Most Updated News on How to Protect Against DoS Attacks!

Anonymous Takes Down Minnesota Courts Website for God Knows What Reason
Anonymous Suspected of Attacks on Central Banks in Indonesia and South Korea
Muslim Brotherhood’s Website Suffers DDoS Attacks and Data Leak
Businesses receive another warning over the threat of DDoS attacks
Multi-vector attack to become the most dangerous DDoS strike
Gartner: DDoS defenses have been backsliding but starting a turnaround
Ransomware demands are working, fueling an increase in attacks
Attackers Clobbering Victims with One-Two Punch of Ransomware and DDoS.
‘Anonymous’ Declares War On Corrupt Mainstream Media

Anonymous Takes Down Minnesota Courts Website for God Knows What Reason

An unknown party claiming to be part of the Anonymous hacker collective emailed the StarTribune on Wednesday morning, June 22, claiming responsibility for the ongoing DDoS attacks that downed the Minnesota Judicial Branch’s website for most of the business day.

The attacks started around 8:00 AM, and access to was restored around 5:15 PM, in the afternoon. At the time of writing, the website is still not accessible from some parts of the world, meaning the IT staff is still limiting access based on an IP filtering system.

“Anonymous Legion” takes responsibility for the attacks

In the email sent to the local newspaper, the hacker(s), who used the Anonymous Legion monicker, said they also managed to penetrate the Minnesota courts’ servers, stole data, and urged the newspaper not to believe the authorities if they denied the incident.

The attackers did not provide any proof to support their data breach allegations. Officials also informed the FBI Cyber Task Force.

This is the second time in six months when this happens to the Minnesota courts system. Last December, DDoS attacks took the same website offline for ten days between December 21 and 31. Previously, the website was hit with another DDoS attack on December 8, 2015.

No clues as to why (or if) Anonymous DDoSed the website

To this day, nobody has discovered who and why attacked the Minnesota courts system. No other judicial branch from any other state has suffered similar attacks.

This Twitter discussion from two cyber-security experts also shows the general confusion as to why Anonymous would attack this target. One of Anonymous’ biggest Twitter accounts has failed to provide any answers as well.

Outside the email the StarTribune received, there was no chatter online about the ongoing DDoS attacks.

It is exactly for these reasons that one of Anonymous’ biggest factions has decided to create a political party in the US, called The Humanity Party (THumP), to serve as the group’s official voice and to discourage smaller factions from launching blind DDoS attacks without any good reason.

THumP says it aims to coordinate Anonymous efforts in order to trigger a change in local politics, but not by launching senseless DDoS attacks, from which it will try to distance itself.


Anonymous Suspected of Attacks on Central Banks in Indonesia and South Korea

Authorities in Indonesia and South Korea have told Reuters about recent DDOS attacks aimed at the websites of their central banks.

Both Bank Indonesia and Bank of Korea took action by blocking IPs from parts of the globe they don’t usually see login attempts from. A Bank Indonesia spokesperson told Reuters that their institution blocked access from 149 countries in particular.

DDoS attacks are carried out using botnets. Botnets are a collection of hacked computers that act in sync based on orders received from the hackers, who control them with the help of a master server, called a C&C (command and control) server.

Usually, the infected machines are spread all over the world, and that’s why blocking IPs from some parts of the world might stymy such attacks. This is usually considered an extreme measure.

DDoS attacks used to mask more serious intrusions

The banking industry is on pins and needless right now, as most organizations are afraid of cyber-attacks and hacks similar to the ones suffered by the central bank of Bangladesh.

Last February, hackers stole $81 million from Bangladesh’s central by hacking the SWIFT inter-bank transaction system.

DDoS attacks are regularly used to mask more serious intrusions, as they keep IT staff busy with repelling the attacks, while hackers use other methods of infiltrating their systems. None of the two banks reported other incidents.

No actual evidence that Anonymous was behind the attacks

Without knowing who exactly carried out the attacks, authorities are now putting the blame on Anonymous, who announced last May a series of attacks aimed at banks around the world.

OpIcarus, as their campaign was called, lasted only for the month of May, and the group shifted focus to stock markets in June, and that’s how OpMayhem started. Additionally, Ghost Squad Hackers, one of the most active Anonymous subdivisions, launched OpSilence, aimed at mainstream media.

Normally, such groups carry out the attacks and spend as much time bragging about what they did on Twitter. There was no chatter from known Anonymous hackers regarding DDoS attacks on the infrastructure of these two banks.



