It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Hackers Hijack Cryptome and Delete Everything

page: 4
32
<< 1  2  3    5 >>

log in

join
share:

posted on Oct, 6 2010 @ 08:27 AM
link   

Originally posted by CitizenNum287119327
Cryptome site is up again as they have backups ready for incidents like this which makes the hack event nothing more than a dumb waste of time.

As for timing of the hack itself. The hack started Oct 2, so logic would suggest that Articles/Documents posted on Oct 1 might contain an item that got the hackers attention and prompted them to try and delete all items.

The only item of any import from the October 1 postings on Cryptome is a short item about the StuxNet Virus that is hitting Iran and others Industries.

That item, Stuxnet Myrtus or MyRTUs?, hints at the possible link to "Israel's Unit 8200"?

There is another link in this to a nytimes article, but i am not about to sign up to read it.




This is the most likely truth of the event, a single certain document was posted which talked about an ongoing OP so government hackers were dispatched to take down the server and it's content before a backup could be made. Even if this is the case you can't just assume that nobody has another copy of the leaked document in question but it's not impossible to make sure there aren't assuming very little time has passed since it was acquired/leaked. Perhaps it was just a test to see how effective their methods are, we'll see soon enough.
edit on 6-10-2010 by slayer420 because: (no reason given)



posted on Oct, 6 2010 @ 08:41 AM
link   
reply to post by MR BOB
 


Googling "Trainreq" yields some interesting things.


Josh aka Trainreq is not a legit hacker...


Taken from comments on this forum thread.

Apparently "Trainreq"s claim to fame is that he hacked Miley Cyrus's Gmail account.

Meet Mr Trainreq



And here is his Youtube page

Now maybe this Miley Cyrus obsessed script kiddie is responsible for Cryptome. Or maybe he's just a really, really convenient patsy.

My personal feeling would be the latter.

~Heff
edit on 10/6/10 by Hefficide because: bb error



posted on Oct, 6 2010 @ 11:53 AM
link   
Can you hack my A-Hole?

LOL.

Can you hack Consciousness?

LOL.

Can you Hack Prizimati Code?


LOL. Can you Hack the Organic/InOrganic Earth

Computer. LOL.......


NO. That is what Consciousness is for my friends. Use Technology that amplifies your Consciousness......................................................Then no one can Hack your ASS......



posted on Oct, 6 2010 @ 12:30 PM
link   
As soon as a hear stories like these, I think that some counter-intelligence fun and games are going on. They are trying to finish off Wikileaks using the same methods.



posted on Oct, 6 2010 @ 01:24 PM
link   
Yep, unfortunately, there are hackers working for the wrong side of the social fence (mainly the NSA), and get paid a lot to do that kind of trick. It's likely that that the guy behind Cryptome had everything backed up, so it's not the tragedy that it could be.



posted on Oct, 6 2010 @ 02:06 PM
link   
honestly, I'm more interested in why they consider the pinning of stuxnet on Israel's Unit 8200 by *NY Times* a "the media's propaganda machine" work

that's like screaming 'hey everyone, cia press releases are here, not there!'


linky



posted on Oct, 6 2010 @ 03:27 PM
link   
There are two days of information that are still unaccounted for. During those two days the email account lost whatever emails that were sent to it, there was only junk mail in the account when it was accessed after the incident.

My thoughts are that maybe there was an email that was going to be sent to Cryptome's Earthlink account, instead of intercepting the mail, they denied access to it completely and defaced the website as a cover up.


Cryptome: Steps of the Cryptome hack on the morning of 2 October 2010.
1. The Cryptome email account at Earthlink was accessed by unknown means and its access password changed.
2. According to emailed notifications from Network Solutions (NSI) retreived after email access was restored, the hacker requested information about Cryptome's multiple accounts by using the email address.
3. With a password guessed or stolen by unknown means the Cryptome.org management account at NSI was accessed.
4. All 54,000 files (some 7GB) were deleted and the account password changed.
5. NSI was sending emails of the account management modifications.
6. The hack was discovered by lack of access to email or to the Cryptome.org NSI account.
7. A call to NSI support restored all files from a back-up except for the previous two days.
8. An Earthlink online support chat restored email access and showed the NSI emails about management changes.
9. New passwords for Earthlink and NSI were set.
10. Email is not stored at Earthlink. What undelivered email might have been deleted by the hacker is unknown, the NSI and a couple of spam emails were awaiting delivery.
11. The other Cryptome accounts hosted by NSI do not seem to have been affected.
12. This is the second shutdown hack in 14 years. Except the one by Microsoft abusing DMCA.


