Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Vigilante Hacks Government-Linked Cyberespionage Group (vice.com)
85 points by Jerry2 on May 12, 2018 | hide | past | favorite | 31 comments


>Decide to 1337 hack the website, I shall just upload a file with my custom 0day html script [0]

...custom 0day html script...?

Who is this guy? Batman?

Can anybody explain how an html 0day might be able to pwn a php file uploader?

That sounds terrifying... but at least I can be somewhat reassured that nobody is going to waste that on my wordpress installation...

[0] https://web.archive.org/web/20180508063705/http://5.61.27.15...


He's joking mostly. He uploaded a webshell through the very poorly designed system that was in use. A webshell just runs whatever command it's given on a the machine its located and returns the results.

A nodejs based webshell is like 5 lines of code.

edit: imagine a URL like this: http://yourtarget.example.com/webshell?cmd=whoami

And that runs "whoami" on the target machine and returns the results.


Gotya...

So why would anyone assume that these are state sponsored hacker servers that were infiltrated then?



I suspect light sarcasm on the part of the perpetrator.


or maybe they wanted to see how much bullshit they could feed vice and still get printed


Probably this. I'm extremely left leaning but even I know vice is absolute dogshit. I used to work in the tar sands with my brother's, and once a year we have a tradition of watching the Vice tar sands "documentary" to laugh at how wildly inaccurate and ill-informed it is.


> I’m extremely left leaning but even I know vice is absolute dogshit.

Is Vice supposedly left leaning? Isn’t one of their founders an alt-right Proudboy?


Yes, but he is no longer with Vice due to “differences of opinion” with the direction of the company.


Who have since disowned Vice multiple times.


by "1337 hack" I concur, but "custom html 0day" sounds oddly specific imho.


Stylometric analysis is a thing.


Or the individual could have made all of that up, nothing here that validates the story at all, could just be a smart kid trolling vice.

I mean really no citations except for what the individual provided them and some half-baked analysis that words from the kaspersky report were in what they received.


> “Hacking back should be legalized so Kaspersky could of done this themselves,” the hacker wrote in their message on the ZooPark server.

That line right there sounds like very much the propaganda the U.S. government has been pushing lately to convince people to support "hacking back." I've only heard government members promote this.

I guess this could be an operation where they try to make "hacking back" into something "heroes" (vigilantes) do.


If it's only government agencies that support hacking back, they sure are playing the long game.

E.g. the hack of the Gamma Group [1] was also purportedly carried out by a vigilante, who later published guides [2], [3] that also use the "hacking back" language. What are the odds?!

[1] https://arstechnica.com/tech-policy/2014/08/leaked-docs-show...

[2] http://pastebin.com/raw/cRYvK4jb

[3] http://shadow.systems/phineas-fishers-hackback-ii/

[4] HN discussion of [3]: https://news.ycombinator.com/item?id=11512845


I had this same thought when I read “hacking back” in the article. I just dismissed it as conspiratorial thinking, but now I see another article with the same phrase and premise... hmmmmm. It is something I would do if I were trying to get legislation passed.

But it could be easily explained by the fact the government uses the phrase constantly in the media. It’s not necessarily unexpected that two hackers would use them use the phrase when discussing the merits of, well, “hacking back.”


My preferred cyber forensic team, forces iPhone usage company wide. I had thought that was strange initially but definitely agree now.

Been around the world and outside the US it’s almost all Android, pretty scary that malware is apparently becoming more prevalent.


It's not just exploits tbh. Apple have really, really good tools for locking down and monitoring iPhones. The device enrolment thing they have is fantastic, and very streamlined. Meanwhile I have no idea what's going on with Android Enterprise/Samsung Knox/Whatever It's Called, and I don't think any sysadmins I know have a clue either.

Even without malware, Android needs to fix its permissions. What's the point in enforcing security policies on phones when a legitimate app, when given permission to, can read text messages on an employee's phone and send all the data to China? Businesses care about not having communications with customers leaked and Android is absolutely the wrong platform for that.


I agree.. It is crazy i HAVE to go through a complex procedure to root my phone, and install a different operating system, just so i can deny apps access to parts of my phone they should never have access to and because there is no easy way to tell if apps are accessing parts they shouldn't be.


> “Hacking back should be legalized so Kaspersky could of done this themselves,” the hacker wrote

This sentiment seems to becoming more and more popular; I wonder if we'll see more vigilantes (which the person in the article purports to be) as a result.


Unfortunately, I suspect vigilante behaviour and thinking is becoming more popular in society as a whole, both in cyber security and outside of it. See also the attacks on social media sites/attempts to get people fired/blacklisted, the increase in protests turning violent, and hacking attempts in general.

Feels like a decent percentage of the population have lost faith in the government and rule of law.

Which to be fair, wouldn't exactly be a shocking belief where cybersecurity is concerned. The police and authorities rarely do anything effective against hackers, virus creators and other internet law breakers in general, in part because it requires a lot of resources to investigate someone/some group who might very well be on the other side of the planet and outside the victim's legal system. In that sense, I'm not surprised it's getting more popular.


Shouldn't "hacking back" be extended to companies that collect user's data without obtaining their consent properly, without respecting privacy and local customs like Google, Cambridge Analytics, or Facebook do?


When leaders do not submit to the rule of law, neither will the citizenry.


The citizenry largely does submit to the rule of law regardless of what the government does. The consequences are too severe to do otherwise.

Especially when it comes to the CFAA in the US.


> The consequences are too severe to do otherwise.

Some basic precautions and common sense is all you need to avoid the CFAA.


Considering the Canadian Fire Alarm Association doesn't keep a strong presence in the US, it's indeed relatively easy to go under the radar.


I'm a security analyst. Maintaining flawless OPSEC for an extended period of time is hard as fuck.


It's not "more popular". You're just hearing more propaganda about it. Just because you hear a lie more often, doesn't make something true, either.


would you characterize the bipartisan introduction of the active cyber defense certainty act (ACDC)[1] to the US house of representatives as "propaganda" or a real thing that happened? we don't know if it's popular (amongst the law makers who control its fate) because there hasn't been a vote yet.

"more and more popular," maybe not amongst the infosec community, but "more and more likely to make it to a vote in the years that have passed since the introduction of CFAA?" that seems possible to me.

1. https://tomgraves.house.gov/uploadedfiles/discussion_draft_a...


The hacker has recieved bitcoin payment and signed a message with said address in this post. https://pastebin.com/sBw8ESZb


The hacker has released the data: http://www.lamept.com/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: