31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

They had access that could let <strong>the</strong>m deface <strong>the</strong> site in seconds, but <strong>the</strong>y would wait it out. The crew was still feeling <strong>the</strong> heat from<br />

HBGary, <strong>the</strong> #HQ log leaks, and Backtrace, and <strong>the</strong>y weren’t quite sure what <strong>the</strong>y were becoming yet. So <strong>the</strong>y settled for spying on <strong>the</strong><br />

users’ Gmail accounts, just watching <strong>the</strong> mails roll by. Nothing particularly significant was being discussed, but <strong>the</strong> group decided that if one<br />

<strong>of</strong> <strong>the</strong>m got arrested, <strong>the</strong>y would publish everything.<br />

“Most pr<strong>of</strong>essional and high-level hacks <strong>are</strong> never detected,” one <strong>hacker</strong> with Anonymous who went on to support Sabu and Topiary’s<br />

team said months later. Not long after <strong>the</strong> Infragard breach, ano<strong>the</strong>r group <strong>of</strong> <strong>hacker</strong>s broke into <strong>the</strong> computer network <strong>of</strong> Japan’s parliament,<br />

stealing login information and e-mails. It had taken three months before anyone figured out what had happened. The hack had involved<br />

infecting <strong>the</strong> computers with a virus, most likely by sending employees e-mails that carried Trojans. This was how script kiddies worked, <strong>the</strong><br />

Anonymous <strong>hacker</strong> said dismissively. It was loud, common, and didn’t require much skill.<br />

Sniffing around passively without anyone knowing always made sense. You could steal a database, sell it to spammers, and move on to<br />

o<strong>the</strong>r ways <strong>of</strong> hustling for money. With Anonymous, <strong>the</strong>re was also that obligation to cause a stir. But it depended what you had hacked into.<br />

The Anon claimed that when he breached a network, most <strong>of</strong> <strong>the</strong> time he acted “passively.” At one point, for instance, he and ano<strong>the</strong>r team<br />

had found a hole in a large foreign-government server leading to data on various hospitals. His team did not disclose <strong>the</strong> data and instead<br />

notified <strong>the</strong> admin <strong>of</strong> <strong>the</strong> problem. They even deleted <strong>the</strong>ir own copy <strong>of</strong> <strong>the</strong> data, since releasing <strong>the</strong> information would be<br />

“counterproductive.” On that same hack, however, <strong>the</strong>y also found an administrative server for that same foreign government that contained<br />

all IP ranges for its online services. “<strong>We</strong> sure released that,” he said.<br />

The paradox for <strong>hacker</strong>s who became part <strong>of</strong> Anonymous was that <strong>the</strong>re was suddenly a reason to go public with <strong>the</strong>ir leaks to make a<br />

point. With Infragard, Sabu, Kayla, and Topiary were taking <strong>the</strong> sniffing-passively route. What <strong>the</strong> group did with this information would set<br />

<strong>the</strong>m apart from o<strong>the</strong>r <strong>hacker</strong>s who sought money, curiosity, or a sense <strong>of</strong> personal achievement. They just needed <strong>the</strong> right moment.<br />

Chapter 17<br />

Lulz Security<br />

Soon it became clear to Sabu, Topiary, and Kayla what <strong>the</strong>y were really discussing: <strong>the</strong> creation <strong>of</strong> a new hacking team. It would be, in one<br />

way, like WikiLeaks. It would publish classified information that hadn’t been leaked, but stolen. The idea didn’t sound as nerdy as Topiary<br />

had thought a few months back.<br />

They decided unanimously that <strong>the</strong>y did not want to be constrained by <strong>the</strong> broad principles underlying Anonymous, which were:<br />

1. choosing targets because <strong>the</strong>y were oppressors <strong>of</strong> free expression<br />

2. not attacking <strong>the</strong> media.<br />

The idea was to do whatever it took to inspire Anonymous with new lulz, and maybe even grab <strong>the</strong> limelight again. In Topiary’s mind, this<br />

would lead to something far greater than any <strong>of</strong> <strong>the</strong> pranks he had ever pulled. The whole idea <strong>of</strong> lulz didn’t sit comfortably with Sabu, who<br />

was more interested in hacking as a form <strong>of</strong> protest. But he realized Anonymous needed some inspiration, and he figured he could steer<br />

