30
Information Warfare Center: www.informationwarfarecenter.com 1 0 10 20 30 40 50 60 70 80 Website defacements 2/18/2013 2/19/20132 2/20/20133 2/21/20134 2/22/20135 2/23/20136 2/24/20137 Attackers Ashiyane Digital Security Team 1923Turk Barbaros-DZ brwsk007 Dr.SHA6H DZ27 HighTech Hmei7 Micky TurkHackArmy The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors include system compromise, social engineering, and even traditional espionage. Last week, Obama signed a new cyber security order that has inflamed many of the privacy advocates and hacking groups. With the release of the “ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE SECRETS”, and news like “New 'cyber cold-war' erupts between China, US”, China is now offended. Accusations of hacking, espionage, or intellectual property theft y China has been responded with “nuh-uh” or the Bart Simpson quote "I didn't do it. Nobody saw me do it. You can't prove anything!" To be fair, China is also the victim of hackers around the world. Most of the website defacements that hit “.gov” domains seem to end in a “.cn”. With the proliferation of vulnerable software and the DMCA lawsuit threats from the vendors against anyone who finds the vulnerabilities, I am amazed that there aren’t more problems. With the fear mongering by the current administration, and the monitoring/censorship laws, it is no wonder why the Whitehouse just warned of more “hacktivism”. If you actually think about the cyber-attacks, why are the industry alerts still GREEN if things are so dire? georgiacourts.gov, co.okaloosa.fl.us BurgerKing, Facebook, Microsoft, NBC, Oracle, and Twitter were among to most known targets

Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

Information Warfare Center: www.informationwarfarecenter.com

1

0

10

20

30

40

50

60

70

80

Websitedefacements

2/18/2013

2/19/20132

2/20/20133

2/21/20134

2/22/20135

2/23/20136

2/24/20137

Attackers Ashiyane Digital Security Team

1923Turk

Barbaros-DZ

brwsk007

Dr.SHA6H

DZ27

HighTech

Hmei7

Micky

TurkHackArmy

The IWC CIR is an OSINT resource focusing on advanced persistent threats and other digital dangers. APTs fit into a cybercrime category directed at both business and political targets. Attack vectors include system compromise, social engineering, and even traditional espionage.

Last week, Obama signed a new cyber security order that has inflamed many of the privacy advocates

and hacking groups. With the release of the “ADMINISTRATION STRATEGY ON MITIGATING THE

THEFT OF U.S. TRADE SECRETS”, and news like “New 'cyber cold-war' erupts between China, US”,

China is now offended. Accusations of hacking, espionage, or intellectual property theft y China has

been responded with “nuh-uh” or the Bart Simpson quote "I didn't do it. Nobody saw me do it. You can't

prove anything!" To be fair, China is also the victim of hackers around the world. Most of the website

defacements that hit “.gov” domains seem to end in a “.cn”. With the proliferation of vulnerable

software and the DMCA lawsuit threats from the vendors against anyone who finds the vulnerabilities, I

am amazed that there aren’t more problems. With the fear mongering by the current administration, and

the monitoring/censorship laws, it is no wonder why the Whitehouse just warned of more “hacktivism”.

If you actually think about the cyber-attacks, why are the industry alerts still GREEN if things are so dire?

georgiacourts.gov, co.okaloosa.fl.us

BurgerKing, Facebook, Microsoft, NBC, Oracle, and Twitter were among to most known targets

Page 2: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

2

Legal (6)

European Parliament To Discuss Raft Of Cyber Security Law Changes

Privacy advocates: Cybersecurity bill faces tough odds in Congress

Ransomware gang nabbed by European cops

Rogers to expand cyber order

Sentencing Delayed For LulzSec Boss Sabu

U.S. officials say report of Chinese hacking proves need for cybersecurity bill

Mobile (6)

BlackBerry patches BES security vulnerability

BlackBerry Posts Patch For Enterprise Server Flaw

HTC Settles With FTC Over Smartphone Security Holes

iPhone 5S: Apple’s Newest Patents Tell Us ‘S’ is for Security

Many companies likely affected by compromise of popular iOS developer forum

Mobile platforms attractive to cybercriminals: McAfee

Government (32)

Bruce Schneier Warns Of Arms Race Due To Chinese Attacks

China biggest, but not the only country engaged in cyberespionage

China Military Unit 'Behind Prolific Hacking'

China Says U.S. Hacking Accusations Lack Technical Proof

Congressional staff, lawmakers must beef up their cybersecurity, experts say

Cyber attacks on private sector reaching a tipping point: U.S. commander

Cyber criminals masquerade as the ICE Cyber Crimes Center to extort money from web users

Death Toll From U.S. Drones At 4,700 People

Global Homeland Security Market Worth $544.02 Billion by 2018

Growth of military cyber security could benefit Fort Gordon

Himes appointed to intelligence panel addressing cyber security

IRS, state give tips on filing taxes, avoiding scammers

LA Secretary of State begins email notification system to warn businesses of scams

Many agencies get expanded cyber roles

Obama adopts new strategy on cyberattacks

Obama Reveals Plan to Counter Foreign Cyber-Espionage

Obama's New Cyber-Security Tactics Finger Corrupt Staff, China

Ohio State’s national-security major attracts undergraduates

Portrait of a cyberspy unit is emerging

Report shows China military involved in U.S. hacking

Report: Chinese military engaged in 'extensive cyber espionage'

SC House Committee Plan Would Fund Cyber Security, Other Items

Page 3: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

3

State defends against cyber attacks with ongoing training

The cyber war is real -- and our defenses are weak

The looming certainty of a cyber Pearl Harbor

The State of our Union? Threatened by Cyber Attacks – Professional Cyber Threat Assessments Chart the Course to Fortifying Security Posture

Thieves, spies move to AVTs: advanced volatile threats

U.S. Ups Ante For Spying On Firms

US Government Shares Hacking Intelligence After Slew Of Attacks On Nation

US ready to strike back against China

W.H. cyber policy will be slow in wake of Chinese hackers

White House Warns Of Hacktivist Threats

Technology (66)

13 IT security myths debunked

2013 year of cyber attacks?