An interesting New York Times article tells the story of how, against the backdrop of generally depressing conditions for the world’s fisheries, those in the United States have started to rebound owing to the combination of science-based guidelines and hard-won, public-private collaboration. The parlous condition of the world’s fisheries is a tragedy of the commons, because although fisheries are a critical source of protein for many populations, endemic overfishing means that 90% of the world’s fisheries are exploited in an unsustainable manner. The recent progress in the U.S. gives cause for hope. In 2014, the Marine Stewardship Council certified the West Coast U.S. fishery as sustainable and well-managed, 15 years after that entire fishery collapsed from overfishing.

DDoS: The Tragedy of the Internet Commons

There is no way you can equate the importance of the Internet to a vital source of daily nutrients for billions of people. Yet the Internet is no doubt a critical ingredient of modern society. And it’s far from being “overfished.” In fact, the Internet is exploding with promising new use cases.

Sadly, the Internet is also exploding with menace. Among other exploits, distributed denial of service (DDoS) is becoming ever more pervasive and dangerous. In the last couple of years, we’ve started to see DDoS attacks that hit a terabit per second or greater in volume. If that isn’t bad enough, attacks have the potential to swell by an order of magnitude thanks to the Internet of Things (IoT) bringing billions of new, poorly secured new devices online, ready to be exploited. Add this all up and we’re facing a future of multi-terabit DDoS attacks, big enough to bring even large Internet service provider (ISP) networks to a grinding halt.

Why is this a tragedy of the commons? One of the chief reasons why DDoS attacks are so common, pervasive and massive is because the Internet infrastructure industry allows Internet Protocol (IP) address forgery on a vast scale, enabling attackers to launch untraceable attacks with impunity from all over the globe. In essence, the Internet is full of poorly engineered networks in which botnets can thrive because those networks don’t implement well-known hygienic measures to check whether computers are sending traffic from IP addresses that have been assigned to them. In fact, up to 40% of the Internet today allows botnets to function unimpeded.

A Better Way Forward for the Internet

Trying to fix DDoS on the Internet can seem daunting, like dealing with all the fish in the seas. This where the progress made in restoring U.S. fisheries provides a hopeful angle. Using the right approach, based on science and sound management, you can really make a difference.

Back in 2000, the Internet Engineering Task Force (IETF)—the global standards body—introduced a Best Current Practice (BCP38) to address the IP-address spoofing problem. BCP38 directs Internet service providers to check incoming data traffic to ensure it’s coming from an IP address registered to the network that sent it.

To verify that IP addresses line up with their sending networks, major network-equipment manufacturers such as Cisco developed reverse-path-forwarding technologies for their routers. This approach is also known as network ingress filtering. A packet filter sits at the edge of a network to spot IP sources that have adopted an address belonging to some other network.

About 80% of large Internet backbone providers today have implemented ingress filtering. If other network operators of all sizes around the world followed suit, they would significantly reduce the impact of DDoS attacks.

When BCP38 made its debut, industry watchers suggested that the federal government should use its massive purchasing power to include ingress filtering as part of its contracting requirements. In this way, the industry could rely on market forces to improve network security, rather than imposing new regulations. But the powerful telecom lobby quickly pushed back, and Congress failed to pass federal contracting requirements.

Using known science like BCP38 is about will power and collaboration. It could take many years to get sound, scientific ground rules in place for the Internet. After all, the Internet isn’t collapsing—at least not yet—so there’s less motivation for the Internet’s commercial interests then there was for fishers who were going out of business. In the meantime, one viable idea is (at least in aggregate) to use market pressures to influence Internet service providers to halt the spread of phony IP addresses and botnet attacks.

Defend Yourself Locally, Contract With the Globe in Mind

There is no magical cure for DDoS attacks or cyber exploits. As long as humans have financial or other incentives, the attacks will continue. IT organizations must invest in an agile, multi-layered approach to defending themselves in the here and now. That effort should include perimeter-based detection systems that operate on a network-wide basis and offer flexibility to adjust alerts to changing conditions. Network organizations should also deploy deep network-traffic analytics that offer unconstrained ad hoc data exploration. Network and security experts can use that visibility to identify new attacks, prune false positive and negative alerts, and continuously improve detection and mitigation practices.

Companies and government agencies have another tool at their disposal. They can use their contracts for Internet services to make a safer Internet by requiring BCP38 compliance as part of all proposal requests. In this way, business leaders and public officials can do their part to prevent the Internet of Attacks and reduce future harm as the industry rolls out the next generation of Internet infrastructure.


