One issue that has been covered in class that has surprisingly caught my full attention is the web-hacker group named Anonymous. I had heard of he group before, but after reading the articles and watched some of the video's about this group, I am intrigued. I believe they are doing a great service to the internet by exposing large corporations and groups for their believed wrong doing. Having said that, these issues are also important:
1. Viruses are computer programs which can replicate themselves, and can spread from computer to computer. Your computer can attract a virus from files that you download, a link you click on, or an attachment in an email. For instance, if you click on a link while on Facebook, the link then installs the virus, enabling the hacker to log into your account at anytime. He can then send the same virus to all of your friends and repeat the process. This is a Huge Pain. (ringageek.com)
2. Worms are also self-replicating computer programs, although worms are malware programs which use the computer networks to send copies of itself to other computers in the network. Malware programs can do this while being undetected by the user. Worms can sometimes only affect the network by consuming bandwidth, but can also do much more severe things to networks.You can contract a worm in the same manor you can contract a virus. (ringageek.com)
3. Trojans are programs that are installed in addition to programs which the user wants to install. You may contract a trojan while trying to download an important program, without even knowing it. Trojan's can harm your computer by stealing valuable information and trojans can even crash your system. (webopedia.com)
4. DDOS (Distributed denial of service)attacks are carried out by groups or organizations whom want a computer-related resource to become unavailable to it's users. A site or service is targeted, and then hackers try to limit the service by increasing the traffic, or crashing the system by overloading it, making the service unavailable to regular customers. An example of this would be Anonymous crashing the Mastercard and PayPal websites. (Techtarget.com)
5. Brute force password cracking is done by the process of taking passwords that have been recently saved or used on a computer system. This might be done to plant a virus or malware to someones account. (lastbit.com)
6. Phishing, is just as it sounds, it is someone or a group of people presenting themselves as an agency, or organization which can lend service to customers, but they just take the users information. These sites are just used to look like real sites which provide the users with service. It is just like fishing, trying to lure in unsuspecting internet users. (Webopedia.com)
7. Port scanning is when someone scans your computers open ports, to try to find a way to break into your computer. This can be done while you are searching the web, with no idea of this occurring.
8. Email spoofing is the forgery of an Email header, so the reader believes the email is coming from someone they know or a company/organization that they trust. Most spoofed emails can simply be deleted, but some people send credit card numbers and other information to people who they believe are authority figures. This could be a real pain. (Techtarget)
9. Ransomware is a computer program, (malware) that takes over and holds a computer system hostage until the owner of the system agrees to pay a ransom for the system's release. This doesn't happen too often, but could happen as easily as any malware being installed on your computer. (Scambusters.org)
10. Social engineering attacks are those which target individuals who will share important information, or tricking them into doing deviant acts at the will of the perpetrator. It is defined as a type of fraud, and/or covering up crimes by using other people. This could happen by a head hacker using many subsequent hackers to carry out parts of a master plan, with it taking much time to trace anything back to the leader. (Symantec.com)
Also, Hacktivism is defined as: the use of computers and computer networks as a means of protest to promote political ends (dictionary.com). The definition could be expanded to say that hacktivism is also the use of computers to commit crimes, deviant acts and disrupt the online community. To Deface a website, this means that someone is attacking a site, to make it display something different then what the author of the page wants. (webopedia). This could happen to any site or person that angers a hacker, they could break into the site's code and change it. A Web Sit-in is when lots of users repeatedly try to access a single website, and try to slow it down, or even crash it. (webopedia). This could also be seen in antics done by Anonymous. Email bombing is a type of DOS attack, where users try to overflow an inbox, or a server hosting the inbox, in order to slow it down or crash it. (cert.org)
The hacker group Anonymous is composed of international hackers who want to remain anonymous at all times, while acting out against people/companies/organizations who do wrong, or something of that nature on the internet. They have hacked web sites such as Mastercard in retaliation for the comoany blocking donations to WikiLeaks. They have also defaced websites, and are currently threatening to do internet harm to politicians involved in the Mexican Drug Cartels. Lulzsec, short for Lulz Security was believed to be a separate entity from Anonymous, but was then believed to be sharing information with the group. It is likely that after the disbandment of Lulzsec, after the "50 days of Lulz", that the remaining members joined up with Anonymous. Lulzsec committed many major hacks during their reign, including a NewsCorp website and claiming responsibility for taking the CIA website offline. Lulzsec was way more active and hostile than Anonymous. (webopedia)
These hackers often use Forums, and Internet Relay Chat to communicate with each other (Briefing on Anonymous). A "script kiddie" is a less skilled hacker that uses programs and viruses created by others to do their hacking (Briefing on Anonymous). Script kiddies are an essential part of the group, because there are so many of them.
Timeline: 1. Anonymous Releases Twitter Hacking Tool:
The hacking group released an online tool to the public that would allow someone to dictate what shows up on millions of Twitter feeds. They uploaded a malware program that could be used by people to change other's twitter feeds. 9/22/11
2. The Spanish police Web site becomes the next victim in a DDoS attack. The group Anonymous crashed the Spanish Police web site by driving much traffic to the site. 6/13/11
3. U.S. Senate spokesperson confirmed that the Senate Web site had been breached, but no sensitive data was taken. Lulzsec claimed responsibility for this, they used malware and other programs to breach the security of the website, they could have defaced it.
(All info from Redmondmag.com)
I will keep this brief, but I believe that hackers do have the power to change the internet for the better, rather than the worse. If they keep doing positive things with their hacks, I believe much good can come from it. Although they do run the risk of more governments making internet restrictions more and more tight. I also do believe there is a connection between the arab spring and Anonymous. I am not sure what it is, but I feel that there must be some connection between the two.
INFO PROVIDED BY:
http://lastbit.com/rm_bruteforce.asp
http://www.webopedia.com/TERM/P/phishing.html
http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
http://en.wikipedia.org/wiki/Denial-of-service_attack
http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
http://www.webopedia.com/TERM/P/port_scanning.html
http://searchsecurity.techtarget.com/definition/email-spoofing
http://www.scambusters.org/ransomware.html
http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
http://en.wikipedia.org/wiki/Virtual_sit-in
http://www.cert.org/tech_tips/email_bombing_spamming.html