25% of DDoS attacks in 2013 will be application-based

9 Tips To Stay Safe On Public Wi-Fi

Add Microsoft To List Of Hacked Companies

Adobe Confirms Patch For Zero-Day Exploit

Adobe Zero Days Under Attack

Ad-Titan Google Blocks Adblock Plus In Android Security Tweak

Amazon, eBay, Banks Snub Anti-DNS Fraud Tech

Antibot: Network-based botnet removal tool

Antivirus software not enough protection

Apple ships Java update, malware scrubber after confirming attacks on own Macs

Apple, Macs Hit By Hackers Who Targeted Facebook

Arms vendors turn to cyber security as sales drop

Attacks Spreading to Other Industries

Burger King Twitter Account Hacked

Business Applications Are The Biggest Threat

Cameron To Ink Cyber Deal With India, Protect Brit Outsourced Data

Colorado tops charts for identity theft

Commercial cyberspying and theft gives rich payoff

Computer scam threatens prosecution for child porn, demands payment

Cyber-Attacks On Financial Institutions, Biggest Threat to Economies

DNA Crunchers Ditch Hadoop For Homegrown Software

Dutch MP Must Cough Up €750 For Hacking Into Medical Lab

Expert Says Everyone Should Be Prepared For Hacking

Experts urge government to set cyber-security standards for private sector

Facebook employees ambushed by zero-day exploit

Facebook gets unwelcome look at hackers' dark side

Florida Hit by 'Tsunami' of Tax Identity Fraud

Google Engineers Found More Than Half of Microsoft's Bugs

Page 4: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

4

Google Slashes Account Hijackings By 99.7%

Grad students to use innovative tech grant

Hackers Doing No Favors for China's Image

Hacking Group Anonymous Latest Victim Of Twitter Hack

Hidden security threats on enterprise networks

How CSOs are enabling secure BYOD

Identity Fraud Reports Increased By More Than A Million Last Year

Kim Dotcom's Mega Is Now Accepting Bitcoins

Komando: The five biggest tech myths

Malware Getting Smarter, Says McAfee

NBC.com Was Infected; Facebook, Google Blocked Access

Online Crims Are Getting Away With It Down Under

OpLastResort Hacks Investment Firm, Cites Stratfor Ties

Oxford University briefly blocks Google Docs in anti-phishing effort

PayPal, Lenovo Launches FIDO, Replaces Passwords for More Secure Methods

Phishing and hacking during e-commerce transactions

Phishing email: Ways to defend inbox from harm

Pint-Sized Backdoor For OS X Discovered

Private US firms take major role against cyberattacks

Researchers Borrow DNA Tricks To Identify Malware's Genetic Code

Researchers Uncover Polymorphic AutoRun Worm

Rid Yourself Of Adobe: New Firefox 19.0 Gets JavaScript PDF Viewer

Rogue Chrome extension hijacks Facebook accounts

Security firms slow to react to spear phishing like that used in China hack

The Curious World Of HDMI Copy Protection

Twitter Adds Email Security To Help Block Phishing Attempts

Twitter calls for smarter password habits following Jeep, Burger King hacks

Twitter implements DMARC standard to fight phishing

U.S. announces strategy to fight cyber theft of trade secrets

US students get cracking on Chinese malware code

Use protection when engaging in social media

VMware Promises Better Security, Considers Scheduled Patches

Warning: Purported Delta email is phishing scam

Website Attacks up 600%

Who's watching? 'Techie Peeping Toms’ hacking into web cams

Zendesk Security Breach Affects Twitter, Tumblr, And Pinterest

Page 5: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

5

Page 6: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

6

FBI News

FBI Law Enforcement Bulletin is Now Online

Government (7)

Congressional Candidate Charged with Violation of the Federal Election Campaign Act

Final Defendant in San Diego Federal Courthouse Bombing Sentenced

Former Albuqerque Corrections Officer Pleads Guilty to Obstruction of Justice

Kodiak Man Charged with Murders of Two Coast Guard Employees

New York City Man Sentenced for Entering an Aircraft in Violation of Security Requirements

Technology (4)

Federal Grand Jury Indicts Dallas Man for Aiming a Laser Pointer at Aircraft

Former California Assemblyman Admits Defrauding Banks out of $193,661 by Falsely Claiming to be Identity Theft Victim

CPKP / Human trafficking(12)

Brown County Man Sentenced to 188 Months in Federal Prison for Using the Internet to Collect and Share Hundreds of Images of Child Pornography

FBI Seeks to Identify Two Individuals Who May Have Information Regarding a Child Sexual Exploitation Investigation

Former Conroe Resident Gets 30 Years for Conspiring to Produce Child Pornography

Former South Plainfield Police Captain Charged with Sexually Exploiting a Minor

Man Sentenced to 14 Years in Prison on Child Pornography Charge

Nashville Musician Pleads Guilty in Federal Court to Attempted Enticement of a Minor

Palm Beach County Residents Arrested for Sex Trafficking of Minors

Parker Man Pleads Guilty to Abusive Sexual Contact with a Minor

Parkville Man Sentenced to 27 Years in Prison for Sexual Bondage of 15-Year-Old Girl

Tonawanda Man Pleads Guilty to Possessing Child Pornography

Page 7: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

7

Mobile (4)

Samsung Galaxy S3 Screen-Lock Bypass

USB Sharp v1.3.4 iPad iPhone - Multiple Vulnerabilities

Android hacking with the usb rubber ducky

Android 4-digit pin hack in 16 hours

Exploits (10)

BigAnt Server 2 SCH And DUPF Buffer Overflow

BigAnt Server DUPF Command Arbitrary File Upload

IPMap 2.5 Shell Upload

MS Office 2010 Download Execute

MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free

MyFi Wireless Disk 1.2 CSRF / LFI / Code Execution

Netgear DGN2200B Command Execution / Cross Site Scripting

OpenEMR PHP File Upload Vulnerability

Piwigo 2.4.6 Arbitrary File Read / Delete

Windows Manage User Level Persistent Payload Installer

This section of the CIR is dedicated to inform the public exploits, tools, and whitepapers that may directly affect the security posture of an organization. The term “Proof of Concept (PoC)” is another term for working exploit. Many of these PoCs will eventually find themselves in malicious logic such as viruses, Trojans, and root kits.

Page 8: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

8

Web (40)

Air Transfer 1.2.0 Local File Inclusion

Alt-N MDaemon Email Body Cross Site Scripting

Alt-N MDaemon WebAdmin Remote Code Execution

Alt-N MDaemon WorldClient / WebAdmin Cross Site Request Forgery

Alt-N MDaemon WorldClient Credential Disclosure

Alt-N MDaemon WorldClient Predictable Session ID

Alt-N MDaemon WorldClient Username Enumeration

CKEditor 4.0.1 CSRF / XSS / Path Disclosure

EasyWebScripts eBay Clone Script SQL Injection

glFusion 1.2.2 - Multiple XSS Vulnerabilities

glFusion 1.2.2 Cross Site Scripting

Kayako Fusion 4.51.1891 Cross Site Scripting

Kodak Insite Creative Workflow System SQL Injection

MIMEsweeper For SMTP 5.5 Cross Site Scripting

Nagios NRPE 2.13 Code Execution

Open Review Script Cross Site Scripting

OpenEMR 4.1.1 Cross Site Scripting

OpenEMR PHP File Upload

Photodex ProShow Producer 5.0.3297 Insecure Library Load

PHP-Fusion CMS 7.02.05 SQL Injection

PHPMyGallery 1.51.010 XSS / Local File Disclosure

phpMyRecipes 1.2.2 SQL Injection

Rix4Web Portal Remote Blind SQL Injection

RTTucson Quotations Database Authentication Bypass

RTTucson Quotations Database Script XSS / SQL Injection

Scripts Genie Pet Rate Pro 4.9.9 SQL Injection / Command Execution

Skype Community Cross Site Scripting

Squirrelcart 3.5.4 Cross Site Scripting

USB Sharp 1.3.4 Local File Inclusion / Cross Site Scripting

Various Applications Include ZeroClipboard XSS

Web Cookbook File Disclosure / SQL Injection

WordPress Marekkis Watermark Cross Site Scripting

WordPress Pretty Link 1.6.3 Cross Site Scripting

WordPress Responsive Logo Slideshow Cross Site Scripting

Zenphoto 1.4.4.1 Blind SQL Injection

ZeroClipboard 1.0.7 Cross Site Scripting

RTTucson Quotations Database - Multiple Vulnerabilities

CKEditor 4.0.1 - Multiple Vulnerabilities

Page 9: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

9

Cometchat Application - Multiple Vulnerabilities

Scripts Genie Hot Scripts Clone (showcategory.php, cid param) - SQL Injection Vulnerability

Tools (5)

HexInject 1.5

ipset 6.17

OWASP Bricks Betwa Release

PACK (Password Analysis and Cracking Kit) 0.0.3

SI6 Networks' IPv6 Tookit 1.3

Papers (6)

CloudFlare vs Incapsula vs ModSecurity

Abusing, Exploiting, And Pwning With Firefox Add-Ons

How To Hack A Website With Metasploit

Hiding Data In Hard-Drive's Service Areas

APT1 - Exposing One Of China's Cyber Espionage Units

APT1 Digital Appendix And Indicators

Page 10: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

10

Oracle is the focus os a lot of vulnerabilities and exploits this week

Software

Vendor Advisory Description

Apple Apple Security Advisory 2013-02-19-1

Apple Security Advisory 2013-02-19-1 - Multiple vulnerabilities existed in Java 1.6.0_37, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues were addressed by updating to Java version 1.6.0_41.