Yay for Metasploit ehh?
Personally, when it comes to hacks like this, the defacing is only the dressing of the salad. Wait until you get to the lettuce and tomatoes! Intercepted emails is what is on my mind.
edit on 6/10/2010 by the_denv because: (no reason given)



posted on Oct, 6 2010 @ 03:41 PM
link   

Originally posted by Pinke

Personally I think if it was the government they would be a bit more effective about it. If this is the same government that allegedly faked the moon landings, hide the shape shifting serpents, and mislead the entire science community surely they would do something a bit more reliable.
edit on 5-10-2010 by Pinke because: (no reason given)


One thing that always seems missed in the conspiracy-debunking arguments is that the government is HIGHLY compartmentalized. This means not only does the right hand not necessarily know what the left is doing, but the right or left hand can do a better job at certain things than the other. And, if there is a conspiracy, the way it is kept secret is the ever so effective need-to-know. The government is not one entity that everyone likes to describe.



posted on Oct, 6 2010 @ 05:08 PM
link   
ATS is next Beetches!!!

haha! We should at least get dividends for all this pay per click #!



posted on Oct, 6 2010 @ 05:18 PM
link   
I have a feeling-
If this is a state sponsored attack, nothing to be surprised as this was the only way out for 'them'.

More importantly, i think by the time they get around to hacking everything everywhere, even discounting the 'hydra-effect', i think the job will be done.

There are enough number of people 'awake' around the world today & that is sufficient to start the movement.

The movement will definitely start... eventually


Order in Chaos



posted on Oct, 6 2010 @ 05:30 PM
link   
It looks like the Pentagon's cyberwarfare staff are aquiring skills. First wikileaks now this. Soon they'll be able to control and classify any event they don't want the american public aware of. They've got the MSM reporters that cover the war making recruitment propaganda. Meanwhile our kids are over there unaware of the true reasons why. Wars don't bring peace, they bring misery to all involved. Wars don't make friends, they make co-survivors and enemies. At the same time our presence in the region stirs up the hatred that makes these people want to strike back at us as they did 9/11 and many other attacks. The muslim radical movement is a fire we've been stoking with the lives of our young people all in the name of greed and ambition. Apparently the pentagon is counting on the counter attacks to keep the people convinced of the necessity of it all. How long before america suffers another major attack? Not long, support for the war is waning. How long before they manage a nuclear attack? It seems to be only a matter of time, if we continue in this way. This to me seems to be their objective, once the US suffers a nuclear terrorist attack, they'll have the public support they need for their war of conquest and the MIC will amass riches beyond measure.



posted on Oct, 7 2010 @ 12:01 AM
link   
reply to post by amodedoma
 


I don't think it's the pentagon, probably a private corporation; or sub-contractor to an agency that probably only has one government personal within its corporation. Who knows? We can't really pick names out of our hats, we need more proof before we can do that.



posted on Oct, 7 2010 @ 12:15 AM
link   
I dare anyone to hack my network... not going to happen.... Kaspersky Internet security FTW

ww3w



posted on Oct, 7 2010 @ 01:16 PM
link   
reply to post by iamjesusphish
 


so, we're splitting dns?

indeed it is



posted on Oct, 7 2010 @ 02:33 PM
link   

Originally posted by the_denv
I don't think it's the pentagon, probably a private corporation; or sub-contractor to an agency that probably only has one government personal within its corporation.


Most black ops programs are sub-contracted out these days... that way they don't have to deal with congress


When congress discovered tax payers were funding a 20 plus year CIA program on remote viewing from 1968 to 1995, the files vanished and PsiTech was formed a private company founded by the same people involved in the previous project. They run a cover front page that most would dismiss as a fringe site


Even the new prison they built near me in Pahrump Nevada was built by a private company and is being leased to the government



posted on Oct, 9 2010 @ 05:58 AM
link   
reply to post by zorgon
 


It wouldn't surprise me mate, there must be a lot of "paper companies" out there!