Muslim Brotherhood’s Website Suffers DDoS Attacks and Data Leak

The official English language website of Muslim Brotherhood movement was forced to go offline after facing massive DDoS attacks!

Earlier today, a hacker going by the handle of SkyNetCentral conducted a series of distributed denial-of-service (DDoS) attack on the official website of Society of the Muslim Brothers or Muslim Brotherhood (Al-Ikhwan al-Muslimun in Arabic) forcing the website to go offline despite using CloudFlare DDoS protection service.

The hacker also conducted DDoS attacks on the official website of Freedom and Justice Party, which is an Egyptian political party affiliated with Muslim Brotherhood. That’s not all, the attacker also managed to bypass site’s security and steal Al-Ikhwan al-Muslimun’s files from the database, ending up leaking it online for public access.

Upon scanning the leaked data HackRead found it to be legit and never been leaked on the internet before. The data dump contains IP addresses, email conversation, comments and commenters’ names and IP addresses. It seems as if the hacker only managed to compromise some tables of the database without getting hold of any sensitive data. The only damage that can be caused is tracing the location of the commenters but that’s not a task just anyone can perform.

Here is a screenshot from the leaked data showing comments and IP addresses:


At the moment, the motive behind these attacks is unclear however after going through attacker’s profile it’s evident that they have been targeting Muslim Brotherhood, Council on American-Islamic Relations – CAIR and other similar organizations.


Businesses receive another warning over the threat of DDoS attacks

We have all heard the stories of businesses which have suffered debilitating DDoS attacks and, in some cases, succumbing altogether. Take Code Spaces, the web-based SVN and Git hosting provider which suffered such an attack in June 2014 that it was forced to wave the white flag and cease trading after recovering all the data lost would cost too much.

Now, a new piece of research from A10 Networks argues businesses face ‘sudden death’ from DDoS if caught unawares. The average company was hit by an average of 15 DDoS attacks per year, according to the survey of 120 IT decision makers, with larger organisations more badly affected.

One in three (33%) respondents said they had encountered DDoS attacks of more than 40 Gbps, while one in five had suffered downtimes of more than 36 hours due to the attack. The average attack of those polled lasted 17 hours.

More than half (54%) of respondents said they would increase their DDoS budgets in the coming six months, while multi-vector attacks were seen by the majority of those polled (77%) as the most dangerous form of DDoS threat in the future.

“DDoS attacks are called ‘sudden death’ for good reason. If left unaddressed, the costs will include business, time to service restoration and a decline in customer satisfaction,” said A10 Networks CTO Raj Jalan. He added: “The good news is our findings show that security teams are making DDoS prevention a top priority. With a better threat prevention system, they can turn an urgent business threat into an FYI-level notification.”

Previous research has examined the growing sophistication of DDoS threats. In April, Neustar argued that such DDoS issues were “unrelenting”, with more than seven in 10 global brands polled having been subject to an attack.


Multi-vector attack to become the most dangerous DDoS strike

DDoS attacks are growing in popularity in severity, but businesses are not going down without a fight. According to a new report by A10 Networks, businesses suffer, on average, 15 DDoS attacks per year.

The report, entitled “DDoS: A Clear and Ever Present Danger”, is based on a survey of 120 IT decision makers at large organisations.

An average DDoS attack can cause up to 17 hours of effective downtime, slowing the site down, denying customers access and triggering all-out crashes.

As they grow in popularity, they’re also becoming harder to fight against. An average peak bandwidth, according to the report, was between 30 and 40 gigabits per second, but more than half (59 per cent) experienced even stronger attacks.

More than three quarters (77 per cent) suffered a multi-vector attack, which A10 Networks believes will become the most dangerous type of attack in the future.

Firms are not going down without a fight, though. More than half are planning on increasing their DDoS-combating budget in the next half a year. IT security teams, CSOs and CIOs are all involved in defending the company from DDoS attacks.

“DDoS attacks are called ‘sudden death’ for good reason,” said Raj Jalan, CTO of A10 Networks. “If left unaddressed, the costs will include lost business, time-to-service restoration and a decline in customer satisfaction. The good news is our findings show that security teams are making DDoS prevention a top priority. With a better threat prevention system, they can turn an urgent business threat into an FYI-level notification.”


Gartner: DDoS defenses have been backsliding but starting a turnaround

After a surge by attackers, DDoS defenders are battling back

Distributed denial-of-service attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.