Foswiki Foswiki MAKETEXT 1.1.7 / 1.0.10 Code Execution

This advisory alerts you of a potential security issue with your Foswiki installation. A vulnerability has been reported against the core Perl module CPAN:Locale::Maketext, which Foswiki uses to provide translations when {UserInterfaceInternationalization} is enabled in the configuration. Because of this vulnerability it may be possible for a user to invoke arbitrary perl modules on the server through a crafted macro.

HP HP Security Bulletin HPSBMU02836 SSRT101056

HP Security Bulletin HPSBMU02836 SSRT101056 - Potential security vulnerabilities have been identified with HP ArcSight Connector Appliance and HP ArcSight Logger. These vulnerabilities could be exploited remotely to allow disclosure of information, command injection and cross-site scripting (XSS). Revision 1 of this advisory.

Onapsis SAP CCMS Agent Code Injection

Onapsis Security Advisory - The SAP CCMS agent is built as an RFC external server, exposing several RFC functions. One of these functions allows a remote unauthenticated user to execute arbitrary commands which are executed with SIDADM privileges (the highest possible in the SAP world).

Onapsis SAP Enterprise Portal Cross Site Scripting

Onapsis Security Advisory - As the server does not perform a proper security validation on the input parameters, it is possible to inject DHTML code that would be rendered to the user accessing the link in SAP Enterprise Portal.

Onapsis SAP J2EE Core Service Arbitrary File Access

Onapsis Security Advisory - By exploiting an arbitrary file access vulnerability in the SAP J2EE Core Services, a remote unauthenticated attacker may be able to compromise the entire ERP system.

Onapsis SAP Portal PDC Information Disclosure

Onapsis Security Advisory - The SAP Portal "Federation" configuration pages do not properly handle authentication, exposing the entire Portal infrastructure.

Onapsis SAP SDM Denial Of Service

Onapsis Security Advisory - The SDM suffers from a design vulnerability in the way it handles failed user authentication attempts, generating a denial of service condition if some conditions are met. This can be abused by a malicious attacker to disrupt this service.

Page 11: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

11

Onapsis SAP SMD Agent Code Injection

Onapsis Security Advisory - Abuse of the SAP SMD agent unauthenticated interface will allow a remote attacker to install an arbitrary application and achieve a full compromise of the SMD agent and the SAP instances installed on the server.

Oracle Oracle 11g Stealth Password Cracking

Team SHATTER Security Advisory - There is a flaw in the way that Authentication Session Keys are generated and protected by Oracle Database Server during the authentication process. It is possible to use this flaw to perform unlimited password guesses (cracking) of any user password in a similar way as if the password hash would be available. Oracle Database version 11gR1 and 11gR2 are affected.

Oracle Oracle Alter FBA Table SQL Injection

Team SHATTER Security Advisory - Renaming a table having flashback archive using specially crafted table name triggers internal SQL injection. This allows users to execute code with elevated privileges. Oracle Database Enterprise Edition version 11.1 and 11.2 are affected

Oracle Oracle Database GeoRaster API Overflow

Team SHATTER Security Advisory - GeoRaster is a feature of Oracle Spatial that lets you store, index, query, analyze, and deliver GeoRaster data. One of the GeoRaster APIs is prone to stack-based overflow.

Oracle Oracle Enterprise Manager advReplicationAdmin Cross Site Scripting

Team SHATTER Security Advisory - It appears that /em/console/database/dist/advRepl/advReplicationAdmin in Oracle Enterprise Manager suffers from multiple cross site scripting vulnerabilities. Versions affected include Oracle Enterprise Manager Database Control 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Oracle Enterprise Manager advReplicationAdmin SQL Injection

Team SHATTER Security Advisory - An attacker hosting a malicious web site can execute SQL statements in the backend database when an administrator with an open session in Oracle Enterprise Manager web application visits the malicious web site. Versions affected include Oracle Enterprise Manager Database Control 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Oracle Enterprise Manager dBClone SQL Injection

Team SHATTER Security Advisory - Some parameters of /em/console/database/dbclone/dBClone in Oracle Enterprise Manager are vulnerable to SQL injection attacks. Versions affected include Oracle Enterprise Manager Database Control 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3

Oracle Oracle Enterprise Manager HTTP Response Splitting

Team SHATTER Security Advisory - The 'pagename' parameter of web page /em/console/ecm/policy/policyViewSettings in Oracle Enterprise Manager is vulnerable to HTTP response splitting attacks. Versions affected include Oracle Enterprise Manager Database Control 11.1.0.7, 11.2.0.2, 11.2.0.3.

Page 12: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

12

Oracle Oracle Enterprise Manager Resource Manager SQL Injection

Team SHATTER Security Advisory - Some parameters of /em/console/database/instance/rsrcpln in Oracle Enterprise Manager Resource Manager are vulnerable to SQL injection attacks. Versions affected include Oracle Enterprise Manager Database Control 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Oracle Enterprise Manager SCPLBL_COLLECTED SQL Injection

Team SHATTER Security Advisory - Some parameters of /em/console/ecm/config/savedConfig in Oracle Enterprise Manager are vulnerable to SQL injection attacks. Versions affected include Oracle Enterprise Manager Database Control 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Oracle Enterprise Manager Segment Advisor URL Redirection

Team SHATTER Security Advisory - Oracle Enterprise Manager Database Control Segment Advisor page is vulnerable to an arbitrary URL redirection/phishing vulnerability. An attacker may inject an arbitrary URL into the web application and force the application to redirect to it without any validation. This vulnerability can be used in phishing attacks to trick legitimate users to visit malicious sites without realizing it. The affected link and parameter are /em/console/database/xdb/XDBResource and cancelURL. Versions affected include Oracle Enterprise Manager

Oracle Oracle Enterprise Manager Streams Queue SQL Injection

Team SHATTER Security Advisory - Some parameters of /em/console/database/dist/streams/queue in Oracle Enterprise Manager are vulnerable to SQL injection attacks. Versions affected include Oracle Enterprise Manager Database Control 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Oracle Enterprise Manager XDBResource cancelURL XSS

Team SHATTER Security Advisory - Oracle Enterprise Manager Database Control XML Database Resources page is vulnerable to a cross site scripting vulnerability. An attacker may inject malicious code into the web application and trick a legitimate user into executing it by various methods. Affected versions include Oracle Enterprise Manager Database Control 10.2.0.3, 10.2.0.4; 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3.

