31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sabu hated white hat security firms. That much Topiary knew. And now he was talking about <strong>the</strong> subject more than ever in private,<br />

particularly about a revival <strong>of</strong> <strong>the</strong> anti-security movement. Sabu’s beef with white hats went back a long way. Anti-security got going in<br />

1999, when a vulnerability in widely used Solaris servers that was known to only a couple hundred <strong>hacker</strong>s in <strong>the</strong> <strong>world</strong> led to <strong>the</strong>ir hacking<br />

into a wide range <strong>of</strong> companies and organizations. Then <strong>the</strong>y started stealing e-mails from white hat security firms. The reason was <strong>the</strong>y hated<br />

a new edict in cyber security called full disclosure. The idea was that if cyber security experts (white hats) publicly disclosed a website’s<br />

vulnerabilities quickly, <strong>the</strong>y got fixed more quickly. But black hats preferred to keep <strong>the</strong> flaws hidden so that <strong>the</strong>y would stay within <strong>the</strong><br />

underground community and continue being exploited.<br />

Antisec had seen its sh<strong>are</strong> <strong>of</strong> hacktivist groups like LulzSec, and one <strong>of</strong> <strong>the</strong> first was a notorious clique called ~el8. The shadowy <strong>hacker</strong>s<br />

would target white hat security researchers and companies, steal <strong>the</strong>ir passwords and e-mails, and publish <strong>the</strong>m in a regular e-zine. It was a<br />

single white page with el8 elaborately spelled out in symbols at <strong>the</strong> top, not too dissimilar from <strong>the</strong> Pastebin posts <strong>of</strong> LulzSec and filled with<br />

new web scripts, exploits, stolen e-mails, and jeering commentary. The group called its work project mayhem, or “pr0j3kt m4yh3m.” The<br />

phrase was borrowed from <strong>the</strong> movie Fight Club, and <strong>the</strong>ir e-zines heavily referenced <strong>the</strong> film. The bulletins never spelled out ~el8’s<br />

motivations, but project mayhem appe<strong>are</strong>d to be a violent incarnation <strong>of</strong> <strong>the</strong> Antisec movement. Many in <strong>the</strong> white hat industry figured ~el8’s<br />

real motivation was to fight full disclosure so that black hats and gray hats would be <strong>the</strong> only people who knew about <strong>the</strong> Internet’s secret<br />

vulnerabilities.<br />

“One <strong>of</strong> <strong>the</strong>se days, <strong>the</strong>se kids <strong>are</strong> going to have to pay a mortgage and get a job,” said Eric Hines, an executive <strong>of</strong> one <strong>of</strong> <strong>the</strong> white hat<br />

firms that was attacked, in a Wired article. “And <strong>the</strong>y’re not going to become lawyers or doctors—<strong>the</strong>y’re going to do what <strong>the</strong>y’re good at.<br />

And that means getting a c<strong>are</strong>er in <strong>the</strong> security industry.”<br />

Sabu had nurtured a dislike for white hats even after <strong>the</strong> 1999 Antisec movement dwindled. Emick believed Sabu was simply resentful<br />

after getting turned down for a job in IT security. Ei<strong>the</strong>r way, <strong>the</strong> sentiment was rubbing <strong>of</strong>f on Topiary as <strong>the</strong> two had more one-on-one<br />

discussions. Sabu would point out that white hats charged $20,000 for penetration testing, stuff that <strong>the</strong> LulzSec crew could do for free. He<br />

explained that Topiary himself could have done what HBGary was charging $10,000 for. The message was that white hats were like<br />

unscrupulous car mechanics, tricking people into believing <strong>the</strong>y needed to pay thousands when <strong>the</strong> real cost was much lower.<br />

This line <strong>of</strong> reasoning was very different from <strong>the</strong> original Antisec argument over full disclosure. That’s because a decade later, <strong>the</strong> <strong>We</strong>b<br />

was now so chock-full <strong>of</strong> websites, data, and vulnerabilities that white hats weren’t pushing for full disclosure anymore. The view had<br />

flipped, and fully disclosing server flaws was veering into a criminal <strong>of</strong>fense. The notorious Internet troll Andrew “weev” Auernheimer, who<br />

had come up with <strong>the</strong> meme “Internets is serious business,” had learned that <strong>the</strong> hard way. In 2010, he and a few <strong>hacker</strong> friends from <strong>the</strong>ir<br />

trolling group Goatse Security poked around in AT&T’s website and found a security hole that led to internal data on 114,000 iPad users.<br />

<strong>We</strong>ev “fully disclosed” it, albeit through mainstream media and not a cyber security newsletter. The following January, six months after<br />

journalists at Gawker did an exposé on <strong>the</strong> AT&T security flaw for iPad users, <strong>the</strong> U.S. Department <strong>of</strong> Justice announced that it was<br />

charging weev with fraud and conspiracy to access a computer without authorization.<br />

