Feeds

English Defence League website 'defaced, pwned' by hacktivists

'Lists of supporters and donors to be public soon'

Build a business case: developing custom apps

Hacktivists claim to have hacked and defaced the website of the far-right group English Defence League.

The englishdefenceleague.org site remains unreachable on Monday morning following a claimed assault by ZHC (ZCompany Hacking Crew). The Pakistani hacking crew claims to have gained access to Gmail accounts owned by EDL administrators before using donated funds to book expensive hotel rooms. Screenshots posted to substantiate this claim are inconclusive.

The defacement (archives by defacement mirror zone-h.org here) lambasts the EDL for its militant Islamaphobia and racism. Defenceleagueclothing.co.uk was defaced with the same message. Both sites run Apache on Linux. It's unclear how they were hacked.

ZHC, which accuses leaders of the organisation of using donations for their own personal benefit, also claims to have deleted the EDL's Facebook page. There are several EDL pages on Facebook and one of main ones, with more than 37,000 members, appeared to be working as normal on Monday morning.

A Zcompany Hacking Crew News page on Facebook boasted on Friday: "We told you EDL we will hack your facebook page we did it. We told you we will hack your website, we have done it today. EDL official website englishdefenceleague.org hacked and defaced. Expect more ;)"

The hackers threatened that "details of supporters and donors of EDL will be made public soon", cyberwarnews.info reports.

ZHC's manifesto against the EDL can be found on YouTube here. The attack fits the pattern of ZHC's previous attacks, which have included hundreds of defacements, many semi-automated.

The weekend's activities are not the first time the EDL website has been targeted by the controversial organisation's political opponents. Last year its forum was hacked by TeaMp0isoN, another hacktivist crew. The incident resulted in the alleged theft of the group's membership list, which TeaMp0isoN claimed was a result of its hack attack on EDL's website. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?