Oracle Technical Cyber Security Alert 2013-51A

Technical Cyber Security Alert 2013-51A - Multiple vulnerabilities in Java could allow an attacker to execute arbitrary code on a vulnerable system.

Ruby Parser Ruby Parser 2.0.4 Insecure File Creation

Ruby Parser version 2.0.4 insecurely creates files in /tmp that can allow for a denial of service condition.

Page 13: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

13

Linux / Unix Advisories

Distro Advisory Description

Debian Debian Security Advisory 2612-2

Debian Linux Security Advisory 2612-2 - This update to the previous ircd-ratbox DSA only raises the version number to ensure that a higher version is used than a previously binNMU on some architectures.

Debian Debian Security Advisory 2619-1

Debian Linux Security Advisory 2619-1 - A buffer overflow was found in the e1000e emulation, which could be triggered when processing jumbo frames.

Debian Debian Security Advisory 2620-1

Debian Linux Security Advisory 2620-1 - Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.

Debian Debian Security Advisory 2622-1

Debian Linux Security Advisory 2622-1 - Multiple vulnerabilities have been found in OpenSSL

Debian Debian Security Advisory 2623-1

Debian Linux Security Advisory 2623-1 - Kevin Cernekee discovered that a malicious VPN gateway can send crafted responses which trigger stack-based buffer overflows.

Debian Debian Security Advisory 2624-1

Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

Debian Debian Security Advisory 2624-1

Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

Debian Debian Security Advisory 2625-1

Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

Debian Debian Security Advisory 2625-1

Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

Debian Secunia Security Advisory 52038

Secunia Security Advisory - Debian has issued an update for xen-qemu-dm-4.0. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

Debian Secunia Security Advisory 52180

Secunia Security Advisory - Debian has issued an update for rails. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

Page 14: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

14

Debian Secunia Security Advisory 52209

Secunia Security Advisory - Debian has issued an update for openssl. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service) of the application using the library.

Mandriva Mandriva Linux Security Advisory 2013-009

Mandriva Linux Security Advisory 2013-009 - The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service via a Client: Diffie-Hellman Key Exchange Init packet. The updated packages have been upgraded to the 0.5.4 version which is not affected by this issue.

Mandriva Mandriva Linux Security Advisory 2013-010

Mandriva Linux Security Advisory 2013-010 - Multiple security issues were identified and fixed in OpenJDK. The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues.

Mandriva Mandriva Linux Security Advisory 2013-011

Mandriva Linux Security Advisory 2013-011 - The Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a IFRAME element. Cross-site request forgery vulnerability in the Samba Web Administration Tool in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions. The updated packages have been patched to correct these issues.

Mandriva Mandriva Linux Security Advisory 2013-012

Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

Mandriva Mandriva Linux Security Advisory 2013-012

Mandriva Linux Security Advisory 2013-012 - PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read. This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues.

Page 15: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

15

Red Hat Red Hat Security Advisory 2013-0248-01

Red Hat Security Advisory 2013-0248-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.

Red Hat Red Hat Security Advisory 2013-0249-01

Red Hat Security Advisory 2013-0249-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. When using LDAP authentication with the provided LDAP login modules, empty passwords were allowed by default. An attacker could use this flaw to bypass intended authentication by providing an empty password for a valid username, as the LDAP server may recognize this as an 'unauthenticated authentication'. This update sets the allowEmptyPasswords option for the LDAP login modules to false if the option is not already configured.

Red Hat Red Hat Security Advisory 2013-0250-01

Red Hat Security Advisory 2013-0250-01 - ELinks is a text-based web browser. ELinks does not display any images, but it does support frames, tables, and most other HTML tags. It was found that ELinks performed client credentials delegation during the client-to-server GSS security mechanisms negotiation. A rogue server could use this flaw to obtain the client's credentials and impersonate that client to other servers that are using GSSAPI. This issue was discovered by Marko Myllynen of Red Hat. All ELinks users are advised to upgrade to this updated package, which contains a backported patch to resolve the issue.

Red Hat Red Hat Security Advisory 2013-0253-01

Red Hat Security Advisory 2013-0253-01 - The openstack-keystone packages provide Keystone, a Python implementation of the OpenStack identity service API, which provides Identity, Token, Catalog, and Policy services. It was found that an excessive amount of information was logged when invalid tokens were requested, resulting in large log files. An attacker could use this flaw to consume an excessive amount of disk space by requesting a large number of invalid tokens. The CVE-2013-0247 issue was discovered by Dan Prince of Red Hat.

Page 16: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

16

Red Hat Red Hat Security Advisory 2013-0254-01

Red Hat Security Advisory 2013-0254-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes several vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB13-05, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content.

Red Hat Red Hat Security Advisory 2013-0256-01

Red Hat Security Advisory 2013-0256-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0257-01

Red Hat Security Advisory 2013-0257-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Page 17: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

17

Red Hat Red Hat Security Advisory 2013-0258-01

Red Hat Security Advisory 2013-0258-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0259-01

Red Hat Security Advisory 2013-0259-01 - The Enterprise Web Platform is a slimmed down profile of the JBoss Enterprise Application Platform intended for mid-size workloads with light and rich Java applications. If web services were deployed using Apache CXF with the WSS4JInInterceptor enabled to apply WS-Security processing, HTTP GET requests to these services were always granted access, without applying authentication checks. The URIMappingInterceptor is a legacy mechanism for allowing REST-like access to simple SOAP services. A remote attacker could use this flaw to access the REST-like interface of a simple SOAP service using GET requests that bypass the security constraints applied by WSS4JInInterceptor. This flaw was only exploitable if WSS4JInInterceptor was used to apply WS-Security processing. Services that use WS-SecurityPolicy to apply security were not affected.

Red Hat Red Hat Security Advisory 2013-0261-01

Red Hat Security Advisory 2013-0261-01 - JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. An attack technique was found against the W3C XML Encryption Standard when block ciphers were used in cipher-block chaining mode. A remote attacker could use this flaw to conduct chosen-ciphertext attacks, leading to the recovery of the entire plain text of a particular cryptogram by examining the differences between SOAP responses sent from JBoss Web Services.

Red Hat Secunia Security Advisory 52142

Secunia Security Advisory - Red Hat has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks

Page 18: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

18

Red Hat Secunia Security Advisory 52154

Secunia Security Advisory - Red Hat has issued an update for java-1.7.0-openjdk. This fixes multiple vulnerabilities, which can be exploited by by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Red Hat Secunia Security Advisory 52155

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-openjdk. This fixes multiple vulnerabilities, which can be exploited malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Red Hat Secunia Security Advisory 52183

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise Application Platform and JBoss Enterprise Web Platform. This fixes a security issue and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

Red Hat Secunia Security Advisory 52203

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

Slackware Slackware Security Advisory - OpenSSL Updates

Slackware Security Advisory - New openssl packages are available for Slackware 14.0, and -current to fix a bug in openssl-1.0.1d.

Slackware Slackware Security Advisory - Pidgin Updates

Slackware Security Advisory - New pidgin packages are available for Slackware 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.

SUSE Secunia Security Advisory 52077

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52135

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks.

SUSE Secunia Security Advisory 52148

Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service) in an application using the library.

SUSE Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system

SUSE Secunia Security Advisory 52150

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.