Gartner tracks the progress of new technologies as they pass through five stages from the trigger that gets them started to the final stage where they mature and are productive. The continuum is known as the Hype Cycle.

DDoS defense had reached the so-called Plateau of Productivity – the final stage – in 2012, but then has moved backwards in the Hype Cycle in the past few years into the previous stage – the Slope of Enlightenment – says Gartner analyst Lawrence Orans.

That fall, DDoS attacks were 10 times as large as any then seen hit Bank of America, JPMorgan Chase, Wells Fargo, U.S. Bank and PNC Bank using botnets of compromised servers to generate high volumes of traffic against not only HTTP and HTTPS but DNS as well. They also went after protocols including TCP, UDP, and ICMP.

That was followed up in 2013 by the use of NTP amplification attacks that used Network Time Protocol servers to swamp networks with responses to requests made from spoofed IP addresses in the target network. “That set DDoS back on its heels,” Orans says.

But security vendors and service providers that offer DDoS protection have caught up, and Gartner’s Hype Cycle rating for DDoS defenses will shift again back toward the maturity end of the scale, he says.

That’s encouraging because the number of DDoS attacks from the first quarter of 2015 to the first quarter of 2016 more than doubled, according to Akamai’s latest State of the Internet Security report, and mega attacks hit hundreds of gigabits per second.

Attacks of 300Gbps and above can be handled by leading DDoS vendors, Orans says, and given the ready availability of DDoS attack kits, it’s important for corporations to pay for this type of protection.

Competition among DDoS mitigation providers is increasing, so prices have dropped, he says. Flat fees per month were the norm for DDoS protection services, but now there are more flexible plans.

Protection can come in three models. Providers sell access to scrubbing centers, where traffic during a DDoS attack is redirected to a provider’s network where the attack traffic is dropped and only good traffic returned to the customer network. This can cost $5,000 per month and up. Some providers he mentioned: Akamai, Arbor, F5, Neustar, Nexusguard, Radware and Verisign.

Some ISPs offer this type of service at a 15% to 20% premium over bandwidth costs, he says. Some ISPs are better at it than others, so customers should check them carefully, particularly newer and regional ones.

Many businesses have multiple ISPs, so they should do the math to see if it makes sense to use this option, he says. Some ISPs he mentions: AT&T, CenturyLink, Level 3 and Verizon.

Content-delivery networks can also help mitigate DDoS attacks, he says, by virtue of their architecture. CDNs distribute customer Web content around the world so it’s as close as possible to end users. That distribution makes it harder for attackers to find the right servers to hit and diffuses their capabilities.

This option isn’t for everyone, he says. It’s not as effective as the others and it doesn’t make sense unless a business needs a CDN anyway to boost its response time.

Web application firewalls can help mitigate those DDoS attacks that seek to disrupt use of Web applications. They can be deployed on premises with gear owned by the customer, but internet-hosted and cloud-based WAF services are emerging, Orans says. Cloud-based WAF is fastest growing for mobile devices that must be deployed quickly, he says.


Ransomware demands are working, fueling an increase in attacks

Infoblox DNS Threat Index finds criminals are creating more ransomware-domains than ever, and predicts a continuing increase in attacks as more criminals rush to cash in. 


Emboldened by the wave of successful ransomware attacks in early 2016, more cybercriminals are rushing to take advantage of this lucrative crime spree.

Networking company Infoblox’s quarterly threat index shows cybercriminals have been busy in the first quarter of 2016 creating new domains and subdomains and hijacking legitimate ones to build up their ransomware operations.

The number of domains serving up ransomware increased 35-fold in the first three months of 2016 compared to the end of 2015, according to the latest Infoblox DNS Threat Index. The index doesn’t measure actual attack volumes but observes malicious infrastructure — the domains used in individual campaigns. Criminals are constantly creating new domains and subdomains to stay ahead of blacklists and other security filters. The fact that the attack infrastructure for ransomware is growing is a good indicator that more cybercriminals are shifting their energies to these operations.

“There is an old adage that success begets success, and it seems to apply to malware as in any other corner of life,” Infoblox researchers wrote in the report.

The threat index hit an all-time high of 137 in the first quarter of 2016, compared to 128 in fourth quarter 2015. While there was a lot of activity creating infrastructure for all types of attacks, including malware, exploit kits, phishing, distributed denial-of-service, and data exfiltration, the explosion of ransomware-specific domains helped propel the overall threat index higher, Infoblox said in its report. Ransomware-related domains, which include those hosting the actual download and those that act as command-and-control servers for infected machines, accounted for 60 percent of the entire malware category.

