Feeds

Malaysian hackers deface 30+ sites hosted by Melbourne company

Serversinseconds.com.au and UberGlobal embroiled in hack

Next gen security for virtualised datacentres

A group of hackers identifying themselves as Johor Hacking Crew have defaced 30+ sites hosted by Melbourne company ServersInSeconds.com.au.

There appears to be no motive for the attack other than the fact the hackers spotted a vulnerability and decided to exploit it to dish out a lesson in security. That lesson was delivered as a scrolling defacement and a Pastebin dump listing the afflicted sites.

The finger for the defacements was first pointed at Canberra company UberGlobal, as the servers reside on IP addresses an servers the company curates. UberGlobal officials told The Register The actual user, however, is ServersInseconds.com.au, which resells UberGlobal services but loads its own operating systems onto its servers. That OS is Red Hat Linux,.

The defacement placed on 30_ sites by Johor Hacking Crew

Hackers defaced 30+ sites with the text above

ServersInSeconds.com.au owner Matt Goodwin said backups of the defaced sites are ready and that his team is working to restore normal service. Asked if he had any words for the Johor Hacking Crew, he drew a sharp breath, mastered himself and said he felt happier saying nothing, lest he again make the company a target. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?