attackers - information warfare center€¦ · 18/02/2013 · obama’s executive order on cyber...
TRANSCRIPT
Information Warfare Center: www.informationwarfarecenter.com
1
0
20
40
60
80
100
120
140
160
Websitedefacements
2/11/2013
2/12/20132
2/13/20133
2/14/20134
2/15/20135
2/16/20136
2/17/20137
Attackers Ashiyane Digital Security Team
1923Turk
Barbaros-DZ
brwsk007
Dr.SHA6H
DZ27
HighTech
Hmei7
Micky
TurkHackArmy
The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors include system compromise, social engineering, and even traditional espionage.
Obama’s Executive Order on cyber security is sparking the freedom of speech and 4th amendment debate
along with the reintroduction of CISPA from the House Intelligence Committee. Because of this,
Internet activists deliver 300000 anti-CISPA signatures to Congress, and Anonymous is now actively
targeting US government sites with a declaration of cyber war.
For those interested, IWC has release a few small how-to videos related to manual data carving, logical
data recovery, forensic imaging, and a video to show how easy it is to connect to the Darknet covertly,
setup a Tor hidden service using programs on a USB thumb drive. Visit the resource below and follow
the “IWC Cyber Hints” link.
http://informationwarfarecenter.com/Videos.html
CIR
2
Legal (7)
Obama cyber order rekindles differences
DHS, NIST lynchpins to helping cyber order succeed
Obama seen likely to urge Congress to pass cybersecurity laws in State of the Union address
Obama to sign executive order on cybersecurity
Fight cyber crime through information sharing
Obama set to bring back CISPA via executive fiat
Obama and Congress to crack down on cyber security
Government (25)
Anonymous Fails To Shut Down Live Streams Of Obama Address
Army Kills Last Remaining Spy Blimp
Bush family emails hacked, photos and personal gatecode leaked
Cyber Police Skills Gap Warning In UK
Cyber warriors Anonymous plan state-of-union attack
Cyberspying said to target U.S. businesses
DHS, NIST lynchpins to helping cyber order succeed
Do APTs present a credible threat to national security?
Domestic-Drone Industry Prepares For Big Battle With Regulators
Experts Cite Need for Obama's Cybersecurity Action
Hacker investigation continues
Hackers used public alert system for zombie warnings
Intel chairman: Obama's cybersecurity order paves the way for CISPA
Israeli troops swap guns for computers to fight cyberattacks
NASA Data May Have Uncovered Galaxy's Youngest Black Hole
National IT director: SC moving in right direction
Pentagon creates new medal for cyber, drone wars
Police Hold 11 Over Ransomware Scam Affecting Thousands
Police warn of Valentine’s Day fraud online
Raytheon Reveals Social Media Analysis Tool
Seismic Activity Reported In Area Of Previous North Korea Nuclear Tests
Shealy: Security not a priority at Department of Revenue
State making security strides but more work to be done
U.S. Target Of Sustained Cyber Espionage Campaign
U.S. will target foreign-based cyberespionage
CIR
3
Technology (49)
"Facecrooks" site helping you steer clear of scams
Adobe Hit With Zero-Day PDF Attack
Adobe malware report probed; problem follows Flash security fix
Bill Gates Kicked It On Reddit Today
Bit 9 hacked, customers targeted with malware
Class of 2013: The future careers of this year's high school graduates
Comment Group hackers specialize in high-profile targeted hacks
Cyber enemy No. 1
Facebook Fesses Up To Security Breach
Facebook hacked in Zero-Day Attack
FIDO Alliance Says, 'Forget Passwords!'
Froedtert warns patients files may have been compromised
Google Chrome browser blocks websites with malware warnings, including YouTube
Google Play Sends App Buyers' Details To Devs
Highlights from 450 global data breach investigations
'Identity Thief' Increases Awareness of Crime
Infosec pros don't trust their own networks
Jawbone Warns Of Limited MyTalk Hack
Kids Are Hacking Each Other In Games Now
Linux Trailed Windows In Patching Zero-Days In 2012, Report Says
LTE-Advanced advances in new Broadcom modem
Malware-Servicing Websites Rocket 600 Percent, Say Researchers
Microsoft Confirms Kelihos Botnet Return On Its Radar
Microsoft Prepping Massive Security Update To Patch Near-Record 57 Bugs
Microsoft releases 12 bulletins that address 57 vulnerabilities
Montana TV Warns Of Zombie Attack In Prank Hack
One In Five Firms Facing Targeted Attacks
Oracle To Ship Revised Java Fix On February 19
Pakistani News Channel websites hacked by ZCompany Hacking Crew
Panelists advocate employee education, policy for cybersecurity
Password overload: How many can we actually remember?
Report: Marketing Cybercrime to Infect America
Retail Now Accounts for 45% of All Global Data Breaches
RuneScape Spiked With Trojan: 11-Year-Old Kid Writes Malware To Steal Passwords
Scammers Posing as Microsoft Reps to Steal Your Info
Stopping keyloggers before tax season
Students Explore Hacker Methods with Historical Perspective
Survey of GCs sees cybersecurity risk and anxiety
Trustwave: Linux platforms have “worst response time” for patching
Unlocking Ma Bell: How Phone Phreaks Came To Be
CIR
4
UPDATE: Malware Attack Permanently Shuts Down OpenX OnRamp
Valentine’s Day Scammers Give Love a Bad Name
Valentine's Day Scammers Go for the Heart
VMware Administrator Bug Snapped Shut
Week in review: Critical Flash update, Bamital botnet takedown, and children turning into malware developers
What to do when you’ve been hacked
What to do with that old PC
Yahoo 5 Years Behind on Java Security
Zombie Hoax Blamed On Lax Passwords
Mobile (4)
The Five: Smartphone security
Boffins Freeze Phones To Crack Android Crypto
iOS 6.x Hack Allows Personal Data Export, Free Calls
Why Do iPhone And iPad Users Jailbreak? Freedom
CIR
5
FBI News
FBI Law Enforcement Bulletin is Now Online
Government (7)
Consultant for the Florida Department of Transportation Pleads Guilty to Accepting a Bribe
Former Department of Defense Contractor Sentenced to 30 Months in Prison for Smuggling Kickback Proceeds from Afghanistan to the United States
Former Oklahoma Detention Officer Indicted for Making False Statements to the FBI
Guilty Plea Entered by Second Contractor Charged with Paying Bribes to Director of Traffic Engineering
Nine Charged with Conspiracy and Bribery Involving Southern California DMV Offices
NOAH Contractor Richard Hall Sentenced for Conspiracy and Theft from a Program Receiving Federal Funds
Transocean Pleads Guilty, is Sentenced to Pay $400 Million in Criminal Penalties for Criminal Conduct Leading to Deepwater Horizon Disaster
Technology (4)
A Valentine’s Day Warning
Hampton Man Sentenced for Wire Fraud
Looking for Love? Beware of Online Dating Scams
Riverview Woman Pleads Guilty to Tax Fraud Conspiracy and Aggravated Identity Theft
CPKP / Human trafficking(12)
Buffalo Man Pleads Guilty to Possession of Child Pornography
Cape Cod Man Pleads Guilty to Possessing Child Pornography
Charlotte Woman Sentenced for Role in Recruiting 13-Year-Old Girl into Prostitution Organization
Homer Resident Sentenced to 10 Years for Distributing Drugs to Teenage Girls and Possessing Child Pornography
Illinois Man Found Guilty of Sex Trafficking
Indiana Man Indicted on Charges of Sexually Exploiting Kansas Girl
Lummi Tribal Member Sentenced to 14 Years in Prison for Sexually Molesting Young Children
Maryland Man Pleads Guilty to Distribution of Child Pornography
Maryland Man Pleads Guilty to Possession of Child Pornography
Newtown Man Admits Producing Child Pornography
Nicholson Man Charged with Producing Child Pornography
Opelika Man Sentenced to 35 Years in Prison for Producing Child Pornography
CIR
6
Mobile (3)
USB Sharp v1.3.4 iPad iPhone - Multiple Vulnerabilities
Huawei Mobile Partner Poor Permissions
Air Disk Wireless 1.9 iPad iPhone - Multiple Vulnerabilities
Exploits (20)
Brother HL5370 Command Execution / Password Guessing
.NET Framework EncoderParameter Integer Overflow
chillyCMS 1.3.0 Shell Upload / Access Bypass
D-Link DIR-615 Rev H CSRF / Disclosure / Command Injection
Foxit Reader Plugin URL Processing Buffer Overflow
FreeFloat FTP 1.0 Buffer Overflow
IRIS Citations Management Tool Command Execution
Linksys E1500 / E2500 XSS / CSRF / Traversal / Command Injection
Linksys WAG200G XSS / Command Injection
Linksys WRT160N XSS / CSRF / Command Injection
Microsoft Internet Explorer SLayoutRun Use-After-Free (MS13-009)
Novell GroupWise Client gwcls1.dll ActiveX Remote Code Execution
Photodex ProShow Producer 5.0.3297 Buffer Overflow
Photodex ProShow Producer 5.0.3297 Memory Corruption
Polycom HDX Telnet Authorization Bypass
SAP Netweaver Message Server Buffer Overflow
Smoke Loader LFI / File Deletion
Sparx Systems Enterprise Architect 9.3.931 Corporate Password Disclosure
Windows Manage Persistent Payload Installer
VMWare OVF Tools Format String Vulnerability
This section of the CIR is dedicated to inform the public exploits, tools, and whitepapers that may directly affect the security posture of an organization. The term “Proof of Concept (PoC)” is another term for working exploit. Many of these PoCs will eventually find themselves in malicious logic such as viruses, Trojans, and root kits.
