Jump to content

UGNazi: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
List of attacks: Condense multiple short sections into single "Attacks" section
Line 14: Line 14:
After compromising a database belonging to the [[Washington Military Department]], UGNazi leaked sensitive [[Domain Name System|DNS]] information used by the US state of [[Washington (state)|Washington]]. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator.
After compromising a database belonging to the [[Washington Military Department]], UGNazi leaked sensitive [[Domain Name System|DNS]] information used by the US state of [[Washington (state)|Washington]]. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator.
"This is just a continuation of our attack against wa.gov, but other than that, like we said we're not done with the government or anyone to be exact. We're going to come after every dirtbag we can get our hands on. Freedom is a right not a privilege but the US government makes it seems like it's a privilege that we have the 'freedom'," a group member told [[Softpedia]].<ref>{{cite web|url=http://news.softpedia.com/news/UGNazi-Hackers-Leak-Data-from-Washington-Military-Department-269244.shtml|title=UGNazi Hackers Leak Data from Washington Military Department|last=Kovacs|first=Eduard|publisher=Softpedia|accessdate=May 20, 2012}}</ref>
"This is just a continuation of our attack against wa.gov, but other than that, like we said we're not done with the government or anyone to be exact. We're going to come after every dirtbag we can get our hands on. Freedom is a right not a privilege but the US government makes it seems like it's a privilege that we have the 'freedom'," a group member told [[Softpedia]].<ref>{{cite web|url=http://news.softpedia.com/news/UGNazi-Hackers-Leak-Data-from-Washington-Military-Department-269244.shtml|title=UGNazi Hackers Leak Data from Washington Military Department|last=Kovacs|first=Eduard|publisher=Softpedia|accessdate=May 20, 2012}}</ref>
===UFC.com and fighter Dana White===
UGNazi leader, [[Josh The God]] hacked the website [[UFC]].com leaking the website's database, financial and personal information of [[Dana White]] in response for the UFC's support of SOPA. They attacked the Gamer's League Live website and [[Ultimate Fighting Championship]]'s website in protest of the UFC's support for the [[Stop Online Piracy Act]] (SOPA), proposed by the United States at the time.<ref>{{cite web|title=The UFC finally issues a statement about UGNazi, the group that hacked UFC.com|url=http://middleeasy.com/index.php?option=com_content&view=article&id=7002%3Athe-ufc-finally-issues-a-statement-about-ugnazi-the-group-that-hacked-ufccom&catid=34%3Aorganizations&Itemid=106|publisher=MiddleEasy|accessdate=May 20, 2012}}</ref>
UGNazi leader, [[Josh The God]] hacked the website [[UFC]].com leaking the website's database, financial and personal information of [[Dana White]] in response for the UFC's support of SOPA. They attacked the Gamer's League Live website and [[Ultimate Fighting Championship]]'s website in protest of the UFC's support for the [[Stop Online Piracy Act]] (SOPA), proposed by the United States at the time.<ref>{{cite web|title=The UFC finally issues a statement about UGNazi, the group that hacked UFC.com|url=http://middleeasy.com/index.php?option=com_content&view=article&id=7002%3Athe-ufc-finally-issues-a-statement-about-ugnazi-the-group-that-hacked-ufccom&catid=34%3Aorganizations&Itemid=106|publisher=MiddleEasy|accessdate=May 20, 2012}}</ref>



Revision as of 12:14, 6 February 2019

UGNazi (Underground Nazi Hacktivist Group) is a hacker group.

