block file-sharing sites in India.

In reality it was Chennai-based anti-piracy service provider Copyright Labs which won the injunction from the Supreme Court to stop sites which were allowing the illegal sharing of the Tamil movies 3 and Dhammu.

When implemented by the ISPs, however, the John Doe order also blocked several legitimate sites including Vimeo and Daily Motion.

The #OpIndia campaign is just the latest in a long line of high profile attacks on governments and big business which the group has accused of corruption, censorship or human rights abuses.

However, Anonymous was forced to deny responsibility for a separate attack on an Indian military web site labelled part of 'Operation Kashmir'.

“We are not involved in attacking the web site of the Indian National Army,” it told Times of India. “We believe a country's defence organisations should be left alone." ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?