SUSE Secunia Security Advisory 52151

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.

Page 19: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

19

SUSE Secunia Security Advisory 52152

Secunia Security Advisory - SUSE has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52153

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

SUSE Secunia Security Advisory 52159

Secunia Security Advisory - SUSE has issued an update for MySQL. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks.

SUSE Secunia Security Advisory 52160

Secunia Security Advisory - SUSE has issued an update for kernel. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

SUSE Secunia Security Advisory 52204

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a vulnerability with an unknown impact.

Ubuntu Secunia Security Advisory 52172

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

Ubuntu Secunia Security Advisory 52174

Secunia Security Advisory - Ubuntu has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

Ubuntu Secunia Security Advisory 52205

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

Ubuntu Ubuntu Security Notice USN-1716-1

Ubuntu Security Notice 1716-1 - It was discovered that gnome-screensaver did not start automatically after logging in. This may result in the screen not being automatically locked after the inactivity timeout is reached, permitting an attacker with physical access to gain access to an unlocked session.

Ubuntu Ubuntu Security Notice USN-1717-1

Ubuntu Security Notice 1717-1 - Sumit Soni discovered that PostgreSQL incorrectly handled calling a certain internal function with invalid arguments. An authenticated attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service.

Page 20: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

20

Ubuntu Ubuntu Security Notice USN-1719-1

Ubuntu Security Notice 1719-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1720-1

Ubuntu Security Notice 1720-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1721-1

Ubuntu Security Notice 1721-1 - It was discovered that curl incorrectly handled SASL authentication when communicating over POP3, SMTP or IMAP. If a user or automated system were tricked into processing a specially crafted URL, an attacker could cause a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service.

Ubuntu Ubuntu Security Notice USN-1722-1

Ubuntu Security Notice 1722-1 - It was discovered that jQuery incorrectly handled selecting elements using location.hash, resulting in a possible cross-site scripting (XSS) issue. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.

Ubuntu Ubuntu Security Notice USN-1723-1

Ubuntu Security Notice 1723-1 - Richard J. Moore and Peter Hartmann discovered that Qt allowed redirecting requests from http to file schemes. If an attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information. This issue only affected Ubuntu 11.10, Ubuntu 12.04 LTS, and Ubuntu 12.10. Stephen Cheng discovered that Qt may report incorrect errors when ssl certificate verification fails. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1724-1

Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1724-1

Ubuntu Security Notice 1724-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.

Page 21: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

21

Ubuntu Ubuntu Security Notice USN-1725-1

Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.

Ubuntu Ubuntu Security Notice USN-1725-1

Ubuntu Security Notice 1725-1 - Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate erroneously.

Ubuntu Ubuntu Security Notice USN-1726-1

Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Ubuntu Ubuntu Security Notice USN-1726-1

Ubuntu Security Notice 1726-1 - It was discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating the origin on Netlink messages. An untrusted local user can cause a denial of service of Linux guests in Hyper-V virtualization environments. Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. Various other issues were also addressed.

Page 22: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

22

: (281)

Notifier L Domain OS View

[IN]SecInjection

mzkp.ft.gov.cn/r.txt Win 2003 mirror

1923Turk

lz.qdswsj.gov.cn/aL_Pars.htm Win 2003 mirror

1923Turk

www.fjsw.gov.cn/aL_Pars.htm Win 2003 mirror

1923Turk

xj.dzgtj.gov.cn/aL_Pars.htm Win 2003 mirror

1923Turk

gsl.cznq.gov.cn/aL_Pars.htm Win 2003 mirror

1923Turk

www.ppp.gouv.qc.ca Linux mirror

1923Turk

old.shitai.gov.cn/aL_Pars.htm Win 2003 mirror

1923Turk

www.slsgs.gov.cn/aL_Pars.htm Win 2003 mirror

3viL666

tvdigital.kominfo.go.id Linux mirror

Ak Ecks

www.cc-bellegardois.fr Linux mirror

AL.MaX HaCkEr

www.comune.borgoforte.mn.it/cms/ Linux mirror

ali ahmady

sosapatz.gob.mx Linux mirror

AnonGhost

www.jdmv.gov.do Linux mirror

Append-Hc.com

mylcd.gsd.harvard.edu/?s=9 Linux mirror

Ashiyane Digital Security Team

www.comune.montalbano.mt.it/ta... Win 2003 mirror

Ashiyane Digital Security Team

www.comune.guardiaperticara.pz... Win 2003 mirror

Ashiyane Digital Security Team

www.comune.noepoli.pz.it/tak_a... Win 2003 mirror

Ashiyane Digital Security Team

www.rayong.go.th/index1.php Linux mirror

Ashiyane Digital Security Team

www.comune.trecchina.pz.it/tak... Win 2003 mirror

Ayrbyte

clajj.zjjcl.gov.cn/Ayrbyte/ Win 2003 mirror

Barbaros-DZ

jljiangyuan.lss.gov.cn Win 2003 mirror

Barbaros-DZ

dycl.dongying.gov.cn/ljx/x.htm Win 2003 mirror

Barbaros-DZ

www.gsl.changzhi.gov.cn Win 2003 mirror

Barbaros-DZ

www.gbd.gov.cn Win 2003 mirror

Barbaros-DZ

swskx.shaowu.gov.cn Win 2003 mirror

Barbaros-DZ

www.wlcblsj.gov.cn/dz.htm Win 2003 mirror

Barbaros-DZ

stz.cqfd.gov.cn Win 2003 mirror

Barbaros-DZ

dangjian.wensheng.gov.cn Win 2003 mirror

Barbaros-DZ

www.nxkjt.gov.cn/dz.htm Win 2008 mirror

Barbaros-DZ

cg.zhuxi.gov.cn Win 2003 mirror

This section of the CIR is dedicated to inform the public of website defacements that have targeted either larger organizations or government agencies. The perpetrators of these attacks are all over the world and have different reasons for hacking that range from curiosity to hacktavism to state sponsored espionage/cyber warfare activity.