Topiary and <strong>the</strong> o<strong>the</strong>rs toward more serious pursuits. Kayla was just happy at <strong>the</strong> chance to tear up <strong>the</strong> Internet again, and since <strong>the</strong>y needed<br />

to target more than just <strong>the</strong> Infragard website, she started looking for <strong>the</strong> <strong>We</strong>b’s hidden security holes <strong>the</strong> same way she had secretly done for<br />

WikiLeaks’s q.<br />

Kayla had a powerful web script that let her scan <strong>the</strong> Internet for any website with a vulnerability. This process <strong>of</strong> looking for security<br />

holes in many different websites at <strong>the</strong> same time was called automated scanning, or crawling. When she was ready to start using it, Kayla<br />

hooked <strong>the</strong> bot to Sabu’s chat server and <strong>the</strong>n cast it out like a net. She had only to type commands into <strong>the</strong> chat box, like find SQLI, to direct<br />

it. The bot constantly churned out new addresses <strong>of</strong> web pages that had vulnerabilities, <strong>the</strong>n filtered <strong>the</strong>m again. She had spent hours<br />

configuring <strong>the</strong> script so that certain types <strong>of</strong> URLs would show up in different colors. There were hundreds each day, and about 20 percent<br />

led to security holes. About 5 percent led to databases <strong>of</strong> ten thousand users or more. Over <strong>the</strong> course <strong>of</strong> two days, Kayla scoured <strong>the</strong><br />

websites <strong>of</strong> hotels, airports, and golf clubs, even Britain’s National Health Service, leading <strong>the</strong> team to hundreds <strong>of</strong> thousands <strong>of</strong> user details.<br />

They started stealing (or dumping) <strong>the</strong> info and came up with eight databases containing fewer than five thousand usernames and passwords<br />

and two big ones, <strong>of</strong> five hundred thousand and fifty thousand.<br />

By now Tflow, AVunit, and <strong>the</strong> Irish <strong>hacker</strong> from #InternetFeds named Pwnsauce had joined, making <strong>the</strong>m a team <strong>of</strong> six. It was a number<br />

and set <strong>of</strong> names that would remain fixed to <strong>the</strong> end. Pwnsauce was a skilled and amiable young man who had been involving himself with<br />

Anonymous since October <strong>of</strong> 2010, when he helped with <strong>the</strong> attacks on anti-piracy groups. Now he was happy to help comb <strong>the</strong> Internet for<br />

security holes.<br />

“Sabu, I may have a lead here,” he said at one point after finding something. When asked why he was working with <strong>the</strong> team, he said that<br />

while he agreed with <strong>the</strong> aims <strong>of</strong> Anonymous, “moreso I am here because <strong>of</strong> <strong>the</strong> people.”<br />

“I’ve never found more respectable and hardworking people in my life than those in this group,” added Topiary, who had been part <strong>of</strong> <strong>the</strong><br />

conversation. “And likable.”<br />

Anonymous attracted <strong>hacker</strong>s with a conscience, Pwnsauce explained. In a past life he had consorted with a “horrible mix” <strong>of</strong> <strong>hacker</strong>s who<br />

“ei<strong>the</strong>r did not know what <strong>the</strong>y were doing or who solely wanted to steal from people.” These were people who stole credit card details from<br />

small retail outlets and chains. Mom-and-pop shops and gas stations were frequently <strong>the</strong> easiest to hack when <strong>the</strong>y stored credit card<br />

information at <strong>the</strong> end <strong>of</strong> <strong>the</strong> day, data that <strong>of</strong>ten included <strong>the</strong> security codes on <strong>the</strong> backs <strong>of</strong> people’s cards—even though saving <strong>the</strong>m was<br />

illegal. They saw <strong>the</strong>se targets as easy pickings, but Pwnsauce had found a more interesting and varied bunch <strong>of</strong> people on AnonOps, and<br />

since <strong>the</strong>y had a wider array <strong>of</strong> skills, he claimed to have learned three times as much about programming and <strong>the</strong> Internet itself from

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!