CIR
7
Web (51)
AbanteCart 1.1.3 Cross Site Scripting
0101SHOP CMS SQL Injection
BlackNova Traders SQL Injection
chillyCMS 1.3.0 - Multiple Vulnerabilities
Cometchat - Multiple Vulnerabilities
Cometchat Application - Multiple Vulnerabilities
Cometchat Cross Site Scripting / Code Execution
Demandware Store Cross Site Scripting
D-Link DIR-615 rev H - Multiple Vulnerabilities
Easy Live Shop System SQL Injection Vulnerability
Edimax EW-7206APg / EW-7209APg Redirection / XSS / Header Injection
Edimax EW-7206-APg and EW-7209APg - Multiple Vulnerabilities
Hiverr v2.2 - Multiple Vulnerabilities
IBM Lotus Domino 8.5.3 XSS / CSRF / Redirection
IP.Gallery 4.2.x and 5.0.x Persistent XSS Vulnerability
IRIS Citations Management Tool (post auth) Remote Command Execution
Linksys E1500/E2500 - Multiple Vulnerabilities
Linksys WAG200G - Multiple Vulnerabilities
Linksys WRT160N - Multiple Vulnerabilities
Netgear DGN2200B - Multiple Vulnerabilities
OpenEMR 4.1.1 (ofc_upload_image.php) Arbitrary File Upload Vulnerability
OpenEMR 4.1.1 Shell Upload
OpenPLI OS Command Execution / Cross Site Scripting
OpenPLI v3.0 beta (OpenPLi-beta-dm7000-20130127-272) - Multiple Vulnerabilities
osCommerce 2.3.3 Cross Site Request Forgery
PayPal Cross Site Scripting
Paypal Marketing Cross Site Scripting
Raidsonic IB-NAS5220 / IB-NAS4220-B XSS / Authentication Bypass
Raidsonic IB-NAS5220 and IB-NAS4220-B - Multiple Vulnerabilities
Scripts Genie Domain Trader (catalog.php, id param) - SQL Injection Vulnerability
Scripts Genie Domain Trader SQL Injection
Scripts Genie Gallery Personals (gallery.php, L param) - SQL Injection Vulnerability
Scripts Genie Gallery Personals SQL Injection
Scripts Genie Games Site SQL Injection
Scripts Genie Hot Scripts Clone (showcategory.php, cid param) - SQL Injection Vulnerability
Scripts Genie Pet Rate Pro - Multiple Vulnerabilities
Scripts Genie Top Sites (out.php, id param) - SQL Injection Vulnerability
Scripts Genie Top Sites SQL Injection
CIR
8
Shopping.com API Cross Site Scripting
Sonar 3.4.1 Cross Site Scripting
Sonicwall OEM Scrutinizer 9.5.2 Cross Site Scripting
Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities
Sonicwall Scrutinizer 9.5.2 SQL Injection
Sonicwall Scrutinizer v9.5.2 - SQL Injection Vulnerability
TP-LINK Admin Panel Multiple CSRF Vulnerabilities
TP-Link TL-WA701N / TL-WA701ND - Multiple Vulnerabilities
TP-Link TL-WA701N / TL-WA701ND Directory Traversal / XSS
Transferable Remote 1.1 XSS / LFI / Command Injection
Transferable Remote v1.1 iPad iPhone - Multiple Vulnerabilities
Ultra Light Forum Cross Site Scripting
Ultra Light Forum Persistant XSS Vulnerability
DoS (1)
SAP Netweaver Message Server Multiple Vulnerabilities
Tools (10)
360-FAAR Firewall Analysis Audit And Repair 0.3.9
Bluefog 0.0.4
Haveged 1.7a
ipset_list 2.6
ipset-bash-completion 1.9
Net-War Reaver Wrapper
PHP Kit 1.0
SI6 Networks' IPv6 Tookit 1.3
strongSwan IPsec Implementation 5.0.2
Web Exploitation Engine 0.1
Papers (2)
A Short Guide On ARM Exploitation
Hacking Trust Relationships Between SIP Gateways
The Beginner’s Guide to the Internet Underground v0.41
CIR
9
Mobile
Huawei Secunia Security Advisory 52014
Secunia Security Advisory - Myo Soe has discovered a security issue in Huawei Mobile Partner, which can be exploited by malicious, local users to gain escalated privileges.
Research In Motion (RIM)
Secunia Security Advisory 52168
Secunia Security Advisory - Research In Motion has acknowledged two vulnerabilities in BlackBerry Enterprise Server, which can be exploited by malicious people to compromise a vulnerable system.
Software
Vendor Advisory Description
AbanteCart Secunia Security
Advisory 52165
Secunia Security Advisory - Gjoko Krstic has discovered
multiple vulnerabilities in AbanteCart, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Accela Secunia Security
Advisory 52200
Secunia Security Advisory - A vulnerability has been
reported in Accela / eAccela BizSearch, which can be
exploited by malicious people to conduct spoofing attacks
Adobe Secunia Security
Advisory 52120
Secunia Security Advisory - Two vulnerabilities have been
reported in Adobe Shockwave Player, which can be exploited
by malicious people to compromise a user's system.
Adobe Secunia Security
Advisory 52166
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Adobe Flash Player and AIR, which can be
exploited by malicious people to disclose certain sensitive
information and compromise a user's system.
Adobe Secunia Security
Advisory 52196
Secunia Security Advisory - Two vulnerabilities have been
reported in Adobe Reader and Adobe Acrobat, which can be
exploited by malicious people to compromise a user's system.
Adobe Technical Cyber
Security Alert 2013-
43A
Technical Cyber Security Alert 2013-43A - Select Adobe
software products contain multiple vulnerabilities. Adobe
has released updates to address these vulnerabilities.
Apache Apache CXF WS-
Security
URIMappingIntercep
tor Bypass
Apache CXF suffers from a vulnerability when a simple
SOAP service is secured with the WSS4JInInterceptor, which
enables WS-Security processing of the request. WS-Security
processing is completely bypassed in the case of a HTTP GET
request, and so access to the service can be enabled by the
URIMappingInterceptor. This vulnerability affects all
versions of Apache CXF prior to 2.5.8, 2.6.5 and 2.7.2. CXF
2.7.1 is not affected by default, however the vulnerability
exists if you are explicitly adding the URIMappingInterceptor
to the default chain.
CIR
10
Apache Apache CXF WS-
Security
UsernameToken
Bypass
Apache CXF suffers from a UsernameToken WS-
SecurityPolicy bypass vulnerability. This vulnerability affects
all versions of Apache CXF prior to 2.5.9, 2.6.6 and 2.7.3.
Apache Secunia Security
Advisory 51988
Secunia Security Advisory - Two security issues have been
reported in Apache CXF, which can be exploited by malicious
people to bypass certain security restrictions.
Atmel Atmel AT91SAM7XC
Crypto Key Recovery
The Atmel AT91SAM7XC series of microprocessors suffer
from a cryptography key recovery vulnerability due to poor
memory management.
CA Secunia Security
Advisory 52192
Secunia Security Advisory - CA has acknowledged a security
issue in CA ControlMinder, which can be exploited by
malicious people to bypass certain security restrictions.
Cisco Secunia Security
Advisory 52109
Secunia Security Advisory - A vulnerability has been
reported in Cisco Unified MeetingPlace, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Cisco Secunia Security
Advisory 52194
Secunia Security Advisory - A vulnerability has been
reported in Cisco Unified MeetingPlace, which can be
exploited by malicious people to conduct cross-site request
forgery attacks.
Core Secunia Security
Advisory 52215
Secunia Security Advisory - Core Security has reported two
vulnerabilities in SAP NetWeaver, which can be exploited by
malicious people to compromise a vulnerable system.
Drupal Drupal Banckle Chat
7.x Access Bypass
Drupal Banckle Chat third party module version 7.x suffers
from an access bypass vulnerability.
Drupal Drupal Manager
Change For Organic
Groups 7.x Cross Site
Scripting
Drupal Manager Change for Organic Groups third party
module version 7.x suffers from a cross site scripting
vulnerability.
EMC Secunia Security
Advisory 52010
Secunia Security Advisory - A vulnerability has been
reported in EMC AlphaStor, which can be exploited by
malicious people to compromise a vulnerable system.
Empirum Empirum Password
Obfuscation
Empirum version 14.0 from Matrix42 is prone to a trivial
password recovery attack that allows users to obtain
passwords encrypted with the EmpCrypt.exe.
Empirum Empirum Password
Obfuscation
Empirum version 14.0 from Matrix42 is prone to a trivial
password recovery attack that allows users to obtain
passwords encrypted with the EmpCrypt.exe.
Ganglia Secunia Security
Advisory 52100
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Ganglia, which can be exploited by
malicious people to conduct cross-site scripting attacks.
CIR
11
Google Secunia Security
Advisory 52163
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Google Chrome, which can be exploited by
malicious people to disclose certain sensitive information and
compromise a user's system.
HP HP Security Bulletin
HPSBMU02815
SSRT100715 5
HP Security Bulletin HPSBMU02815 SSRT100715 5 - Potential
security vulnerabilities have been identified with HP
SiteScope. The vulnerabilities in SiteScope SOAP features
could be remotely exploited to allow disclosure of
information or code execution. Revision 5 of this advisory.
IBM Secunia Security
Advisory 52128
Secunia Security Advisory - A weakness and multiple
vulnerabilities have been reported in IBM Tivoli Application
Dependency Discovery Manager, which can be exploited by
malicious people to conduct spoofing, session fixation, cross-
site scripting, and request forgery attacks.
InfoSphere Secunia Security
Advisory 52140
Secunia Security Advisory - Some weaknesses and a
vulnerability have been reported in InfoSphere Master Data
Management Collaboration Server, which can be exploited by
malicious people to conduct spoofing and cross-site scripting
attacks
IP.Gallery IP.Gallery 4.2.x /
5.0.x Cross Site
Scripting
IP.Gallery versions 4.2.x and 5.0.x suffer from a persistent
cross site scripting vulnerability.