Page 23: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

23

Barbaros-DZ

fhjd.ezhou.gov.cn Win 2003 mirror

Barbaros-DZ

cps.dalang.gov.cn Win 2008 mirror

BD GREY HAT HACKERS

munidc.gob.pe Linux mirror

Black Angels

www.bappeda.probolinggokab.go.... Linux mirror

BMPoC

webserver.eln.gov.br/licitacao... Win 2003 mirror

bogel

mersinegitimdenetmenleri.gov.tr Linux mirror

Bozkurt97

kanwiljatim.perbendaharaan.go.id Linux mirror

Bozkurt97

old.fiji.gov.fj FreeBSD mirror

By_aGReSiF

www.pde.ufjf.br/4gre.php Linux mirror

Clone-Security

spf.gov.kg Linux mirror

CLONING

www.sisaketspecial.go.th/56/un... Linux mirror

CLONING

www.lalo.go.th/Joomla_1.5.22-S... Linux mirror

CLONING

www.bareknuea.go.th/attach/unl... Linux mirror

ColdHackers

www.erdemlimuftulugu.gov.tr Unknown mirror

crazy-3r3r

www.swa.gov.sa Win 2003 mirror

DaiLexX

gokana.rv.gov.ng Linux mirror

DaiLexX

www.srednjobanatski.okrug.gov.rs Linux mirror

DevilzSec

www.coop-sy.gov.cn/textshow.as... Win 2003 mirror

DevilzSec

www.bhxzfw.gov.cn/ts_tsgk.asp Win 2003 mirror

DiE_AucH

governor.vic.gov.au/images/ind... Linux mirror

DiE_AucH

www.mtss.go.cr/images/ Linux mirror

DiE_AucH

www.inta.go.cr/logs/ Linux mirror

Digital Boys Underground Team

warranty.benq.net/db.txt Win 2008 mirror

Digital Boys Underground Team

www.escoex.ms.gov.br/db.txt Linux mirror

Digital Boys Underground Team

www.tce.ms.gov.br/portal/db.txt Linux mirror

Distorsi Lulaby

www.yonarmed13.mil.id Linux mirror

Dr.HaCkEr

www.pastoraledesjeunes31.cef.fr Linux mirror

Dr.SHA6H

www.mpu.furg.br/index.html Unknown mirror

Dr.SHA6H

gxirno2.jaz.gov.sa Linux mirror

Dr.SHA6H

www.karatal.gov.kz Unknown mirror

Dr.SHA6H

camarachapadaodosul.ms.gov.br Linux mirror

Dr.SHA6H

dei.gov.ua Linux mirror

Dr.SHA6H

www.quirimbas.gov.mz Linux mirror

Dr.SHA6H

www.subaru.co.ke Linux mirror

Dr.SHA6H

gallery.unicef.by/workspace/ Linux mirror

Dr.SHA6H

kazki.unicef.by/workspace/ Linux mirror

Dr.SHA6H

www.unicef.by/worspace/thumb/i... Linux mirror

Dr.SHA6H

glan.gov.ph Linux mirror

Dr.SHA6H

www.ppdhuluperak.gov.my Linux mirror

Dr.SHA6H

www.bata.gov.ba Linux mirror

Dr.SHA6H

www.hinoperu.com.pe Linux mirror

DZ27

cc-aspres.fr Linux mirror

DZ27

www.mairie-nersac.fr Linux mirror

DZ27

www.cc-paysdesaintaulaye.fr Linux mirror

DZ27

ville-saint-germain-les-arpajo... Linux mirror

Page 24: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

24

DZ27

www.ville-pierrelatte.fr Linux mirror

DZ27

www.tj.ufrj.br/logs/DZ27.html Linux mirror

DZ27

www.ippur.ufrj.br/administrato... Linux mirror

DZ27

colloquegeii.univ-lille1.fr/ad... Linux mirror

DZ27

ugsf-umr-glycobiologie.univ-li... Linux mirror

DZ27

temir.univ-lille1.fr/test/dz27... Linux mirror

DZ27

iemndoc.univ-lille1.fr/cv/dz27... Linux mirror

DZ27

flaxomics.univ-lille1.fr/Flaxo... Linux mirror

DZ27

metamos.univ-lille1.fr/dz27.txt Linux mirror

DZ27

myconf.univ-lille1.fr/dz27.txt Linux mirror

DZ27

bibliotheque.mairie-seyssinet-... Win 2008 mirror

DZ27

www.bm.mairie-belfort.fr///Opa... Win 2008 mirror

DZ27

mediatheque.ville-loudeac.fr//... Win 2008 mirror

DZ27

bm.mairie-thionville.fr//OpacW... Win 2003 mirror

DZ27

www.mediatheque.ville-guerande... Win 2003 mirror

DZ27

mediatheque.ville-arles.fr/Opa... Win 2003 mirror

DZ27

bm.ville-caluire.fr//OpacWebAl... Win 2003 mirror

DZ27

ww2.pierrepaul24.catholique.fr... Linux mirror

DZ27

village-natal-sjmv-dardilly.ca... Linux mirror

DZ27

troisvallees91.catholique.fr/D... Linux mirror

DZ27

www.stirenee-stjust-lyon.cef.f... Linux mirror

DZ27

www.soeurs-blanches.cef.fr/DZ2... Linux mirror

DZ27

www.comune.cornedo-vicentino.v... Linux mirror

Dz-Boy Marwane

www.stc.gov.ae/news.php Linux mirror

erreur404

www.fireworks.gov.cn/dz.txt Win 2003 mirror

F15

www.ringwood.gov.uk/syria.htm FreeBSD mirror

fiofa fado

www.matlock.gov.uk Linux mirror

GAPING

www.gadnuevoquito.gob.ec/index... Linux mirror

ghost-dz

www.comune.sommavesuviana.na.i... Linux mirror

ghost-dz

www.inspectbk.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect9.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect8.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect7.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect5.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect4.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect2.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect12.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect11.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect10.moe.go.th/gh.html Linux mirror

