Website defacement has become the mainstay of what essentially boils down to cybervandalism—and, just like its inner-city variant, it’s used as a medium to spread both playful and political messages. Yesterday, a multitude of subdomains belonging to security firm Panda Security were obliterated and replaced with cyber-graffiti scrawls, including a YouTube video, and the text-output of /etc/passwd and /etc/shadow files found on the machines.
This means that the usernames and passwords for the accounts on the machine compromised has been essentially aired in the public. Panda’s main site was not effected; but numerous subdomains were taken offline. Graham Cluley at Sophos’ Naked Security blog has an excellent takedown of the event.
The defacement is described by the attackers as payback for the recent arrests of five members of the now-defunct hacker group LulzSec:
pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has earning money working with Law Enforcement to lurk and snitch on anonymous activists. they helped to jail 25 anonymous in different countries and they were actively participating in our IRC channels trying to dox many others. Aside how clueless they are and how disgusting they look sucking police tiny dicks and even how much fun we got when they are trying to sell IT security services xD that only helps to endanger people even more; they contribute to bring activist to jail. activists, not even hackers. common people who are trying desperately to denounce the injustices happening on their countries right now.
we should just say:
yep we know about you.
how does it feels being the spied one?
eat cock now.
The manifesto posted in crimson red on a black background cites a blog post by Panda Security’s Luis Corrons where he criticizes Anonymous for being “childish.” The blog post entitled “Where is the lulz now?” mentioned the arrests and calls out the hackers for their malicious activity—it is currently offline, but there’s a cached version available here.
Corrons has continued to discuss the attacks on his Twitter feed, @Luis_Corrons, and continues to call the AntiSec group out on the childishness of vandalizing a website: “Lads defending freedom of speech until they don’t like what you say #sadlulz”
Panda Security has used their Facebook page to make an official statement and makes it clear that the compromised server was used for PR campaigns and public facing activity; it was not part of Panda’s internal network, nor was it part of their security consulting activities. No customer data was accessed.
The attack did not breach Panda Security’s internal network and neither source code, update servers nor customer data was accessed. The only information accessed was related to marketing campaigns such as landing pages and some obsolete credentials, including supposed credentials for employees that have not been working at Panda for over five years.
As for the accusation made in the cyber-graffiti manifesto left by the AntiSec/Anonymous hackers, Panda Security says that they were not involved in the arrests of LulzSec members and did not consult with the FBI on the case.
Chances are they were targeted simply because the security on their PR webservers was lax and a small band of hackers from Anonymous managed to get through. By attacking their site and spreading the news that they’d been hacked, they can use that to springboard their message into the public eye.
This is what we can probably expect for much political revenge manifestos delivered from the hacker fringe of Anonymous: messages spray-painted across the storefront windows of the Internet calling out for attention.
Latest posts by Kyt Dotson (see all)
- Meet VREAL: the startup that wants to become the Twitch of virtual reality - April 28, 2016
- What new features for Skype for Business means for DevOps and developers - April 28, 2016
- Bitcoin Weekly 2016 April 27: Bitcoin payments come to Steam, Japan OKs virtual currency, an unlucky someone sent 291 BTC as a fee - April 27, 2016