IP.Gallery Secunia Security
Advisory 52144
Secunia Security Advisory - A vulnerability has been
reported in the IP.Gallery module for IP.Board, which can be
exploited by malicious users to conduct script insertion
attacks.
KingView Secunia Security
Advisory 52190
Secunia Security Advisory - A vulnerability has been
reported in KingView, which can be exploited by malicious
people to compromise a user's system.
Lockstep Secunia Security
Advisory 50260
Secunia Security Advisory - worstenbrood has discovered a
vulnerability in Lockstep Systems Backup for Workgroups,
which can be exploited by malicious people to compromise a
user's system.
Microsoft Microsoft Internet
Explorer 8 Use-After-
Free
A use-after-free memory corruption vulnerability was
identified in Microsoft Internet Explorer 8. This allows a
malicious user to remotely execute arbitrary code on a
vulnerable user's machine, in the context of the current user.
The memory corruption happens when the application of a
style sheet performs style computations on the DOM. A
CParaElement node is released but a reference is still kept in
CDoc. This memory is reused when a CDoc relayout is
performed. Microsoft patch MS13-009 addresses this issue.
CIR
12
Microsoft Microsoft Security
Bulletin Summary
For February, 2013
This bulletin summary lists 12 released Microsoft security
bulletins for February, 2013.
Microsoft Secunia Security
Advisory 52122
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Microsoft Internet Explorer, which can be
exploited by malicious people to disclose sensitive
information and compromise a user's system.
Microsoft Secunia Security
Advisory 52129
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Internet Explorer, which can be
exploited by malicious people to compromise a user's system.
Microsoft Secunia Security
Advisory 52130
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Windows, which can be exploited by
malicious people to compromise a user's system.
Microsoft Secunia Security
Advisory 52133
Secunia Security Advisory - Microsoft has acknowledged
multiple vulnerabilities in Microsoft Exchange Server, which
can be exploited by malicious people to cause a DoS (Denial
of Service) and compromise a vulnerable system.
Microsoft Secunia Security
Advisory 52136
Secunia Security Advisory - Microsoft has acknowledged
multiple vulnerabilities in Microsoft FAST Search Server 2010
for SharePoint, which can be exploited by malicious people to
cause a DoS (Denial of Service) and compromise a vulnerable
system.
Microsoft Secunia Security
Advisory 52138
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Windows, which can be exploited by
malicious users to cause a DoS (Denial of Service).
Microsoft Secunia Security
Advisory 52143
Secunia Security Advisory - A vulnerability has been
reported in Microsoft .NET Framework, which can be
exploited by malicious people to compromise a user's system.
Microsoft Secunia Security
Advisory 52156
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Microsoft Windows, which can be exploited
by malicious, local users to gain escalated privileges.
Microsoft Secunia Security
Advisory 52157
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Microsoft Windows, which can be exploited
by malicious, local users to gain escalated privileges.
Microsoft Secunia Security
Advisory 52158
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Windows, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Microsoft Secunia Security
Advisory 52162
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Windows, which can be exploited by
malicious, local users to gain escalated privileges.
Microsoft Secunia Security
Advisory 52164
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Microsoft Windows, which can be exploited
by malicious people to disclose certain sensitive information
and compromise a user's system.
CIR
13
Microsoft Secunia Security
Advisory 52184
Secunia Security Advisory - A vulnerability has been
reported in Microsoft Windows, which can be exploited by
malicious people to compromise a user's system.
Microsoft Secunia Security
Advisory 52223
Secunia Security Advisory - Walied Assar has discovered a
vulnerability in Microsoft Windows, which can be exploited
by malicious, local users to cause a Denial of Service (DoS).
Microsoft Technical Cyber
Security Alert 2013-
43B
Technical Cyber Security Alert 2013-43B - Select Microsoft
software products contain multiple vulnerabilities. Microsoft
has released updates to address these vulnerabilities.
Moxa Secunia Security
Advisory 52141
Secunia Security Advisory - A weakness has been reported in
Moxa EDR-G903 Series, which can be exploited by malicious
people to conduct brute force attacks.
Newscoop Secunia Security
Advisory 51921
Secunia Security Advisory - Pawel Haldrzynski has
discovered a vulnerability in Newscoop, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
NextGEN Secunia Security
Advisory 52137
Secunia Security Advisory - Henrique Montenegro has
discovered a weakness in the NextGEN Gallery plugin for
WordPress, which can be exploited by malicious people to
disclose certain system information.
Nuance Secunia Security
Advisory 52119
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Nuance PDF Reader, which can be exploited
by malicious people to compromise a user's system.
OpenStack Secunia Security
Advisory 52139
Secunia Security Advisory - A vulnerability has been
reported in OpenStack Keystone, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Pidgin Secunia Security
Advisory 52178
Secunia Security Advisory - Multiple vulnerabilities have
been reported in Pidgin, which can be exploited by malicious
people to manipulate certain data, cause a DoS (Denial of
Service), and compromise a user's system.
Ruby Secunia Security
Advisory 52075
Secunia Security Advisory - A vulnerability has been
reported in the json gem for Ruby, which can be exploited by
malicious people to bypass certain security restrictions.
Ruby Secunia Security
Advisory 52112
Secunia Security Advisory - Two vulnerabilities have been
reported in Ruby on Rails, which can be exploited by
malicious people to bypass certain security restrictions and
compromise a vulnerable system.
Ruby Secunia Security
Advisory 52193
Secunia Security Advisory - A vulnerability has been
reported in the nori gem for Ruby, which can be exploited by
malicious people to compromise a vulnerable system.
Symantec Secunia Security
Advisory 52219
Secunia Security Advisory - Two vulnerabilities have been
reported in Symantec Encryption Desktop, which can be
exploited by malicious, local users to gain escalated
privileges.
CIR
14
VirusScan Secunia Security
Advisory 52147
Secunia Security Advisory - A vulnerability has been
reported in VirusScan Enterprise and Host Intrusion
Prevention, which can be exploited by malicious, local users
to potentially gain escalated privileges.
WebSphere Secunia Security
Advisory 52176
Secunia Security Advisory - Multiple vulnerabilities have
been reported in WebSphere Message Broker, which can be
exploited by malicious people to bypass certain security
restrictions, manipulate certain data, and cause a DoS (Denial
of Service).
WebSphere Secunia Security
Advisory 52191
Secunia Security Advisory - A vulnerability with an
unknown impact has been reported in WebSphere Cast Iron
Cloud Integration.
WordPress Secunia Security
Advisory 50836
Secunia Security Advisory - Charlie Eriksen has discovered
two vulnerabilities in the WP Online Store plugin for
WordPress, which can be exploited by malicious people to
disclose potentially sensitive information.
WordPress Secunia Security
Advisory 52079
Secunia Security Advisory - Henrique Montenegro has
discovered a vulnerability in the Pinboard theme for
WordPress, which can be exploited by malicious people to
conduct cross-site scripting attacks.
Xen Secunia Security
Advisory 52071
Secunia Security Advisory - A weakness has been reported in
Xen, which can be exploited by malicious, local users in a
guest virtual machine to cause a DoS (Denial of Service).
CIR
15
Linux / Unix Advisories
Distro Advisory Description
Debian Debian Security Advisory 2612-2
Debian Linux Security Advisory 2612-2 - This update to the previous ircd-ratbox DSA only raises the version number to ensure that a higher version is used than a previously binNMU on some architectures.
Debian Debian Security Advisory 2619-1
Debian Linux Security Advisory 2619-1 - A buffer overflow was found in the e1000e emulation, which could be triggered when processing jumbo frames.
Debian Debian Security Advisory 2620-1
Debian Linux Security Advisory 2620-1 - Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.
Debian Debian Security Advisory 2622-1
Debian Linux Security Advisory 2622-1 - Multiple vulnerabilities have been found in OpenSSL
Debian Debian Security Advisory 2623-1
Debian Linux Security Advisory 2623-1 - Kevin Cernekee discovered that a malicious VPN gateway can send crafted responses which trigger stack-based buffer overflows.
Debian Debian Security Advisory 2624-1
Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.
Debian Debian Security Advisory 2624-1
Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.
Debian Debian Security Advisory 2625-1
Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.
Debian Debian Security Advisory 2625-1
Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.
Debian Secunia Security Advisory 52038
Secunia Security Advisory - Debian has issued an update for xen-qemu-dm-4.0. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
Debian Secunia Security Advisory 52180
Secunia Security Advisory - Debian has issued an update for rails. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.
CIR
16
Debian Secunia Security Advisory 52209
Secunia Security Advisory - Debian has issued an update for openssl. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service) of the application using the library.
Mandriva Mandriva Linux Security Advisory 2013-009
Mandriva Linux Security Advisory 2013-009 - The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service via a Client: Diffie-Hellman Key Exchange Init packet. The updated packages have been upgraded to the 0.5.4 version which is not affected by this issue.
Mandriva Mandriva Linux Security Advisory 2013-010
Mandriva Linux Security Advisory 2013-010 - Multiple security issues were identified and fixed in OpenJDK. The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues.
Mandriva Mandriva Linux Security Advisory 2013-011
Mandriva Linux Security Advisory 2013-011 - The Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a IFRAME element. Cross-site request forgery vulnerability in the Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions. The updated packages have been patched to correct these issues.
Mandriva Mandriva Linux Security Advisory 2013-012
Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.
Mandriva Mandriva Linux Security Advisory 2013-012
Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.
CIR
17
Red Hat Red Hat Security Advisory 2013-0248-01
Red Hat Security Advisory 2013-0248-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.
Red Hat Red Hat Security Advisory 2013-0249-01
Red Hat Security Advisory 2013-0249-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.
Red Hat Red Hat Security Advisory 2013-0250-01
Red Hat Security Advisory 2013-0250-01 - ELinks is a text-based web browser. ELinks does not display any images, but it does support frames, tables, and most other HTML tags. It was found that ELinks performed client credentials delegation during the client-to-server GSS security mechanisms negotiation. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. This issue was discovered by Marko Myllynen of Red Hat. All ELinks users are advised to upgrade to this updated package, which contains a backported patch to resolve the issue.