ghost-dz

www.inspect1.moe.go.th/gh.html Linux mirror

Grayhatz

www.bbi.ba Linux mirror

Grayhatz

bbibanka.com.ba Linux mirror

h4x0r HuSsY

media.gov.lk Linux mirror

h4x0r HuSsY

mpowerraj.gov.in Win 2008 mirror

h4x0r HuSsY

cdrcestat.gov.in Win 2008 mirror

Page 25: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

25

h4x0r HuSsY

sameer.gov.in Win 2008 mirror

h4x0r HuSsY

pwddelhi.gov.in Win 2008 mirror

h4x0r HuSsY

bihartourism.gov.in Win 2008 mirror

HacKed By LaMiN3 DK

www.sites.univ-rennes2.fr/cent... Win 2003 mirror

HACKER DZ

www.nevsehirkutup.gov.tr/image... Unknown mirror

Hacker-Fire

zebi.hsfq.gob.ec/zebi.txt Linux mirror

HaYaL-ET-06

pasaportes.gov.do Linux mirror

HeavenCode

www.bag-organisasi.probolinggo... Linux mirror

HighTech

www.kalymnos.gov.gr Win 2012 mirror

HighTech

www.xzdx.gov.cn Win 2003 mirror

HighTech

www.qzgdj.gov.cn/ck.txt Win 2003 mirror

HighTech

www.transparencia.seip.gob.hn Win 2008 mirror

HighTech

ikwezi.local.gov.za Win 2003 mirror

HighTech

www.capaobonito.sp.gov.br Win 2008 mirror

HighTech

www.geologia.ufrr.br Unknown mirror

HighTech

www.pmaver.gob.mx Win 2008 mirror

HighTech

itaobim.mg.gov.br Linux mirror

HighTech

juegos.minedu.gob.bo Linux mirror

HighTech

www.cnum-unesco.org.mz Linux mirror

HighTech

safedrivemedical.vicroads.vic.... Unknown mirror

HighTech

www.gpl.gov.za Linux mirror

HighTech

www.programaanticorrupcion.gob.mx Linux mirror

HighTech

www.cepagri.gov.mz Linux mirror

HighTech

www.ipex.gov.mz Linux mirror

HighTech

www.ouvidoria.defesacivil.rj.g... Linux mirror

HighTech

ns2.interpol.go.id Linux mirror

HighTech

www.mj.gov.mz Linux mirror

HighTech

www.cmchimoio.gov.mz Linux mirror

HighTech

www.cebucity.gov.ph Unknown mirror

HighTech

www.dar.gov.ph Win 2008 mirror

HighTech

www.scboristrajkovski.gov.mk Linux mirror

HighTech

www.iacm.gov.mz Linux mirror

HighTech

www.bba.gov.bd Linux mirror

HighTech

dp-pb.jusbrasil.com.br/noticia... Linux mirror

HighTech

jaboticatubas.mg.gov.br Linux mirror

HighTech

www.ekibastuz.gov.kz Linux mirror

HighTech

www.biritibamirim.sp.gov.br/site/ Linux mirror

HighTech

www.defesa.gov.cv Unknown mirror

HighTech

www.ccs.gov.cv Unknown mirror

HighTech

pu.pohuwatokab.go.id Linux mirror

HighTech

www.sage.coppe.ufrj.br Win 2003 mirror

HighTech

omossoroense.uol.com.br Linux mirror

Hmei7

www.ematerce.ce.gov.br/x.txt Unknown mirror

Hmei7

www.dilmiltama.go.id Unknown mirror

Hmei7

www.dhn.mil.ve/x.txt Win 2003 mirror

Page 26: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

26

Hmei7

dbpe.mef.gob.pa/x.txt Win 2003 mirror

Hmei7

pt-palu.go.id/x.txt Linux mirror

Hmei7

orhei.chamber.md/x.txt Linux mirror

Hmei7

bomberosloja.gob.ec Linux mirror

Hmei7

www.gsm.kyoto-u.ac.jp/x.txt FreeBSD mirror

Hmei7

w2.georgiacourts.gov/x.txt Unknown mirror

Hmei7

btip.postel.go.id/x.txt Unknown mirror

Hmei7

www.uaf.gob.pa/x.txt Linux mirror

Hmei7

revistaespresso.uol.com.br/x.txt Linux mirror

Hmei7

bappeda.kayongutarakab.go.id/x... Linux mirror

Hmei7

www.action.hat.gov.mg/x.txt Linux mirror

Hmei7

selyuchenko-potters.gov.ua/x.txt Unknown mirror

Hmei7

poshyvailo-potters.gov.ua/x.txt Unknown mirror

Hmei7

opishne-museum.gov.ua/x.txt Unknown mirror

Hmei7

ceramology-inst.gov.ua/x.txt Unknown mirror

Hmei7

ceramology.gov.ua/x.txt Unknown mirror

Indishell

www.pakpost.gov.pk/1.txt Solaris 9/10 mirror

Iranian DataCoders Security Team

prefeituradepaudosferros.com.b... Linux mirror

Islamic Ghosts Team

www.maraguatown.go.ke Linux mirror

Islamic Ghosts Team

agpc.gov.ly/modules/news/index... Linux mirror

Islamic Ghosts Team

haras.gov.ly/index.php?option=... Linux mirror

Islamic Ghosts Team

mpc.gov.ly/afde/ Linux mirror

JeeN-7Frawy

www.aljoufedu.gov.sa Linux mirror

Jihad

www.iniap.gob.ec/j4.html Linux mirror

JusTic4

sapnet.gov.in/justic4.htm Win 2003 mirror

KiRaa

www.pn-tapaktuan.go.id/index.html Linux mirror

Kzsg

iremu.falcon.gob.ve/index.php Linux mirror

Learnersofcuriosity

www.fcfrp.usp.br FreeBSD mirror

M3QD4D

fl.bjpg.gov.cn/m3.htm Unknown mirror

M3QD4D

hbg.bjpg.gov.cn/m3.htm Win 2003 mirror

MAX|Ethical|Savior|Mx-Me

www.cnc.gob.pe/break.html Linux mirror

mhDx92

www.comune.gaggiano.mi.it/News... Win 2003 mirror

MJHOOL-HKR

www.dneapmpd.gov.mz Linux mirror

MoroccanGhosts

www.parliament.gov.na/html/ Linux mirror

MoroccanHunters

www.penamiller.gob.mx/index.html Linux mirror

Mr.H4rD3n

www.gis.ambon.go.id Linux mirror

mustireiS

www.agritex.gov.zw Linux mirror

N1Gh7 F0x

www.fef.gov.pk Linux mirror

NaSaH

nfsm.gov.in/WriteReadData/inde... Win 2003 mirror

newbie-herbet

herbet.pa-tegal.go.id Linux mirror

newbie-herbet

soce.gov.np/herbet.php Linux mirror

NinjaVirus

www.whwg.gov.cn/Nilux.htm Win 2003 mirror

Nob0dy

doc.peam.gob.pe Linux mirror

NoEntry Phc

hmc.ntuh.gov.tw/pwn.html Win 2003 mirror

OverDz

en.conaphuehue.gob.gt Linux mirror

Page 27: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

27

Over-X

www.vco.cuhk.edu.hk Win 2008 mirror

Over-X

jolt.law.harvard.edu/digest/ Linux mirror

Over-X

www.biophym.iem.csic.es/biophym/ Linux mirror

Over-X

b2bmagazine.consumidormoderno.... Unknown mirror

Over-X

www.tp-link.gr/adminstathis/im... Linux mirror

Over-X

www.tplink.gr/adminstathis/imp... Linux mirror

RainsevenDotMy

www.karoncity.go.th/images/per... Linux mirror

RainsevenDotMy

www.janhae.go.th/images/ Linux mirror

RainsevenDotMy

www.thapo.go.th/images/news/ Linux mirror

RainsevenDotMy

www.krc.go.th/images/personnel/ Linux mirror

RainsevenDotMy

www.thungyai.go.th/images/acti... Linux mirror

RainsevenDotMy

www.bortru.go.th/images/travel... Linux mirror

RedHack

ide.yok.gov.tr Win 2008 mirror

S.V Crew

agrikutuphane.gov.tr Linux mirror

S:6T_i-#07

www.bbjw.gov.cn Win 2003 mirror

SaccaFrazi

www.moi-cpc.gov.ae/ar/newsmore... Win 2008 mirror

SaccaFrazi

www.xsxzfw.gov.cn/ts_detail1.a... Win 2003 mirror

SaccaFrazi

www.co.okaloosa.fl.us/news_upd...