Attacks

In May 2012, UGNazi is responsible for hacking the web server of the web host billing software developer WHMCS in an apparent social engineering attack.[1] A member of the group called WHMCS' hosting provider impersonating a senior employee.[2] They were subsequently granted root access to WHMCS' web server after providing information for identity verification. UGNazi later leaked publicly WHMCS' SQL database, website files, and cPanel configuration.[3] The leaked database contains about 500,000 stored credit card numbers.[1] [2][4]

UGNazi member Next claimed that the group targeted WHMCS in response to their tolerance for fraudulent websites' licensed use of their software.[2] Days later, Cosmo released a statement claiming that WHMCS was attacked to demonstrate the vulnerability of their customers' credit card numbers, which were stored on a web server managed by HostGator.[5]

After compromising a database belonging to the Washington Military Department, UGNazi leaked sensitive DNS information used by the US state of Washington. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator. "This is just a continuation of our attack against wa.gov, but other than that, like we said we're not done with the government or anyone to be exact. We're going to come after every dirtbag we can get our hands on. Freedom is a right not a privilege but the US government makes it seems like it's a privilege that we have the 'freedom'," a group member told Softpedia.[6] UGNazi leader, Josh The God hacked the website UFC.com leaking the website's database, financial and personal information of Dana White in response for the UFC's support of SOPA. They attacked the Gamer's League Live website and Ultimate Fighting Championship's website in protest of the UFC's support for the Stop Online Piracy Act (SOPA), proposed by the United States at the time.[7]

Softpedia published an article about the attack on the CIA.[8] Hackers of UGNazi are launching attacks on the sites of the CIA and the one of the Department of Justice (DOJ).

In June 2012, UGNazi targeted the well-known imageboard 4chan.[9] They are reported to have hacked CloudFlare's database. The attacks on 4chan were short, lasting about 20 minutes. During that 20 minutes anyone trying to access 4chan would be redirected to UGNazi's Twitter page.[10]

In June 2012, UGNazi attacked the non-profit organization Wounded Warrior Project. The Project's database was released on June 6, 2012.[11][12]

On June 8, 2012, UGNazi hacked the website of Wawa, a chain of convenience stores. They defaced the webpage, and have made statements that they have remote access to all of Wawa's gas station terminals. UGNazi has said that the reason for hacking Wawa was to lower gas prices. The Wawa website has since been secured.[13][14][15]

On June 21, 2012, UGNazi claimed they took popular social media website Twitter down via a denial of service attack. Twitter was down for two hours, and this was the worst crash the site had faced in eight months.[16] However, "It's doubtful they wrestled down Twitter — it was probably just a bug," said blogger Sam Biddle.[17]

UGNazi hacked into the Twitter accounts of Shirley Phelps-Roper on December 17, 2012, and Fred Phelps Jr. on December 19, 2012, in protest of their Westboro Baptist Church's planned protest following the Sandy Hook Elementary School shootings. Phelps-Roper's account displayed a tribute called 'Pray For Newtown', lending support to those affected by the tragedy. As of the 20th of the same month, Phelps-Roper's account has been returned to her control, whereas Phelps' is listed as having been suspended.[citation needed]

Law enforcement response

Mir Islam, allegedly UGNazi member JoshTheGod, was arrested on June 26, 2012 in Manhattan as part of Operation Card Shop, a Federal Bureau of Investigation investigation into identity theft and credit card fraud, after allegedly attempting to withdraw money using a stolen ATM card.[18]

Cosmo, another alleged UGNazi member, was also arrested on June 26, 2012 in Long Beach, California as part of Operation Card Shop. The FBI's press release regarding Operation Card Shop[19] states, "In addition, two minors, whose names will not be made public, were arrested by local authorities in Long Beach and Sacramento, California". Two days later, Cosmo was released[20] from a juvenile detention center in Los Angeles and posted on Twitter,[21] which was Cosmo's final tweet for the next two years. [22][23]

Sentencing

On November 7, 2012, the 15-year-old UGNazi hacker known as Cosmo or Cosmo the God was sentenced in juvenile court in Long Beach, California. Cosmo pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation, the terms of the plea place him on probation until his 21st birthday. During that time, he cannot use the Internet without prior consent from his parole officer. Nor will he be allowed to use the Internet in an unsupervised manner, or for any purposes other than education-related ones. He is required to hand over all of his account logins and passwords. He must disclose in writing any devices that he has access to that have the capability to connect to a network. He is prohibited from having contact with any members or associates of UGNazi or Anonymous (although Anonymous has no official members), along with a specified list of other individuals. He had to forfeit all the computers and other items seized in the raid on his home. Violating any of these terms will result in a three-year prison term.[24]