Red Hat Red Hat Security Advisory 2013-0253-01
Red Hat Security Advisory 2013-0253-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. It was found that an excessive amount of information was logged when invalid tokens were requested, resulting in large log files. An attacker could use this flaw to consume an excessive amount of disk space by requesting a large number of invalid tokens. The CVE-2013-0247 issue was discovered by Dan Prince of Red Hat.
CIR
18
Red Hat Red Hat Security Advisory 2013-0254-01
Red Hat Security Advisory 2013-0254-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes several vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB13-05, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content.
Red Hat Red Hat Security Advisory 2013-0256-01
Red Hat Security Advisory 2013-0256-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.
Red Hat Red Hat Security Advisory 2013-0257-01
Red Hat Security Advisory 2013-0257-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.
CIR
19
Red Hat Red Hat Security Advisory 2013-0258-01
Red Hat Security Advisory 2013-0258-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.
Red Hat Red Hat Security Advisory 2013-0259-01
Red Hat Security Advisory 2013-0259-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.
Red Hat Red Hat Security Advisory 2013-0261-01
Red Hat Security Advisory 2013-0261-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. An attack technique was found against the W3C XML Encryption Standard when block ciphers were used in cipher-block chaining mode. A remote attacker could use this flaw to conduct chosen-ciphertext attacks, leading to the recovery of the entire plain text of a particular cryptogram by examining the differences between SOAP responses sent from JBoss Web Services.
Red Hat Secunia Security Advisory 52142
Secunia Security Advisory - Red Hat has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks
CIR
20
Red Hat Secunia Security Advisory 52154
Secunia Security Advisory - Red Hat has issued an update for java-1.7.0-openjdk. This fixes multiple vulnerabilities, which can be exploited by by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Red Hat Secunia Security Advisory 52155
Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-openjdk. This fixes multiple vulnerabilities, which can be exploited malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Red Hat Secunia Security Advisory 52183
Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise Application Platform and JBoss Enterprise Web Platform. This fixes a security issue and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.
Red Hat Secunia Security Advisory 52203
Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.
Slackware Slackware Security Advisory - OpenSSL Updates
Slackware Security Advisory - New openssl packages are available for Slackware 14.0, and -current to fix a bug in openssl-1.0.1d.
Slackware Slackware Security Advisory - Pidgin Updates
Slackware Security Advisory - New pidgin packages are available for Slackware 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.
SUSE Secunia Security Advisory 52077
Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.
SUSE Secunia Security Advisory 52135
Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks.
SUSE Secunia Security Advisory 52148
Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library.
SUSE Secunia Security Advisory 52149
Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system
SUSE Secunia Security Advisory 52150
Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.
SUSE Secunia Security Advisory 52151
Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.
CIR
21
SUSE Secunia Security Advisory 52152
Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
SUSE Secunia Security Advisory 52153
Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
SUSE Secunia Security Advisory 52159
Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks.
SUSE Secunia Security Advisory 52160
Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
SUSE Secunia Security Advisory 52204
Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact.
Ubuntu Secunia Security Advisory 52172
Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
Ubuntu Secunia Security Advisory 52174
Secunia Security Advisory - Ubuntu has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).
Ubuntu Secunia Security Advisory 52205
Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
Ubuntu Ubuntu Security Notice USN-1716-1
Ubuntu Security Notice 1716-1 - It was discovered that gnome-screensaver did not start automatically after logging in. This may result in the screen not being automatically locked after the inactivity timeout is reached, permitting an attacker with physical access to gain access to an unlocked session.
Ubuntu Ubuntu Security Notice USN-1717-1
Ubuntu Security Notice 1717-1 - Sumit Soni discovered that PostgreSQL incorrectly handled calling a certain internal function with invalid arguments. An authenticated attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service.
CIR
22
Ubuntu Ubuntu Security Notice USN-1719-1
Ubuntu Security Notice 1719-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.
Ubuntu Ubuntu Security Notice USN-1720-1
Ubuntu Security Notice 1720-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.
Ubuntu Ubuntu Security Notice USN-1721-1
Ubuntu Security Notice 1721-1 - It was discovered that curl incorrectly handled SASL authentication when communicating over POP3, SMTP or IMAP. If a user or automated system were tricked into processing a specially crafted URL, an attacker could cause a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service.
Ubuntu Ubuntu Security Notice USN-1722-1
Ubuntu Security Notice 1722-1 - It was discovered that jQuery incorrectly handled selecting elements using location.hash, resulting in a possible cross-site scripting (XSS) issue. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.
Ubuntu Ubuntu Security Notice USN-1723-1
Ubuntu Security Notice 1723-1 - Richard J. Moore and Peter Hartmann discovered that Qt allowed redirecting requests from http to file schemes. If an attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. This issue only affected Ubuntu 11.10, Ubuntu 12.04 LTS, and Ubuntu 12.10. Stephen Cheng discovered that Qt may report incorrect errors when ssl certificate verification fails. Various other issues were also addressed.
Ubuntu Ubuntu Security Notice USN-1724-1
Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.
Ubuntu Ubuntu Security Notice USN-1724-1
Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.
CIR
23
Ubuntu Ubuntu Security Notice USN-1725-1
Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.
Ubuntu Ubuntu Security Notice USN-1725-1
Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.
Ubuntu Ubuntu Security Notice USN-1726-1
Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.
Ubuntu Ubuntu Security Notice USN-1726-1
Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.
CIR
24
: (556)
Notifier L Domain OS View
40
services.casa.gov.au/coa Win 2003 mirror
40
survey.casa.gov.au/040.htm Win 2003 mirror
:::Torres:::
dsm.gov.tr Unknown mirror
UGBrazil LAMMER and DDOSSER
apps.peugeot.pt Linux mirror
[IN]SecInjection
semec.urupa.ro.gov.br Linux mirror
[IN]SecInjection
www.urupa.ro.gov.br Linux mirror
1923Turk
bandaeng.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
chaengnoi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
derd.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
dky.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
donkaeo.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
donklong.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
duanbaknoi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
duthung.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
huadon.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
huadong.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