Win 2003 mirror

SaccaFrazi

www.zyszwdt.gov.cn/ts_detail1.... Win 2003 mirror

SaccaFrazi

www.csng.gov.cn/index.htm Win 2003 mirror

SaccaFrazi

rsjy.hnforestry.gov.cn/show.as... Win 2003 mirror

Sa-Dz

ville-periers.fr Linux mirror

sahrawihacker

www.dgac.gob.gt/index.php/info... Linux mirror

sahrawihacker

www.camaralivramento.rs.gov.br... Unknown mirror

Sizzling Soul

acehtimurkab.bps.go.id Linux mirror

SLYHACKER

www.toyota.az Linux mirror

Syndrom2211

disperindag.pamekasankab.go.id... Linux mirror

Syndrom2211

bappeda.pamekasankab.go.id/xxx... Linux mirror

SystemX

www.munipacanga.gob.pe Linux mirror

SystemX

www.condado.pe.gov.br Linux mirror

SystemX

www.camarasarzedo.mg.gov.br Linux mirror

TeaM MosTa

bljd.bl.gov.cn Win 2003 mirror

THE GAZETTE

spcnu.gov.ve Linux mirror

The UnderTaker

service.benq.com.hk/Policy.asp... Win 2003 mirror

TheHackersArmy

nhaag.ub.gov.mn Linux mirror

TheHackersArmy

bzd.ub.gov.mn Linux mirror

TheHackersArmy

pl.ub.gov.mn/index.php?option=... Linux mirror

TheHackersArmy

cholistan.gov.pk Linux mirror

TheHackersArmy

cmutinga.ba.gov.br Linux mirror

TheHackersArmy

acourt.gov.np/library/admin/po... Win 2008 mirror

TheHackersArmy

dcourt.gov.np/library/admin/po... Win 2008 mirror

TheHackersArmy

supremecourt.gov.np/library/ad... Win 2008 mirror

Thunderhacks

www.arapoti.pr.gov.br/index.ph... Linux mirror

Tn_Scorpion

www.ville-varennes-vauzelles.f... Linux mirror

Troyan_black

www.ess.ufrj.br Linux mirror

Page 28: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

28

TUNOVATO

www.senavitat.gov.py Win 2008 mirror

TurkishAjan.com

newweb.honda.co.th/th/news_rel... Win 2003 mirror

TurkishAjan.com

www.ocasion.renault.bg Linux mirror

ulow

dindik.kayongutarakab.go.id/a.htm Linux mirror

ulow

www.simbiosis.ufsc.br/images/a... Linux mirror

ulow

www.comune.pietrelcina.bn.it/i... Linux mirror

ulow

www.mairipora.sp.gov.br/images... Linux mirror

ulow

transparencia.presidencia.gob.sv Unknown mirror

ulow

sbuda-rada.gov.ua/images/a.txt FreeBSD mirror

V!rù$ No!r

opp.go.th/sitemap.php Linux mirror

V!rù$ No!r

oppn.opp.go.th Linux mirror

WeWe ArAr

www.pastoralejeunes40.cef.fr Linux mirror

xatli

www.25aralikdh.gov.tr/uyar.php Linux mirror

xatli

www.ville-langon.fr/index.php?... Linux mirror

Xcrusher

kejari-kualakapuas.go.id Linux mirror

xdieka-civilx

www.serantajpm.gov.my F5 Big-IP mirror

X-Line

www.gobiernomontufar.gob.ec Linux mirror

xtremee_killar

blog.fdc.gov.bd Linux mirror

xXM3HM3TXx

www.mazda.md Linux mirror

xXM3HM3TXx

invest.gov.kz Unknown mirror

ZiqoR

ispirsaglik.gov.tr/ziqor.txt Linux mirror

ZiqoR

kepsuttarim.gov.tr Linux mirror

ZoRRoKiN

aphdept.nc.gov.lk Linux mirror

علي حافظ االسد

www.pejsib.gob.pe/paginaweb/ Linux mirror

مستر هزام

www.ncrp.gov.bt Linux mirror

Page 29: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

29

Notifier Single def. Mass def. Total def. Homepage def. Subdir def. 1 Barbaros-DZ 3404 164 3568 1193 2375 2 Ashiyane Digital Security Team 2578 3388 5966 1166 4800 3 Hmei7 2319 1372 3691 738 2953 4 LatinHackTeam 1428 1276 2704 2254 450 5 iskorpitx 1322 953 2275 784 1491 6 Fatal Error 1032 1145 2177 1797 380 7 chinahacker 886 1342 2228 4 2224 8 MCA-CRB 852 625 1477 372 1105 9 By_aGReSiF 749 1424 2173 802 1371

10 3n_byt3 644 1882 2526 858 1668 11 HEXB00T3R 604 630 1234 405 829 12 Red Eye 579 1551 2130 2093 37 13 uykusuz001 554 159 713 38 675 14 brwsk007 537 187 724 24 700 15 Mafia Hacking Team 496 589 1085 322 763 16 Swan 496 258 754 219 535 17 Digital Boys Underground Team 461 442 903 179 724 18 Iran Black Hats Team 458 326 784 417 367 19 1923Turk 434 1569 2003 436 1567 20 misafir 424 434 858 226 632 21 Over-X 423 1585 2008 1302 706 22 DeltahackingSecurityTEAM 415 443 858 232 626 23 ZoRRoKiN 397 204 601 115 486 24 D.O.M 392 645 1037 824 213 25 kaMtiEz 391 390 781 238 543 26 HighTech 389 1779 2168 1754 414 27 Triad 375 315 690 397 293 28 [#elite top team] 362 303 665 570 95 29 sinaritx 359 98 457 160 297 30 k4L0ng666 353 1206 1559 222 1337 31 core-project 313 325 638 629 9 32 Ma3sTr0-Dz 313 736 1049 300 749 33 linuXploit_crew 312 166 478 478 0 34 Turkish Energy Team 311 224 535 319 216 35 ISCN 275 128 403 102 301 36 !nf3rN.4lL 263 376 639 177 462 37 NeT-DeViL 253 258 511 335 176 38 Poizonb0x 251 3 254 254 0 39 eMP3R0r TEAM 240 308 548 136 412 40 PowerDream 237 164 401 174 227 41 Vezir.04 234 111 345 152 193 42 KHG 233 281 514 210 304 43 S4t4n1c_S0uls 230 144 374 311 63 44 Hi-Tech Hate 223 6 229 229 0 45 XTech Inc 223 328 551 548 3 46 BeLa 210 123 333 147 186 47 m0sted 209 207 416 107 309 48 spook 209 31 240 40 200 49 Prime Suspectz 205 0 205 205 0 50 the freedom 198 136 334 22 312

Page 30: Attackersinformationwarfarecenter.com/cir/archived/pre/IWC... · 13 IT security myths debunked 2013 year of cyber attacks? 25% of DDoS attacks in 2013 will be application-based 9

CIR

30

Top 10 Ports Top 10 Source IPs

by Reports by Targets by Sources

Port Reports

80 684203

22 662594

53 592910

23 576790

21 560339

179 555953

137 515307

445 461086

36300 372591

3389 232490

Port Targets

3389 70138

22 65444

1433 63334

445 40943

80 33401

8080 21505

443 16736

5060 14464

3306 13911

179 12704

Port Sources

445 20483

36300 20297

3389 10889

80 9746

443 6801

37656 6224

57695 4920

57778 4805

7263 4751

57694 4737

IP Address Reports Target IPs First Seen Last Seen

069.175.126.170 (US) 1,990,602 138,482 2012-07-11 2013-02-25

218.026.089.179 (CN) 343,731 120,102 2012-12-26 2013-02-24

060.211.241.131 (CN) 245,707 105,130 2012-09-29 2013-02-24

176.010.035.241 (IS) 327,526 89,891 2013-01-26 2013-02-24

069.175.054.106 (US) 1,418,510 88,592 2012-07-14 2013-02-25

211.066.184.087 (CN) 261,790 85,799 2012-12-22 2013-02-24

173.045.104.226 (US) 145,428 72,642 2012-09-03 2013-02-24

198.020.069.074 () 372,506 71,802 2012-11-08 2013-02-24

061.143.207.106 (CN) 556,101 71,737 2013-01-25 2013-02-24

198.020.069.098 () 381,494 71,605 2012-11-08 2013-02-24

: DC3 DISPATCH [email protected]

FBI In the New [email protected] Zone-h www.zone-h.org Xssed www.xssed.com Packet Storm Security www.packetstormsecurity.org Sans Internet Storm Center isc.sans.org Exploit Database www.exploit-db.com Exploits Database www.exploitsdownload.com Hack-DB www.hack-db.com Infragard www.infragard.org ISSA www.issa.org Information Warfare Center informationwarfarecenter.com Secunia www.secunia.org Tor Network