“Again in simple terms: Ransomware is working,” the report said.

Instead of targeting consumers and small businesses in “small-dollar heists,” cybercriminals are shifting toward “industrial-scale, big-money” attacks on commercial entities, said Rod Rasmussen, vice president of cybersecurity at Infoblox. Cybercriminals don’t need to infect several victims for $500 each if a single hospital can net them $17,000 in bitcoin, for example.

The latest estimates from the FBI show ransomware cost victims $209 million in the first quarter of 2016, compared to $24 million for all of 2015. That doesn’t cover only the ransoms paid out — it also includes costs of downtime, the time required to clean off the infection, and resources spent recovering systems from backup.

Toward the end of 2015, Infoblox researchers observed that cybercriminals appeared to have abandoned the “plant/harvest cycle,” where they spent a few months building up the attack infrastructure, then a few months reaping the rewards before starting all over again. That seems to be the case in 2016, as there was no meaningful lull in newly created threats and new threats — such as ransomware — jumped to new highs. The harvest period seems to be less and less necessary, as criminals get more efficient shifting from task to task, from creating domains, hijacking legitimate domains, creating and distributing malware, stealing data, and generally causing harm to their victims.


“Unfortunately, these elevated threat levels are probably with us for the foreseeable future — it’s only the nature of the threat that will change from quarter to quarter,” Infoblox wrote.

Ransomware may be the fastest-growing segment of attacks, but it still accounts for a small piece of the overall attack infrastructure. Exploit kits remain the biggest threat, accounting for more than 50 percent of the overall index, with Angler leading the way. Angler is the toolkit commonly used in malvertising attacks, where malicious advertisements are injected into third-party advertising networks and victims are compromised by navigating to websites displaying those ads. Neutrino is also gaining popularity among cybercriminals. However, the lines are blurring as Neutrino is jumping into ransomware, as recent campaigns delivered ransomware, such as Locky, Teslacrypt, Cryptolocker2, and Kovter, to victims.

Recently, multiple reports have touted ransomware’s rapid growth, but what gets lost is that ransomware isn’t the most prevalent threat facing enterprises today. Organizations are more likely to see phishing attacks, exploit kits, and other types of malware, such as backdoors, Trojans, and keyloggers. Note Microsoft’s recent research, which noted that in 2015, ransomware accounted for less than 1 percent of malware. The encounter rate for ransomware jumped 50 percent over the second half of 2015, but that is going from 0.26 percent of attacks to 0.4 percent. Even if there are 35 times more attacks in 2016, that’s still a relatively small number compared to all other attacks.

The good news is that staying ahead of ransomware requires the same steps as basic malware prevention: tightening security measures, keeping software up-to-date, and maintaining clean backups.

“Unless and until companies figure out how to guard against ransomware — and certainly not reward the attack — we expect it to continue its successful run,” warned the report.



Attackers Clobbering Victims with One-Two Punch of Ransomware and DDoS.

Encrypted systems now being added to botnets in the latest incarnations of ransomware attacks, with experts expecting this to become standard practice.

As if ransomware weren’t bad enough, attackers are now making the most of their attacks by adding victimized machines to distributed denial of service (DDoS) botnets at the same time that they’re encrypted and held hostage, according to warnings from several security research organizations in the last week.

This one-two punch is a natural “Gimme” for profit-minded attackers and one which security pundits expect will be standard issue for most ransomware kits in the near future.

Adding DDoS capabilities to ransomware is one of those ‘evil genius’ ideas,” says Stu Sjouwerman, CEO of KnowBe4, which today issued an alert that a new variant of Cerber ransomware has added DDoS capabilities to its payloads. “Renting out DDoS botnets on the Dark Web is a very lucrative business, even if prices have gone down in recent years. You can expect [bundling] it to become a fast-growing trend.”


The new trend was first detailed by researchers with Invincea last week, which found attackers using weaponized Office documents to deliver the threat via a Visual Basic exploit that allows them to conduct a file-less attack. That delivers malware with the underlying binary, giving the bad guys “two attacks for the price of one,” says Ikenna Dike of Invincea.

“First, it is a typical ransomware binary that encrypts the user’s file system and files while displaying a ransom note. Second, the binary could also be used to carry out a DDoS attack,” Dike said in a post. “The observed network traffic looks to be flooding the subnet with UDP packets over port 6892. By spoofing the source address, the host could direct all response traffic from the subnet to a targeted host, causing the host to be unresponsive.”