huamueang.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
khaennoi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
kkk.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
kns.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
kty.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
kuchan.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
kudkung.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
laengpaen.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
laohung.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
laoyai.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
lmk.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
maha.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
maphrik.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nadee.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nakham.yst1.go.th/aL_Pars.htm Win 2008 mirror
This section of the CIR is dedicated to inform the public of website defacements that have targeted either larger organizations or government agencies. The perpetrators of these attacks are all over the world and have different reasons for hacking that range from curiosity to hacktavism to state sponsored espionage/cyber warfare activity.
CIR
25
1923Turk
nalu.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
namoom.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nasamai.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
naweing.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nd.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nf.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nited.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nongbok.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nonghin.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nonghoi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nongruea.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nongyang.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
nonkoy.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
phontan.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
phuehi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
plub.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
ponbang.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
psk.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
saingam.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
sampai.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
samran.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
samrong.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
sap.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
spn.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
tatthong.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
tecnicatura.corforiocolorado.g... Linux mirror
1923Turk
thungmon.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
tno.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
tongton.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
toongtae.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
wankru.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
wts.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
yangdiao.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
yangnoi.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
yk.yst1.go.th/aL_Pars.htm Win 2008 mirror
1923Turk
y-tech.yst1.go.th/aL_Pars.htm Win 2008 mirror
1o1or1not1
khuqldb7.gov.vn Win 2003 mirror
3n_byt3
www.khaokhansong.go.th/Home.php Linux mirror
AL.MaX HaCkEr
ecm.regione.veneto.it Linux mirror
AL.MaX HaCkEr
www.comune.castiglioneacasauri... Linux mirror
AL.MaX HaCkEr
www.geinfo.usp.br Linux mirror
AlbanianHackersCrew
www.drc.gov.bt Linux mirror
Amirh03in
www.stkc.go.th/content/189390 Linux mirror
anon
cpd.gov.kw Linux mirror
AnonymousZ
kpad.gorontalokab.go.id Linux mirror
AnonymousZ
tipikor.pn-gorontalo.go.id Linux mirror
ArabHaCk
www.gex.fr Linux mirror
Ashiyane Digital Security Team
elearning.anamai.moph.go.th/as... Linux mirror
CIR
26
Ashiyane Digital Security Team
saton.go.th/crypt0.htm Linux mirror
Ashiyane Digital Security Team
truat.go.th/crypt0.htm Linux mirror
Ashiyane Digital Security Team
villaamelia.gob.ar Linux mirror
Ashiyane Digital Security Team
villaamelia.gov.ar Linux mirror
Ashiyane Digital Security Team
www.bjmbgl.gov.cn/newshow.php?... Linux mirror
Ashiyane Digital Security Team
www.criancaecologica.sp.gov.br... Win 2003 mirror
Ashiyane Digital Security Team
www.paoordonchai.go.th/thm/300... Linux mirror
Ashiyane Digital Security Team
www.wlhtjjw.gov.cn/admin/cx/20... FreeBSD mirror
Azy Martin
nilg.gov.bd Linux mirror
b0x
docs.whmcs.com/images/ FreeBSD mirror
Baader Meinhof
acoitacavalo.prodepa.gov.br/in... Linux mirror
Baader Meinhof
mercurio.detran.pa.gov.br/inde... Linux mirror
Baader Meinhof
ns1.detran.pa.gov.br/index.html Linux mirror
Baader Meinhof
www.detran.pa.gov.br/index.html Linux mirror
Barbaros-DZ
cs.sqds.gov.cn Win 2008 mirror
Barbaros-DZ
dl.lnzxw.gov.cn Win 2003 mirror
Barbaros-DZ
dytjj.gov.cn Win 2003 mirror
Barbaros-DZ
lgtw.luogang.gov.cn/dz.htm Win 2003 mirror
Barbaros-DZ
ny.gaotai.gov.cn Win 2003 mirror
Barbaros-DZ
ny.yuanjiang.gov.cn Win 2003 mirror
Barbaros-DZ
oa.bzqts.gov.cn Win 2008 mirror
Barbaros-DZ
plg1.obec.go.th/administration... Linux mirror
Barbaros-DZ
shicai.wangqing.gov.cn/dz.cer Win 2003 mirror
Barbaros-DZ
sl.tx.gov.cn Win 2003 mirror
Barbaros-DZ
snnm.gssn.gov.cn Win 2008 mirror
Barbaros-DZ
www.cmi3.obec.go.th/images/axd... Linux mirror
Barbaros-DZ
www.cri4.obec.go.th/index3.html Linux mirror
Barbaros-DZ
www.cti2.obec.go.th/1/dz.txt Linux mirror
Barbaros-DZ
www.dalimz.gov.cn Win 2003 mirror
Barbaros-DZ
www.jidong.gov.cn/dz.htm Win 2003 mirror
Barbaros-DZ
www.ncsj.gov.cn Win 2003 mirror
Barbaros-DZ
www.wh-aic.gov.cn/dz.htm Win 2003 mirror
Barbaros-DZ
www.zxdj.gov.cn Linux mirror
Bazinqa
www.dogubayazitmuftulugu.gov.tr Linux mirror
BlackHacker
www.campohidalguense.gob.mx/fo... Linux mirror
bogel
www.pn-pangkalanbun.go.id Linux mirror
bogel
www.pn-tamianglayang.go.id Linux mirror
bogel
www.probolinggokab.go.id Linux mirror
brwsk007
dflzw.wfjj.gov.cn/505.txt Win 2003 mirror
brwsk007
map.jshrss.gov.cn/505.txt Win 2003 mirror
brwsk007
www.cbcrmz.gov.cn/data/505.txt Win 2003 mirror
brwsk007
www.comune.anguillaraveneta.pd... Win 2003 mirror
brwsk007
www.comune.bellino.cn.it/cgi-b... Win 2003 mirror
brwsk007
www.comune.castellar.cn.it/cgi... Win 2003 mirror
brwsk007
www.comune.cavallermaggiore.cn... Win 2003 mirror
brwsk007
www.comune.lagnasco.cn.it/cgi-... Win 2003 mirror
brwsk007
www.comune.pagno.cn.it/cgi-bin... Win 2003 mirror
brwsk007
www.comune.pontechianale.cn.it... Win 2003 mirror
CIR
27
brwsk007
www.comune.sanfront.cn.it/cgi-... Win 2003 mirror
brwsk007
www.comune.scarnafigi.cn.it/cg... Win 2003 mirror
brwsk007
www.comune.trichiana.bl.it/Doc... Win 2008 mirror
brwsk007
www.comune.verzuolo.cn.it/cgi-... Win 2003 mirror
brwsk007
www.djinfo.gov.cn/fck/UpLoad1/... Win 2003 mirror
brwsk007
www.dywghj.gov.cn/505.txt Win 2003 mirror
brwsk007
www.ecf.gov.cn/wusir/505.txt Win 2008 mirror
brwsk007
www.jngxrk.gov.cn/505.txt Win 2003 mirror
brwsk007
www.promueve.gob.bo/505.txt Win 2003 mirror
brwsk007
www.qx.gov.cn/505.txt Win 2008 mirror
brwsk007
www.tldmw.gov.cn/505.txt Win 2003 mirror
brwsk007
www.ylzjsw.gov.cn/Foosun_Data/... Win 2003 mirror
c0cain
www.ruiznayarit.gob.mx Linux mirror
c0d3-X-1337
maps.google.co.mw Linux mirror
c4
www.municarampoma.gob.pe/es/im... Linux mirror
Code inject0r
npfs-minfa.gov.pk Linux mirror
ColdHackers
menemenmesem.gov.tr Linux mirror
CrashBandicot69
www.kpp.ambon.go.id/MosTa.html Linux mirror
Cyb3rSec
lslab.lscore.ucla.edu Linux mirror
d3str0yers
www.consep.gob.ec/noticias/Ind... Linux mirror
DaiLexX
radtrials.mgh.harvard.edu/17sh... Linux mirror
DaiLexX
www.korem091asn.mil.id/images/... Linux mirror
DaiLexX
www.pn-blora.go.id Linux mirror
DevilCode
congresocam.gob.mx F5 Big-IP mirror
DevilCode
w3.lebanonembassy.my/shell.dia... Linux mirror