A successful revival <strong>of</strong> Antisec could keep <strong>the</strong> authorities busy with more people like weev. Sabu wanted to keep <strong>the</strong> focus on white hats,<br />

like <strong>the</strong> old days, so it was crucial to find some real dirt on Hijazi’s tiny firm Unveillance. The company made money by hunting for<br />

malicious botnets, but digging around in its e-mails, Sabu and <strong>the</strong> o<strong>the</strong>rs thought <strong>the</strong>y found evidence that he was working with o<strong>the</strong>rs to<br />

snoop on Libyan web users. They decided to confront him on IRC under different guises to let him know <strong>the</strong>y had all his e-mails and that<br />

<strong>the</strong>y could do worse. On May 26, <strong>the</strong>y e-mailed him his password, with <strong>the</strong> subject line, “Let’s talk,” and said <strong>the</strong>y wanted to see his botnet<br />

research.<br />

Hijazi immediately picked up <strong>the</strong> phone and called <strong>the</strong> FBI. When he finally got through to someone and tried to explain what was<br />

happening, Hijazi got <strong>the</strong> impression <strong>the</strong> people on <strong>the</strong> o<strong>the</strong>r line weren’t interested, or perhaps didn’t understand what he was talking about.<br />

They referred him to an agent in his local <strong>of</strong>fice. When he called that number and told a local staffer that malicious <strong>hacker</strong>s were trying to<br />

access his botnet research, he was surprised when that individual replied, “What’s a botnet?”<br />

Eventually, an agent advised Hijazi to start logging all <strong>of</strong> his conversations with <strong>the</strong> group and to play along to see if he could get any<br />

information on <strong>the</strong>m. On <strong>the</strong> o<strong>the</strong>r side <strong>of</strong> <strong>the</strong> fence, Sabu, Topiary, and Tflow were trying to position Hijazi to admit that he wanted to hire<br />

<strong>the</strong> <strong>hacker</strong>s to attack his competitors. Both sides ended up lying to each o<strong>the</strong>r to obtain information, which made for a confusing encounter<br />

filled with misinterpretation.<br />

“The point is a very crude word: extortion,” Topiary had told Hijazi under <strong>the</strong> name Ninetails, adding that Hijazi would be paying for <strong>the</strong>ir<br />

silence. “You have lots <strong>of</strong> money, we want more money.”<br />

The team kept <strong>of</strong>fering to help Hijazi by attacking his corporate competitors. Playing along like he was supposed to, he eventually replied:<br />

“I can’t ask you to get someone and stay a ‘legit’ firm. Agreed?” When Topiary read this he believed that Hijazi was falling into <strong>the</strong>ir trap<br />

and that it was pro<strong>of</strong> <strong>of</strong> yet ano<strong>the</strong>r corrupt white hat, just as Sabu had predicted.<br />

“Can I take a guess at who you <strong>are</strong>?” Karim had later asked.<br />

“Karim, we’ve been expecting you to be secretly guessing since day one,” Topiary replied under a second nickname, Espeon. “Do sh<strong>are</strong>.”<br />

“808chan.”<br />

Sabu burst out laughing. “Are you serious bro?” he asked, using <strong>the</strong> nickname hamster_nipples. “How d<strong>are</strong> you call us a fucking chan.”<br />

“Then tell me,” replied Karim, who was keeping his responses as measured as possible while playing <strong>the</strong>ir game.<br />

“If we tell you who we <strong>are</strong>, you will shit yourself and shut <strong>the</strong> fuck up,” Sabu said. “But yes we <strong>are</strong> very well known.” The group kept<br />

prodding Hijazi, calling him dense and warning him about what <strong>the</strong>y could do with his e-mails. But Hijazi had to pretend to be oblivious—he<br />

knew just as well as Sabu and <strong>the</strong> o<strong>the</strong>rs that playing stupid was one <strong>of</strong> <strong>the</strong> most effective ways to social-engineer someone. It could<br />

sometimes trick him into revealing facts about himself.<br />

“Why be hostile? Just curious,” Hijazi said.<br />

“<strong>We</strong>’re not a chan,” replied hamster_nipples, who seemed to have an issue with status. “Don’t refer to us as a chan. <strong>We</strong> <strong>are</strong> security<br />

researchers.”<br />

“No worries,” said Hijazi. “You’re not a chan.”<br />

“Heh,” hamster_nipples said. “You’re testing my patience.”<br />

Though Sabu came across as menacing in <strong>the</strong> resulting chat logs (released by both LulzSec and Hijazi himself), Hijazi’s press <strong>of</strong>ficer later

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!