Looks like John Young has updated us with information regarding this matter. He has found out the address and details of XyriX/Ruxpin (the apparent hacker). You guys should check them pages out, this story is quite interesting, I don't get much time these days to type a passionate post, but I would love to.

Here are some details of XyriX/Ruxpin and Mike "Virus" Nieves :


XyriX/Ruxpin
Corey Barnhill
541 Hamilton St Apt A
Harrison, NJ 07029
IP Address: 76.124.84.68. Host name: c-76-124-84-68.hsd1.nj.comcast.net.

Virus Mike Nieves
20-30 Merle Place, Apt 3F
Staten Island,
NY 10305-3751
SSN: [omitted, ends in 916]
Birthday: 10/21/1948
Driver Licences: [omitted, ends in 979]
Home telephone: 347-466-4996
[Omitted] = sister
Old home phone (347) 466-4996
Mikenieves[at]tmail.com - T-mobile line
3476731499 = grandcentral number
IP Address: 96.250.224.79. Host name: pool-96-250-224-79.nycmny.fios.verizon.net.


This information was probably gathered using basic WHOIS searches, or various footprinting methods that can obtain data that is within the public domain. I can not say where John Young got this from, for all I know he could have hackers on his own side, the ISP gave the details or he purchased some ID software.

One thing is for sure, if Mike and XyriX are what they claim to be, then all of the details that John has gathered are completely false. Proxies and various tunnels can hide your identity, not to mention using someones wireless internet connection to make the hack. No hacker on Earth hacks from home without making sure that their real landline number of their telephone line is hidden from their ISP.

In saying that, they didn't clear the logs when they did the hack; it was sloppy...so John may just be in luck.

Funny John! Real Funny! You just opened XyriX and Mikes legs for all white hat hackers to boot them in the groin!
(Puts tinfoil hat on: Or is this all a setup like a honeypot to catch anyone who attempts to hack Mike or XyriX)

edit on 9/10/2010 by the_denv because: sp

edit on 9/10/2010 by the_denv because: typos



posted on Oct, 9 2010 @ 06:02 AM
link   
reply to post by CX
 


I agree.. seems strange that they would not or their host would not daily back up.

hacks are routine ...if they were not backed up then they or their host is stupid. If the web host was hacked, then that is strange...unless of course they were some 2 bit backyard op.

If the web host was hacked too, then you could be sure that it is an attack of some sort.



posted on Oct, 9 2010 @ 08:04 PM
link   
Some interesting stuff going on over at Cryptome.org.

The apparent hacker is filing a law suit against John Young, things are getting hot.

Check it out, this is the hacker, the one on the left:



Here is information about the hacker:
XyriX - EncyclopediaDramatica

Here is a few mails and details of Kyrogeniks:
Cryptome - Hackers and Consequences

Some chat logs of Cele (one of the hackers):
CeLe - Encyclopedia Dramatica

Hilarious!


Or is it all just too much information released about these people. Could be a practical joke and those guys are not the real guys, as they do blame others and could be possible snitches...who the hell knows the truth eh? I wonder if they really did get access to Johns various hard drives on his LAN?

Keep watching though, something is going to happen. By they way, watch where you click on those sites and make sure your blocking all hijack clicking and embedded sweeties lol



posted on Oct, 9 2010 @ 08:18 PM
link   
reply to post by the_denv
 


Man I'm glad you popped into this thread. You seem to know an awful lot and have kept the 'derp they just defaced the website so what?' folks in line. Thanks for all the new information.



posted on Oct, 14 2010 @ 09:26 AM
link   
reply to post by abrowning
 


No problem mate, I just find all this stuff very interesting and very funny too.

You want a laugh mate? I just read this recent post on Crytome.org, I promise you will laugh your ass off



Link: Crytome.org's latest post

Following this whole escapade has been filled with giggles! Xyrix's way of talking and wording things and the insults he fires at people is priceless, a character you would expect in a comedy film. Not to mention Paris Hilton lookalikes which are weird transsexual characters that he associates himself with.

Read the entire page, its gold dust.



new topics

top topics



 
32
<< 1  2  3    5 >>

log in

join