DevilCode
webdav.nencki.gov.pl FreeBSD mirror
DevilzSec
www6.excise.go.th/NEW_WEB/acti... Linux mirror
Dr.Freak
deosurat.gov.in Linux mirror
Dr.Freak
hesco.gov.pk/htmls/newsmediama... Win 2003 mirror
Dr.Freak
police.nferoze.gos.pk Win 2008 mirror
Dr.Freak
www.pakistanarmy.gov.pk/AWPRev... Win 2008 mirror
Dr.SHA6H
calbir.gov.tr Linux mirror
Dr.SHA6H
semecjeremoabo.ba.gov.br Linux mirror
Dr.SHA6H
www.ictd.gov.bd Linux mirror
Dr.SHA6H
www.mairie-thoiry.fr Linux mirror
Dr.SHA6H
www.moedu.gov.bd/images/ Linux mirror
Dr.SHA6H
www.moind.gov.bd/images/ Linux mirror
Dr.SHA6H
www.mopme.gov.bd/images/ Linux mirror
Dr.SHA6H
www.mosict.gov.bd/images/ Linux mirror
Dr.SHA6H
www.nlaso.gov.bd Linux mirror
Dr.SHA6H
www.nmst.gov.bd/templates/ Linux mirror
Dr.SHA6H
www.reprimin.gov.lk Linux mirror
Drac-101code
lektur.kemenag.go.id Linux mirror
Drac-101code
puspenda.kemenag.go.id Linux mirror
drie88
pn-gresik.go.id/errors.htm Linux mirror
Dz Mafia
ssk4.obec.go.th/main/dz.txt Linux mirror
DZ Mafia
www.brm4.obec.go.th/salary14/d... Linux mirror
DZ Mafia
www.cri1.obec.go.th/count.txt Linux mirror
CIR
28
DZ Mafia
www.kri3.obec.go.th/plans/dz.txt Linux mirror
DZ Mafia
www.lpn1.obec.go.th/kmc/resear... Linux mirror
DZ Mafia
www.npt1.obec.go.th/test1/dz.txt Linux mirror
DZ Mafia
www.plg.obec.go.th/images/dz.txt Linux mirror
DZ27
arrayade.cef.fr/v2/ Linux mirror
DZ27
avanceaularge.cef.fr Linux mirror
DZ27
catho92.levallois.cef.fr/wordp... Linux mirror
DZ27
catho94-fontenay.cef.fr Linux mirror
DZ27
catholique-cherbourg.cef.fr Linux mirror
DZ27
communaute-sfx.cef.fr Linux mirror
DZ27
dev2.cef.fr/tisserands/wp-cont... Linux mirror
DZ27
fmjweb.catholique.fr Linux mirror
DZ27
jjsf-nantes.cef.fr Linux mirror
DZ27
musiquesacree-nantes.sites.cef... Linux mirror
DZ27
nd-rumengol-quimper.cef.fr Linux mirror
DZ27
paroissechancelade.catholique.... Linux mirror
DZ27
paroisse-marcel-callo-61.cef.f... Linux mirror
DZ27
paroisse-poissy-78.catholique.... Linux mirror
DZ27
paroissesaintemarguerite-paris... Linux mirror
DZ27
paroissestfrontstetienneperigu... Linux mirror
DZ27
paroisse-stjogeo-nantes.cef.fr Linux mirror
DZ27
paroissetroisermites.catholiqu... Linux mirror
DZ27
perigordcentre.catholique.fr/D... Linux mirror
DZ27
quimper-steir-odet.cef.fr/wp-c... Linux mirror
DZ27
rivage-nantes.cef.fr/DZ27.html Linux mirror
DZ27
saintecroixenchateaubriant-nan... Linux mirror
DZ27
saintnizier-lyon.catholique.fr Linux mirror
DZ27
st-paul-val-allier-cl.cef.fr//... Linux mirror
DZ27
vincennes-saintmande.catholiqu... Linux mirror
DZ27
www.aumonerie13-paris.cef.fr//... Linux mirror
DZ27
www.catho92-bagneux.cef.fr/DZ2... Linux mirror
DZ27
www.catholiques-en-laye-78.cef... Linux mirror
DZ27
www.centre-naudieres-nantes.ce... Linux mirror
DZ27
www.cofaec.cef.fr/imgcol/DZ27.... Linux mirror
DZ27
www.comune.bella.pz.it Linux mirror
DZ27
www.doyennedebain35.cef.fr/DZ2... Linux mirror
DZ27
www.eglise-breiziroise.cef.fr/... Linux mirror
DZ27
www.fillesdejesus.catholique.f... Linux mirror
DZ27
www.forum.cef.fr/test/DZ27.html Linux mirror
DZ27
www.funcionjudicial-santaelena... Linux mirror
DZ27
www.marguerittes.catholique.fr... Linux mirror
DZ27
www.musiquesacree-nantes.cef.f... Linux mirror
DZ27
www.ndesperance-paroisse38.cef.fr Linux mirror
DZ27
www.nd-nazareth-paris.cef.fr/p... Linux mirror
DZ27
www.notredame-clermont.cef.fr/... Linux mirror
DZ27
www.notre-dame-de-nantes.cef.f... Linux mirror
DZ27
www.paroissechampagne-lyon.cat... Linux mirror
DZ27
www.paroisse-epernay.cef.fr/DZ... Linux mirror
CIR
29
DZ27
www.paroisse-francaise-barcelo... Linux mirror
DZ27
www.paroisse-joinville94.cef.fr Linux mirror
DZ27
www.paroisse-nd-lespieux.cef.f... Linux mirror
DZ27
www.paroissestecatherinedupeti... Linux mirror
DZ27
www.paroisse-st-manoire.cathol... Linux mirror
DZ27
www.paroisse-stsebastiensurloi... Linux mirror
DZ27
www.stdidier-limonest-lyon.cat... Linux mirror
DZ27
www.vergeze.catholique.fr/inde... Linux mirror
DZ27
www.veuves-chretiennes.cef.fr/... Linux mirror
Evil Genius Cyber Crimes
clothing.pof.gov.pk/categories... Solaris 9/10
mirror
EXPL()IT3R-Z
kgdcl.gov.bd/index.html Linux mirror
F15
www.sopley.gov.uk/syria.htm FreeBSD mirror
FAKE EBOZ
erzincan.gov.tr/index.php?opti... Linux mirror
FernandoAVT @BrDeface
www.novaesperancadosul.rs.gov.... Linux mirror
FurkHan
trabzonatk.gov.tr/noldu.html Linux mirror
Gabby
bpth-jm.go.id FreeBSD mirror
gaza hacker team
www.basra.gov.iq Linux mirror
gaza hacker team
www.moc.gov.iq/index.php Linux mirror
gaza hacker team
www.nsa.gov.iq Linux mirror
gaza hacker team
www.wasitic.gov.iq Linux mirror
gbs
www.comune.patti.me.it/babyqq.php Linux mirror
ghost-dz
mekhala.dwr.go.th/main/gh.html Win 2003 mirror
ghost-dz
www.10wsk.mil.pl/10wsk1/gh.html Linux mirror
ghost-dz
www.concytec.gob.pe/prospecta2... Linux mirror
ghost-dz
www.forestierenchef.gouv.qc.ca... Linux mirror
ghost-dz
www.impulsopanama.gob.pa/gh.html Linux mirror
ghost-dz
www.jmg.gov.my/gh.html Linux mirror
ghost-dz
www.kvawyai.go.th/gh.html Linux mirror
ghost-dz
www.mindeporte.gob.ve/bolivari... Linux mirror
ghost-dz
www.municocachacra.gob.pe/gh.html Linux mirror
ghost-dz
www.phichitpao.go.th/gh.html Linux mirror
ghost-dz
www.risaralda.gov.co/sitio/dep... Linux mirror
guba
www.midia.uff.br Linux mirror
h311 c0d3
gmail.com.mw Linux mirror
h311 c0d3
kaspersky.mw Linux mirror
h311 c0d3
www.google.com.mw Linux mirror
H3ll-dz
bappeda.bengkulukota.go.id/dz.php Linux mirror
Hacked By ProCracker'z Team
obras.mdcaracoto.gob.pe Linux mirror
Hacked Kaan Reis
pemmas.probolinggokota.go.id Linux mirror
Hacked Kaan Reis
www.armadillodelosinfanteslp.g... Linux mirror
Haxorsistz
edohmkp.gov.pk Linux mirror
Haxorsistz
www.merseysideprobationtrust.g... FreeBSD mirror
HighTech
alinea.defensoria.gob.sv Unknown mirror
HighTech
apps.citroen.pt Linux mirror
HighTech
biblioteca.comune.porcari.lu.it Linux mirror
HighTech
cemss2009.df.gob.mx Win 2003 mirror
HighTech
cemss2010.df.gob.mx Win 2003 mirror
CIR
30
HighTech
cmdca.niteroi.rj.gov.br Unknown mirror
HighTech
cultura.niteroi.rj.gov.br Unknown mirror
HighTech
defesadoconsumidor.niteroi.rj.... Linux mirror
HighTech
dids.crs.gov.ng Win 2008 mirror
HighTech
fan.niteroi.rj.gov.br Unknown mirror
HighTech
governo.niteroi.rj.gov.br Linux mirror
HighTech
neltur.niteroi.rj.gov.br Unknown mirror
HighTech
pet.ufma.br/computacao/ck.htm Linux mirror
HighTech
portal.komnasham.go.id Linux mirror
HighTech
smct.niteroi.rj.gov.br Linux mirror
HighTech
sst.niteroi.rj.gov.br Linux mirror
HighTech
web.sedam.ro.gov.br Linux mirror
HighTech
www.cemss2008.df.gob.mx Win 2003 mirror
HighTech
www.cmquatis.rj.gov.br Linux mirror
HighTech
www.comune.badia-tedalda.ar.it Linux mirror
HighTech
www.comune.barberinovaldelsa.f... Linux mirror
HighTech
www.comune.bibbona.li.it Linux mirror
HighTech
www.comune.bibbona.livorno.it Linux mirror
HighTech
www.comune.campagnatico.gr.it Linux mirror
HighTech
www.comune.camporgiano.lu.it Linux mirror
HighTech
www.comune.careggine.lu.it/x.htm Linux mirror
HighTech
www.comune.casteldelpiano.gr.it Linux mirror
HighTech
www.comune.castellazzara.gr.it Linux mirror
HighTech
www.comune.castellina-marittim... Linux mirror
HighTech
www.comune.castelnuovo-di-garf... Linux mirror
HighTech
www.comune.castelnuovodigarfag... Linux mirror
HighTech
www.comune.castelnuovo-di-val-... Linux mirror
HighTech
www.comune.castiglionedigarfag... Linux mirror
HighTech
www.comune.cinigiano.gr.it Linux mirror
HighTech
www.comune.comano.ms.it Linux mirror
HighTech
www.comune.fosciandora.lu.it Linux mirror
HighTech
www.comune.fosdinovo.ms.it Linux mirror
HighTech
www.comune.gallicano.lu.it Linux mirror
HighTech
www.comune.giuncugnano.lu.it Linux mirror
HighTech
www.comune.impruneta.fi.it Linux mirror
HighTech
www.comune.larciano.pt.it Linux mirror
HighTech
www.comune.licciananardi.ms.it Linux mirror
HighTech
www.comune.marcianodellachiana... Linux mirror
HighTech
www.comune.marcianodellachiana... Linux mirror
HighTech
www.comune.massarosa.lu.it Linux mirror
HighTech