Seen by many as a perfect example of the mercenary nature of cybercrime, ransomware’s evolution has been driven entirely by black market ROI. According to the FBI, by the end of the year the ransomware market is expected to net the crooks at least $1 billion.

“Relatively high profit margins coupled with the relatively low overhead required to operate a ransomware campaign have bolstered the appeal of this particular attack type, fueling market demand for tools and services corresponding to its propagation,” explained FireEye researchers in an update last week on ransomware activity.

FireEye’s data shows that there was a noticeable spike in ransomware in March this year and that overall figures are on track for ransomware to exceed 2015 levels. This latest trend of DDoS bundling once again shows the lengths to which the criminals will squeeze every last bit of profitability and efficiency from ransomware attacks. It also offers fair warning to enterprises that even with backups, ransomware can pose threats to their endpoints and networks at large.

Even if data is restored on systems plagued by ransomware, there’s no guarantee that a system wouldn’t be used to continue to remain a part of the botnet or be used as a foothold for further attacks if the threat isn’t properly contained.


‘Anonymous’ Declares War On Corrupt Mainstream Media

As of June 1st, Ghost Squad Hackers – the same group leading #OpIcarus – have launched a series of coordinated attacks against leading members of the corporate mainstream media. Giving credit where credit is due, Tec.mic and Softpedia were the first to report the operation. But their reports only tell a portion of the whole story, we will explain why in a moment.


Broadly speaking, the goal of the #OpSilence is to attack all the corrupt major news networks that mislead and censor information from the general public. More specifically, the news agencies who conceal the crimes of Israel, while misleading the population about the mistreatment of the Palestinian people. The operation is off to a quick start, Ghost Squad has successfully” carried out DDoS attacks on CNN and FOX News” already just this month. More attacks are promised, NBC and MSM appears to be their next target. “FOXNEWS” Email server has been crashed for 8+ hours by #GhostSquadHackers

— s1ege (@s1ege_) June 1, 2016



When Tech.mic and Softpedia presented their coverage of the hacks, they included images and references directly to Anonymous. But upon reading these articles, Ghost Squad had a message of their own that they want everyone to hear:



— s1ege (@s1ege_) June 1, 2016



It is no secret Ghost Squad has a close affiliation with Anonymous; I am sure this is how the group got started in the first place. The group insists they speak for themselves, they are essentially trying to get their own reputation – credibility.


But there is a second layer to this discussion highlighting the recent divide within Anonymous. There has been a “Civil War” of sorts in recent months, and the reputation of the Anonymous collective as a whole has been damaged. Last winter, prominent hacktivist group Ghostsec also cut their ties with Anonymous. In a statement they said “Anonymous has a habit of shooting in every direction and asking questions later.” In other interviews they imply that Anonymous has developed a reputation for behaving immature – more concerned with silly DDoS’ing attacks than changing the world.


Since the quarreling of #OpWhiteRose many people have splintered off, or left Anonymous entirely – just another in the long list of strange effects Donald Trump has had on the entire world. Ghost Squad is one of the groups effected by this ‘Civil War.’ In the time since this happened last March, the group has exploded onto the scene, quickly becoming one of the most influential and talked about hacking groups in the entire world in 2016.


I have no doubt about the origins of this operation though, this goes back to#OpMediaControl which began last June. The operation called for the hacking of every major news network in the United States, testing their email systems, DDoS’ing web sites, attempting to hack in teleprompters or live feeds – anything you could think of. Last I heard back in December, they were still trying to recruit people to join them for an event this summer. Sound familiar to what Ghost Squad is doing right now?


For the purposes of accuracy, AnonHQ News reached out to our contacts in #OpMediaControl. We gave them a preview of the article and asked them what they thought. They showed us a press release dating May 28, 2016, a video proclaiming that#OpMediaControl has been re-engaged. Of course, #OpSilence proceeded to begin June 1st. In another interesting note, earlier last month Anonymous Resistance Movement, one of the groups behind #OpMediaControl, conducted an interview with GhostSquad. So as you can see, the two groups are well acquainted with one another – these operations are no coincidence.

Ghost Squad may be stepping up from the pack here, but make no mistake, this operation has been in the making for over a year and Anonymous led the way.



Copyright © 2014. DoS Protection UK. All Rights Reserved. Website Developed by: 6folds Marketing Inc. | Demo Test