Final status

Regardless of the loss of Cosmo, the group continued to claim responsibility for hacks in December 2012 of the U.S. State Department and General Services Administration[25] and of Panasonic Brasil.[26] However, they were not heard from until an August 2014 doxing of several prominent people (albeit thinly) related to the #OpFerguson protests concerning the shooting of Michael Brown in Ferguson, Missouri.[27]

References

  1. ^ a b "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". News.softpedia.com. Retrieved August 20, 2014.
  2. ^ a b c Greenberg, Andy (May 22, 2012). "Hackers Impersonate Web Billing Firm's Staff To Spill 500,000 Users' Passwords And Credit Cards". Forbes.
  3. ^ http://paste.re/409.html
  4. ^ Leyden, John (May 22, 2012). "Titsup WHMCS calls the Feds after credit-card megaleak". Retrieved August 18, 2014.
  5. ^ Kovacs, Edward. "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". Softpedia News. Retrieved 16 September 2018. {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  6. ^ Kovacs, Eduard. "UGNazi Hackers Leak Data from Washington Military Department". Softpedia. Retrieved May 20, 2012.
  7. ^ "The UFC finally issues a statement about UGNazi, the group that hacked UFC.com". MiddleEasy. Retrieved May 20, 2012.
  8. ^ [1]
  9. ^ "Twitter / CosmoTheGod: We have gained full access". Twitter.com. June 1, 2012. Retrieved August 20, 2014.
  10. ^ Kumar, Mohit (4 June 2012). "UGNazi hackers attack on CloudFlare via a flaw in Google". Retrieved 2 February 2017.
  11. ^ "UGNazi Attacks Wounded Warrior Project to Spite The Jester". News.softpedia.com. Retrieved August 20, 2014.
  12. ^ "Twitter / UG: @th3j35t3r http://t.co/BfEx9nz4". Twitter.com. June 1, 2012. Retrieved August 20, 2014. {{cite web}}: External link in |title= (help)
  13. ^ "Twitter / UG: #UGNazi Wawa Hacked!, Gas". Twitter.com. June 8, 2012. Retrieved August 20, 2014.
  14. ^ "Wawa's website hacked | Courier-Post". courierpostonline.com. June 8, 2012. Retrieved August 20, 2014.
  15. ^ "In hack, Wawa web turns Kawaii Hitler". Philly.com. June 10, 2012. Retrieved August 20, 2014.
  16. ^ Pepitone, Julianne (June 21, 2012). "Twitter crashes hard, Internet freaks out". CNN. Archived from the original on June 23, 2012. {{cite news}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  17. ^ Biddle, Sam (November 30, 2012). "The Final Words of a 15-Year-Old Hacker Banned from the Internet". Gizmodo. Archived from the original on June 15, 2014. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  18. ^ Zetter, Kim (June 26, 2012). "Feds Arrest 24 in Global Carding Ring Bust". Wired. Condé Nast Publications. Archived from the original on July 8, 2012. Retrieved July 8, 2012. {{cite news}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  19. ^ [2]
  20. ^ [3]
  21. ^ [4]
  22. ^ "FBI — Manhattan U.S. Attorney and FBI Assistant Director in Charge Announce 24 Arrests in Eight Countries as Part of International Cyber Crime Takedown". Fbi.gov. June 26, 2012. Retrieved August 20, 2014.
  23. ^ "Twitter / CosmoTheGod: Me and Josh were arrested early". Twitter.com. June 28, 2012. Retrieved August 20, 2014.
  24. ^ Honan, Mat (November 9, 2012). "Teenage Hacker 'Cosmo the God' Sentenced by California Court". Wired.
  25. ^ "UGNazi Claims Hacking US Government Websites Including State Department". VARA Cyber Security. December 12, 2012. Archived from the original on June 15, 2014. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  26. ^ "UGNazi Claims Hacking of Panasonic's Brazilian Website". VARA Cyber Security. December 12, 2012. Archived from the original on June 15, 2014. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  27. ^ http://demondoxbin.in/

Further reading