www.comune.minucciano.lu.it Linux mirror
HighTech
www.comune.montalcino.si.it Linux mirror
HighTech
www.comune.pescaglia.lu.it Linux mirror
HighTech
www.comune.piazzaalserchio.lu.it Linux mirror
HighTech
www.comune.pievefosciana.lu.it Linux mirror
HighTech
www.comune.pievesantostefano.a... Linux mirror
HighTech
www.comune.poggiorsini.ba.it Win 2008 mirror
HighTech
www.comune.pomarance.pi.it Linux mirror
CIR
31
HighTech
www.comune.ponte-buggianese.pt.it Linux mirror
HighTech
www.comune.porcari.lu.it Linux mirror
HighTech
www.comune.quarrata.pistoia.it Linux mirror
HighTech
www.comune.roccalbegna.gr.it Linux mirror
HighTech
www.comune.san-romano-in-garfa... Linux mirror
HighTech
www.comune.sassetta.li.it Linux mirror
HighTech
www.comune.seggiano.gr.it Linux mirror
HighTech
www.comune.sillano.lu.it Linux mirror
HighTech
www.comune.trequanda.si.it Linux mirror
HighTech
www.comune.trequanda.siena.it Linux mirror
HighTech
www.comune.vagli-sotto.lu.it Linux mirror
HighTech
www.comune.vagli-sotto.lucca.it Linux mirror
HighTech
www.comune.villa-basilica.lu.it Linux mirror
HighTech
www.comune.villacollemandina.l... Linux mirror
HighTech
www.comune.villafranca.ms.it Linux mirror
HighTech
www.defensoria.pb.gov.br Linux mirror
HighTech
www.educaciongarantizada.df.go... Win 2003 mirror
HighTech
www.giovani.comune.certaldo.fi.it Linux mirror
HighTech
www.lavoripubblici.comune.borg... Linux mirror
HighTech
www.pcdob.org.br Linux mirror
HighTech
www.pirai.rj.gov.br/seceducacao/ Linux mirror
HighTech
www.prefeituradmc.ba.gov.br Linux mirror
HighTech
www.prepasi.df.gob.mx Win 2003 mirror
HighTech
www.qzgsl.gov.cn/index.htm Win 2003 mirror
HighTech
www.vaseguro.df.gob.mx Win 2003 mirror
HighTech
www.www2.comune.greve-in-chian... Linux mirror
HighTech
xyx.yygt.gov.cn Win 2003 mirror
Hmei7
angthong.dlt.go.th/x.txt Linux mirror
Hmei7
eaudit.jpa.gov.my/x.txt Win 2003 mirror
Hmei7
folklore.culture.go.th/x.txt Win 2008 mirror
Hmei7
gw-ifsp.ufscar.br/x.txt Linux mirror
Hmei7
hpc6.anamai.moph.go.th/x.txt Linux mirror
Hmei7
joomla149.pap.gov.pk/x.txt Linux mirror
Hmei7
kmcenter.rid.go.th/kcitc/2011/... Linux mirror
Hmei7
lnx.comune.santeliafiumerapido... Linux mirror
Hmei7
nakha.mahasarakham.police.go.t... Linux mirror
Hmei7
pmd.kemendagri.go.id/images/x.txt Linux mirror
Hmei7
webtmp.imb.uq.edu.au/x.txt Linux mirror
Hmei7
www.alcaldiasuchitoto.gob.sv/x... F5 Big-IP mirror
Hmei7
www.casacivil.ma.gov.br/x.txt Linux mirror
Hmei7
www.comune.candia.to.it/public... Win 2003 mirror
Hmei7
www.ecemar.aer.mil.br/images/x... Linux mirror
Hmei7
www.fmrp.usp.br/x.txt Linux mirror
Hmei7
www.inspect6.moe.go.th/osmie6/... Linux mirror
Hmei7
www.mesci.gov.cv/x.txt Unknown mirror
Hmei7
www.mkh.go.th/densil/images/x.txt Linux mirror
Hmei7
www.mnm-nok.gov.hu/images/x.txt Linux mirror
Hmei7
www.munitartagal.gob.ar/websit... Win 2008 mirror
CIR
32
Hmei7
www.otp.go.th/images/x.txt Win 2003 mirror
Hmei7
www.sedbarranquilla.gov.co/sed... Linux mirror
HTC 28 DZ
c2i.univ-perp.fr/lesite/index2... Linux mirror
Indishell
financebatagram.gov.pk Linux mirror
Indishell
www.fcbalochistan.gov.pk Linux mirror
indramayu cyber
kwbcmalukupapua.beacukai.go.id Linux mirror
indramayu cyber
www.jdih.dumaikota.go.id Linux mirror
Iran Security Team
comune.antonopoulou.it/images/ Win 2003 mirror
Iran Security Team
comune.brunoribis.it Win 2003 mirror
Iran Security Team
nl.sulsel.go.id/pic/ Win 2003 mirror
Iran Security Team
qldtda.sokhcn.cantho.gov.vn Win 2008 mirror
Iranian DataCoders Security Team
cixitour.cixi.gov.cn/zxylzx.asp Win 2003 mirror
Iranian DataCoders Security Team
www.sycourt.gov.cn Win 2003 mirror
Iranian DataCoders Security Team
www.wlrk.gov.cn/deface.html Win 2003 mirror
Jas0nz666
kapongan.situbondokab.go.id Linux mirror
Jas0nz666
pa-pasarwajo.go.id/html/index.... Linux mirror
Jr. r00t
comune.barile.pz.it/license.html Linux mirror
kwgdeface
aunap.gov.co Linux mirror
Learner
www.hbipo.gov.cn/Learner.htm Win 2003 mirror
LeDerpina
dprd.kapuashulukab.go.id/x-cyb... Linux mirror
LORD H
milicialviv.gov.ua FreeBSD mirror
LORD H
utmlviv.gov.ua FreeBSD mirror
LOv3rDns
dbdomain.nic.hn Linux mirror
LOv3rDns
people.csail.mit.edu/yupeng/ Linux mirror
LOv3rDns
portal.mcafee.com Win 2003 mirror
LOv3rDns
unite.coca-cola.com Linux mirror
LUN4T1C0
login.hospitalbagre.gov.co Linux mirror
LUN4T1C0
mlkttv.gov.vn/x.txt Win 2003 mirror
LUN4T1C0
muniparcoy.gob.pe/index.php Linux mirror
MadNet
publicart.culture.ntpc.gov.tw Win 2003 mirror
Maxney
tst.hp.com.cn/sacc/ Win 2008 mirror
McStone
www.fontierras.gob.gt Linux mirror
memek
www.acer.com.tn Linux mirror
MetalsoftHackersTeam
www.sicpy.gov.py/agenda/ Linux mirror
mhDx92
guchengzi.gov.cn/news.php?clas... Win 2003 mirror
mhDx92
l-tax.panjin.gov.cn/xs.php?cla... Win 2003 mirror
mhDx92
www.ccjsw.gov.cn/xxgk/gkml_sho... Unknown mirror
mhDx92
www.dwlgjjq.gov.cn/xs.php?id=376 Win 2003 mirror
mhDx92
www.ldwrc.gov.cn/xs.php?classi... Win 2003 mirror
Micky
arpusda.purworejokab.go.id/ind... Linux mirror
Micky
bapelluh.purworejokab.go.id Linux mirror
Micky
bapermasdes.purworejokab.go.id Linux mirror
Micky
bappeda.purworejokab.go.id Linux mirror
Micky
bpbd.purworejokab.go.id Linux mirror
Micky
dilatanak.purworejokab.go.id Linux mirror
Micky
dinakertransos.purworejokab.go.id Linux mirror
Micky
dinhubkominpar.purworejokab.go.id Linux mirror
Micky
dipertanhut.purworejokab.go.id Linux mirror
CIR
33
Micky
dp2kad.purworejokab.go.id Linux mirror
Micky
dpu.purworejokab.go.id Linux mirror
Micky
kec-bagelen.purworejokab.go.id Linux mirror
Micky
kec-banyuurip.purworejokab.go.id Linux mirror
Micky
kec-bayan.purworejokab.go.id Linux mirror
Micky
kec-bruno.purworejokab.go.id Linux mirror
Micky
kec-butuh.purworejokab.go.id Linux mirror
Micky
kec-gebang.purworejokab.go.id Linux mirror
Micky
kec-grabag.purworejokab.go.id Linux mirror
Micky
kec-kaligesing.purworejokab.go.id Linux mirror
Micky
kec-loano.purworejokab.go.id Linux mirror
Micky
kec-ngombol.purworejokab.go.id Linux mirror
Micky
kec-pituruh.purworejokab.go.id Linux mirror
Micky
kec-purwodadi.purworejokab.go.id Linux mirror
Micky
kppt.purworejokab.go.id Linux mirror
Micky
lh.purworejokab.go.id Linux mirror
Micky
pengairan.purworejokab.go.id Linux mirror
Micky
rsud-sarashusada.purworejokab.... Linux mirror
Micky
setwan.purworejokab.go.id/inde... Linux mirror
Micky
www.ncxh.gov.cn/x.txt Win 2003 mirror
misafir
www.cmjaguare.es.gov.br/site/ Linux mirror
misafir
www.comune.modigliana.fc.it Linux mirror
misafir
www.sungnoen.go.th Win 2003 mirror
MoroccanHunters
www.ba-phalaborwa.gov.za Linux mirror
mr-trouk
www.camaraguaraci.sp.gov.br Linux mirror
MrWanz
districtcourtssindh.gos.pk Win 2008 mirror
MrWanz
sindhinformation.gos.pk Win 2008 mirror
Nameless-XZ
www.takwang.go.th/newsdetails.... Linux mirror
Newbie Tulen
arif.cirebonkab.go.id/x.php Linux mirror
NewbieHacker061099.php
bdkambon.kemenag.go.id/index.php Linux mirror
NewbieHacker061099.php
bdkbandung.kemenag.go.id Linux mirror
NewbieHacker061099.php
bdkpadang.kemenag.go.id Linux mirror
NewbieHacker061099.php
blajakarta.kemenag.go.id Linux mirror
NewbieHacker061099.php
blamakassar.kemenag.go.id Linux mirror
NewbieHacker061099.php
pa-labuha.go.id/images/index.php Linux mirror
Nob0dy
www2.doh.gov.ph Linux mirror
No-Name Crew
library.vsi.esdm.go.id//detail... Linux mirror
nouse
ajgc.csfdc.gov.cn Linux mirror
nouse
muangmuk.go.th/index.php Linux mirror
nouse
phangngaculture.go.th Linux mirror
Over-X
forums.microsoft.com.mk/defaul... Win 2008 mirror
Over-X
www.jeep.com.mk/dz.html Win 2008 mirror
PaneLFaReSi
www.battalgazihem.gov.tr Linux mirror
q8unkn0wn
www.saimbeyli.gov.tr Win 2008 mirror
r00t-x
www.fto.gov.pk/x.txt Solaris 9/10
mirror
r00t-x
www.pakboi.gov.pk/x.txt Win 2003 mirror
Riad
tireboluram.gov.tr Linux mirror
CIR
34
rooterror
gadtonsupa.gob.ec Linux mirror
rooterror
www.ssffaa.gob.cl/wp-content/ Linux mirror
rooterror
www.ssffaa.gov.cl/wp-content/ Linux mirror
rooterror
www.taisha.gob.ec Linux mirror
S.V Crew
www.rayonslp.gob.mx/directorio... Linux mirror
s13doeL
