Connect with us
Anonymous publishes 180 GB of data from a far right hosting Anonymous publishes 180 GB of data from a far right hosting

Security

Anonymous publishes 180 GB of data from a far-right hosting provider

Published

on

According to the hacktivists, the data makes it possible to track the leaders of the “fascist side of the Internet.”

Anonymous hacktivists reported the theft of nearly two hundred gigabytes of data from the Epik domain registrar. The company’s list of clients includes right-wing radical sites, including Texas GOP, Gab, Parler, 8chan, etc. The stolen data were published in the form of torrent files, and also posted on the Distributed Denial of Secrets (DDoSecrets) site.

The dataset, which totals 180GB, contains Epik customer data from the past ten years, Anonymous said. The hacktivists said the dataset contains “everything needed to track the real owners and leaders of the fascist side of the Internet.”

Epik is a domain registrar and service provider known for providing services to extreme right-wing organizations that have been abandoned by more popular service providers due to controversial and sometimes illegal content published by these organizations.

Among the stolen data are various SQL databases containing customer records associated with each domain name hosted by Epik.

According to Epik itself, the company is not aware of a possible data breach and is currently under investigation.

Anonymous also edited Epik’s knowledge base to ridicule all of the company’s denials.

“On September 13, 2021, a group of kids calling themselves Anonymous, which we had never heard of, said that they managed to get, um … in general, to be honest, all our data and publish it. They stated that this includes all user data. In general, everything. All usernames, passwords, email addresses, support calls that compromise every anonymous service we have. Of course, this is not true. We are not stupid enough to allow this to happen. ” reported in the edited Epik knowledge base, already deleted by the company, but preserved in an archive copy.

There is a sarcastic statement at the end of the knowledge base page: “We wrote it all ourselves, and this is not part of the hacked account.”

Click to comment

Leave a Reply

Your email address will not be published.

Components

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Published

on

Unique behavior of Ryzen 7000 processors The notorious patches from

Recently, various vulnerabilities in processors have been talked about much less often, and users no longer worry about performance degradation due to patches. As it turns out, Ryzen 7000 processors generally benefit from such patches!

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

At least this is true for Linux, since it was in this OS that the author tested the Ryzen 9 7950X and Ryzen 5 7600X. It turned out that when working out of the box, the CPUs show better performance than when loading a special version of Linux with a deactivated patch from the Specter V2 vulnerability.

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Of course, such results do not appear everywhere, and during normal work they are unlikely to be critical. In particular, in total, according to the results of 190 tests, the difference was only 3%.

Continue Reading

Gaming

PlayStation 5 has been hacked. You can install games, but you can’t run them yet

Published

on

PlayStation 5 has been hacked You can install games but

Nearly two years after the PlayStation 5 went on sale, modders have found a way to jailbreak the console, albeit with some restrictions.

IGN notes that the modder, known as SpecterDev, disclosed an apparent jailbreak that is described as an experimental IPV6 kernel exploit exploiting a WebKit vulnerability.

The jailbreak will only work on PS5 systems with firmware 4.03 or later. If you’ve updated your PS5 since October last year, you won’t be able to try the exploit. But even if you need firmware, an attempt to install a jailbreak works only in a third of cases.

PlayStation 5 has been hacked.  You can install games, but you can't run them yet

As for what you can do with a jailbroken PS5 right now, you’ll get access to the system’s debug menu. You can also install games from outside the PlayStation Store, but you cannot run third-party software.

Modder Lance McDonald tested the jailbreak and was able to install the PT demo, the famous teaser of the canceled Silent Hills game. However, he was unable to start playing the game. Although the exploit offers read/write access to the PS5, there is currently no way to execute the downloaded files. In any case, PT is not backwards compatible with PS5.

It is currently unlikely that this jailbreak will be widely used anytime soon due to its limitations and the fact that Sony can ban modder accounts. On top of that, there is a risk of locking the console at that time. However, it may give other hackers and modders a foundation to build more robust jailbreak tools.

Continue Reading

Security

Hacker Hacked Fast Company’s Apple News Account and Spread Racist Messages

Published

on

Hacker Hacked Fast Companys Apple News Account and Spread Racist

An unknown hacker was able to access the business publication Fast Company’s Apple News account and sent out a series of obscene and racist messages via push notifications. Subscribers are the victims.

Hacker Hacked Fast Company's Apple News Account and Spread Racist Messages

Fast Company confirmed the hack, and so did Apple. The incident is currently under investigation.

Fast Company’s Apple News account was hacked Tuesday night. After that, two push notifications with obscene and racist content were sent with a minute interval. The messages are disgusting and do not match Fast Company content. We are investigating the incident and have also paused feed updates and closed FastCompany.com until we are confident the situation has been resolved.“, – noted in the publication.

Shortly before the shutdown, the hacker himself posted an entire article on the Fast Company website, where he described in detail how he managed to bypass the protection. It turned out that the accounts on the site were protected by the same password, this also applies to the account of the site administrator. Having gained access to them, the hacker was able to get to the authentication tokens and log in to Apple News.

At the same time, in addition to hooliganism, no financial losses or manipulations were recorded.

Continue Reading

Most Popular