naa.gov.kh/images/z.txt Linux mirror
s13doeL
southernleyte.gov.ph/z.txt Linux mirror
s13doeL
www.fundaciteportuguesa.gob.ve... Linux mirror
SA3D HaCk3D
www.zjzx.gov.cn/x.txt Win 2003 mirror
SA3D HaCk3D
www.zqwoman.gov.cn/x.txt Win 2003 mirror
SaccaFrazi
bkk2500.kalasin3.go.th/view.ph... Win 2003 mirror
Sa-Dz
www.alvarado.tolima.gov.co/tol... Win 2008 mirror
sahrawihacker
www.epsnepal.gov.np/details.ph... Linux mirror
SanFour25
comune.viticuso.fr.it/csc.php Linux mirror
SanFour25
ufrr.br/Dz.php Linux mirror
SanFour25
www.comune.pinosullaspondadell... Unknown mirror
SanFour25
www.comune.rosa.vi.it/csc.php Linux mirror
SanFour25
www.vilareal.pcp.pt Linux mirror
SCUD
www.phayao.m-society.go.th Win 2008 mirror
SeCuR!TY ** DR@G0N
secure.dss.cahwnet.gov/cdss/ Win 2008 mirror
SeCuR!TY ** DR@G0N
www.garden.harvard.edu/?p=2020 Linux mirror
sH3LL05Dz
www.m-culture.gov.dz/mc2/fr/li... Linux mirror
Soly
www.mahrukat.gov.sy Linux mirror
SouTHRaNDA
www.1128.syzefxis.gov.gr/robot... Linux mirror
Spyware
bpptepus.gunungkidulkab.go.id/... Linux mirror
Spyware
dishubkominfo.gunungkidulkab.g... Linux mirror
Spyware
dkp.gunungkidulkab.go.id Linux mirror
Spyware
inspektorat.gunungkidulkab.go.id Linux mirror
Spyware
jdih.gunungkidulkab.go.id Linux mirror
Spyware
pertanian.gunungkidulkab.go.id Linux mirror
Spyware
peternakan.gunungkidulkab.go.i... Linux mirror
Spyware
sosnakertrans.gunungkidulkab.g... Linux mirror
Spyware
ulp.gunungkidulkab.go.id Linux mirror
Spyware
www.dekranasda.gunungkidulkab.... Linux mirror
Spyware
www.gunungkidulkab.go.id Linux mirror
srabithail
fb.mol.gov.sa/blog/ Win 2008 mirror
surabayagetar
kpud-kedirikab.go.id/cp.html Linux mirror
surg4bij4k
cts.pn-prabumulih.go.id/x.htm Linux mirror
surg4bij4k
perkara.pn-prabumulih.go.id/x.htm Linux mirror
Swan
papersmart.un.org/rss.xml Unknown mirror
syrian_dragon
mod.gov.lb/x.txt Win 2008 mirror
syrian_dragon
moe.gov.lb/x.txt Win 2008 mirror
syrian_dragon
neo.gov.lb/x.txt Win 2008 mirror
syrian_dragon
olivepress.moe.gov.lb/x.txt Win 2008 mirror
syrian_dragon
petroleum.gov.lb/x.txt Win 2008 mirror
syrian_dragon
www.cfd.gov.lb/x.txt Win 2008 mirror
syrian_dragon
www.ict.pcm.gov.lb/x.txt Win 2008 mirror
syrian_dragon
www.lari.gov.lb/x.txt Win 2008 mirror
CIR
35
syrian_dragon
www.mfe.gov.lb/x.txt Win 2008 mirror
syrian_dragon
www.ministryinfo.gov.lb/x.txt Win 2008 mirror
syrian_dragon
www.ministryofdisplaced.gov.lb... Win 2008 mirror
t3ziz
tqm.northedu.gov.sa Linux mirror
The.Psiqopat
distanakan.tabalongkab.go.id Linux mirror
THE-AjaN
www.isuzu.com.gt Win 2003 mirror
TheExtraterrestrial
www.wnpg.lipi.go.id/login/ Linux mirror
TheHackersArmy
jeremiah.cityofbalanga.gov.ph Linux mirror
TurkHackArmy
fadc2012.media.gov.kw/index.ph... Win 2003 mirror
TurkHackArmy
midea.com.sg Linux mirror
TurkHackArmy
municanas.gob.pe Linux mirror
TurkHackArmy
munieladelanto.gob.gt/index.php Win 2008 mirror
TurkHackArmy
pa-sambas.go.id Linux mirror
TurkHackArmy
singkok.go.th Linux mirror
TurkHackArmy
smedan.gov.ng Linux mirror
TurkHackArmy
www.srsrf.gov.cn Win 2003 mirror
U_!!v!!_N
www.nscdc.gov.ng Linux mirror
ulow
www.4949.go.kr/a.htm Win 2003 mirror
ulow
www.fnxww.gov.cn/a.htm Win 2003 mirror
ulow
www.nema.go.ke/index.php?optio... Linux mirror
umutcon
safranboluhem.gov.tr Win 2008 mirror
uykusuz001
law.zjds.gov.cn/tr.txt Win 2003 mirror
VanPersie
www.geriatria.mz.gov.pl/FCK/va... Linux mirror
vaultHunter
www.comune.sora.fr.it Win 2003 mirror
VIRuS-baghdad
art.gov.sa/forums/ Linux mirror
Viscount
www.disdik.pelalawankab.go.id Linux mirror
Viscount
www.disperindagsar.pelalawanka... Linux mirror
waseem_Gujjar
www.communityclinic.gov.bd Linux mirror
x0x0
www.uncapsa.org/LIBRARYJournal... Win 2003 mirror
xatli
nfa.gov.ge/index.php?lang_id=E... Linux mirror
Xcrusher
pta-yogyakarta.go.id Linux mirror
xevil
bcaceh.beacukai.go.id Linux mirror
Xtremee_Killar
pepco.gov.pk/chk.php FreeBSD mirror
Xtremee_Killar
www.nidw.gov.bd/blog/ Linux mirror
Xtremee_Killar
www.peshawarhighcourt.gov.pk/n... Linux mirror
Z0mbi3_Ma
www.sahcfiji.com Linux mirror
Z0mbi3_Ma
www.suzuki.az/news/ Linux mirror
Z0mbi3_Ma
www.suzukidelcaribe.com/foro/D... Win 2008 mirror
Z0mbi3_Ma
www.suzukipr.com/foro/Discusio... Win 2008 mirror
Z4R4THUSTR4
igdr.univ-rennes1.fr/seminaire... FreeBSD mirror
Z4R4THUSTR4
www.biomodel.ufv.br Unknown mirror
Zikou-16
www.boavista.rr.gov.br/noticia... Linux mirror
ZoRRoKiN
barbadospolice.gov.bb/about-us/ Win 2003 mirror
ZoRRoKiN
lawcourts.gov.bb/Samu.htm Win 2003 mirror
ZoRRoKiN
www.msikorea.kr/webedit/img/no... Win 2008 mirror
ZoRRoKiN
www.navet.government.bg/assets... Linux mirror
zuanbinjai
sier.cedrssa.gob.mx/owner.txt Win 2008 mirror
CIR
36
N° Notifier Single def. Mass def. Total def. Homepage def. Subdir def. 1 Barbaros-DZ 3404 164 3568 1193 2375 2 Ashiyane Digital Security Team 2578 3388 5966 1166 4800 3 Hmei7 2319 1372 3691 738 2953 4 LatinHackTeam 1428 1276 2704 2254 450 5 iskorpitx 1322 953 2275 784 1491 6 Fatal Error 1032 1145 2177 1797 380 7 chinahacker 886 1342 2228 4 2224 8 MCA-CRB 852 625 1477 372 1105 9 By_aGReSiF 749 1424 2173 802 1371
10 3n_byt3 644 1882 2526 858 1668 11 HEXB00T3R 604 630 1234 405 829 12 Red Eye 579 1551 2130 2093 37 13 uykusuz001 554 159 713 38 675 14 brwsk007 537 187 724 24 700 15 Mafia Hacking Team 496 589 1085 322 763 16 Swan 496 258 754 219 535 17 Digital Boys Underground Team 461 442 903 179 724 18 Iran Black Hats Team 458 326 784 417 367 19 1923Turk 434 1569 2003 436 1567 20 misafir 424 434 858 226 632 21 Over-X 423 1585 2008 1302 706 22 DeltahackingSecurityTEAM 415 443 858 232 626 23 ZoRRoKiN 397 204 601 115 486 24 D.O.M 392 645 1037 824 213 25 kaMtiEz 391 390 781 238 543 26 HighTech 389 1779 2168 1754 414 27 Triad 375 315 690 397 293 28 [#elite top team] 362 303 665 570 95 29 sinaritx 359 98 457 160 297 30 k4L0ng666 353 1206 1559 222 1337 31 core-project 313 325 638 629 9 32 Ma3sTr0-Dz 313 736 1049 300 749 33 linuXploit_crew 312 166 478 478 0 34 Turkish Energy Team 311 224 535 319 216 35 ISCN 275 128 403 102 301 36 !nf3rN.4lL 263 376 639 177 462 37 NeT-DeViL 253 258 511 335 176 38 Poizonb0x 251 3 254 254 0 39 eMP3R0r TEAM 240 308 548 136 412 40 PowerDream 237 164 401 174 227 41 Vezir.04 234 111 345 152 193 42 KHG 233 281 514 210 304 43 S4t4n1c_S0uls 230 144 374 311 63 44 Hi-Tech Hate 223 6 229 229 0 45 XTech Inc 223 328 551 548 3 46 BeLa 210 123 333 147 186 47 m0sted 209 207 416 107 309 48 spook 209 31 240 40 200 49 Prime Suspectz 205 0 205 205 0 50 the freedom 198 136 334 22 312
CIR
37
Top 10 Ports Top 10 Source IPs
by Reports by Targets by Sources
Port Reports
23 1276855
22 1152147
80 1045632
445 996167
53 964842
21 809988
179 780139
137 711749
1433 462882
3389 419828
Port Targets
22 98387
5900 77287
1433 70677
23 69992
445 69544
3389 68065
443 65394
3306 64133
4899 45257
5060 43317
Port Source
6890 73307
445 46870
57778 19347
57695 18997
57694 18990
7170 18967
7257 18832
7263 18691
7205 18597
22613 18528
IP Address Reports Target IPs First Seen Last Seen
069.175.126.170 (US) 1,802,509 138,054 2012-07-11 2013-02-18
218.026.089.179 (CN) 414,283 131,918 2012-12-26 2013-02-17
097.074.127.004 (US) 237,560 105,785 2013-02-03 2013-02-17
060.211.241.131 (CN) 245,702 105,139 2012-09-29 2013-02-18
211.066.184.087 (CN) 309,733 97,912 2012-12-22 2013-02-17
117.079.091.214 (CN) 265,532 95,884 2013-01-27 2013-02-17
069.175.054.106 (US) 1,342,941 87,302 2012-07-14 2013-02-18
176.010.035.241 (IS) 246,343 84,081 2013-01-26 2013-02-18
005.199.133.223 () 115,780 72,983 2013-02-04 2013-02-18
060.191.111.085 (CN) 207,698 72,833 2012-06-26 2013-02-18
: DC3 DISPATCH [email protected]
FBI In the New [email protected] Zone-h www.zone-h.org Xssed www.xssed.com Packet Storm Security www.packetstormsecurity.org Sans Internet Storm Center isc.sans.org Exploit Database www.exploit-db.com Exploits Database www.exploitsdownload.com Hack-DB www.hack-db.com Infragard www.infragard.org ISSA www.issa.org Information Warfare Center informationwarfarecenter.com Secunia www.secunia.org Tor Network