UGNazi: Difference between revisions
Newslinger (talk | contribs) →Attacks: Twitter post does not add anything |
Newslinger (talk | contribs) m date formats per MOS:DATEFORMAT by script |
||
Line 1: | Line 1: | ||
{{Use mdy dates|date=February 2019}} |
|||
{{short description|Hacker group active in 2012}} |
{{short description|Hacker group active in 2012}} |
||
'''UGNazi''' ('''Underground Nazi Hacktivist Group''') is a [[hacker group]]. The group conducted a series of [[cyberattack]]s, including [[Social engineering (security)|social engineering]], [[data breach]], and [[denial-of-service attack]]s, on the websites of various organizations in 2012. Two members of UGNazi were arrested in June 2012; one was incarcerated. In December 2018, two members of UGNazi were arrested in connection to a murder in [[Manila]]. |
'''UGNazi''' ('''Underground Nazi Hacktivist Group''') is a [[hacker group]]. The group conducted a series of [[cyberattack]]s, including [[Social engineering (security)|social engineering]], [[data breach]], and [[denial-of-service attack]]s, on the websites of various organizations in 2012. Two members of UGNazi were arrested in June 2012; one was incarcerated. In December 2018, two members of UGNazi were arrested in connection to a murder in [[Manila]]. |
||
== Attacks == |
== Attacks == |
||
In January 2012, UGNazi defaced the website of [[Ultimate Fighting Championship]] in response to the UFC's support of the [[Stop Online Piracy Act]].<ref>{{cite web|title=The UFC finally issues a statement about UGNazi, the group that hacked UFC.com|url=http://middleeasy.com/index.php?option=com_content&view=article&id=7002%3Athe-ufc-finally-issues-a-statement-about-ugnazi-the-group-that-hacked-ufccom&catid=34%3Aorganizations&Itemid=106|publisher=MiddleEasy|accessdate=May 20, 2012}}</ref> On April 24, 2012, UGNazi performed [[distributed denial-of-service attack]]s on the websites of the [[Central Intelligence Agency]] and the [[Department of Justice]] in protest of the [[Cyber Intelligence Sharing and Protection Act]].<ref>{{cite web|first1=Eduard|last1=Kovacs|accessdate=2019 |
In January 2012, UGNazi defaced the website of [[Ultimate Fighting Championship]] in response to the UFC's support of the [[Stop Online Piracy Act]].<ref>{{cite web|title=The UFC finally issues a statement about UGNazi, the group that hacked UFC.com|url=http://middleeasy.com/index.php?option=com_content&view=article&id=7002%3Athe-ufc-finally-issues-a-statement-about-ugnazi-the-group-that-hacked-ufccom&catid=34%3Aorganizations&Itemid=106|publisher=MiddleEasy|accessdate=May 20, 2012}}</ref> On April 24, 2012, UGNazi performed [[distributed denial-of-service attack]]s on the websites of the [[Central Intelligence Agency]] and the [[Department of Justice]] in protest of the [[Cyber Intelligence Sharing and Protection Act]].<ref>{{cite web|first1=Eduard|last1=Kovacs|accessdate=February 6, 2019|title=UGNazi Hackers Launch DDOS Attacks on CIA, DOJ Sites to Protest CISPA|url=https://news.softpedia.com/news/UGNazi-Hackers-Launch-DDOS-Attack-on-CIA-DOJ-Site-to-Protest-CISPA-266033.shtml|website=softpedia}}</ref> |
||
In May 2012, after compromising a database belonging to the [[Washington Military Department]], UGNazi leaked sensitive [[Domain Name System|DNS]] information used by the US state of [[Washington (state)|Washington]]. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator.<ref>{{cite web|url=http://news.softpedia.com/news/UGNazi-Hackers-Leak-Data-from-Washington-Military-Department-269244.shtml|title=UGNazi Hackers Leak Data from Washington Military Department|last=Kovacs|first=Eduard|publisher=Softpedia|accessdate=May 20, 2012}}</ref> UGNazi performed a [[Social engineering (security)|social engineering attack]] on [[Web hosting service|web host]] billing software developer WHMCS.<ref name="softpedia2012">{{cite web|url=http://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml|title=UGNazi Leaks 1.7 GB of Data from WHMCS Servers|date=|publisher=News.softpedia.com|accessdate=August 20, 2014}}</ref> A member of the group called WHMCS' hosting provider, impersonating a senior employee.<ref name="forbes2012">{{cite news|url=https://www.forbes.com/sites/andygreenberg/2012/05/22/hackers-impersonate-web-billing-firms-staff-to-spill-500000-users-passwords-and-credit-cards/|title=Hackers Impersonate Web Billing Firm's Staff To Spill 500,000 Users' Passwords And Credit Cards|last=Greenberg|first=Andy|date=May 22, 2012|work=Forbes}}</ref> They gained [[Superuser|root access]] to WHMCS's web server and leaked WHMCS's [[SQL]] database, website files, and [[cPanel]] configuration. The leaked database contained about 500,000 stored credit card numbers.<ref name="softpedia2012" /><ref name="forbes2012" /><ref>{{cite web|url=https://www.theregister.co.uk/2012/05/22/whmcs_breach/|title=Titsup WHMCS calls the Feds after credit-card megaleak|last=Leyden|first=John|date=May 22, 2012|accessdate=August 18, 2014}}</ref><ref>{{Cite web|url=https://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml|title=UGNazi Leaks 1.7 GB of Data from WHMCS Servers|last=Kovacs|first=Edward|date=|website=Softpedia News|archive-url=|archive-date=|dead-url=|access-date= |
In May 2012, after compromising a database belonging to the [[Washington Military Department]], UGNazi leaked sensitive [[Domain Name System|DNS]] information used by the US state of [[Washington (state)|Washington]]. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator.<ref>{{cite web|url=http://news.softpedia.com/news/UGNazi-Hackers-Leak-Data-from-Washington-Military-Department-269244.shtml|title=UGNazi Hackers Leak Data from Washington Military Department|last=Kovacs|first=Eduard|publisher=Softpedia|accessdate=May 20, 2012}}</ref> UGNazi performed a [[Social engineering (security)|social engineering attack]] on [[Web hosting service|web host]] billing software developer WHMCS.<ref name="softpedia2012">{{cite web|url=http://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml|title=UGNazi Leaks 1.7 GB of Data from WHMCS Servers|date=|publisher=News.softpedia.com|accessdate=August 20, 2014}}</ref> A member of the group called WHMCS' hosting provider, impersonating a senior employee.<ref name="forbes2012">{{cite news|url=https://www.forbes.com/sites/andygreenberg/2012/05/22/hackers-impersonate-web-billing-firms-staff-to-spill-500000-users-passwords-and-credit-cards/|title=Hackers Impersonate Web Billing Firm's Staff To Spill 500,000 Users' Passwords And Credit Cards|last=Greenberg|first=Andy|date=May 22, 2012|work=Forbes}}</ref> They gained [[Superuser|root access]] to WHMCS's web server and leaked WHMCS's [[SQL]] database, website files, and [[cPanel]] configuration. The leaked database contained about 500,000 stored credit card numbers.<ref name="softpedia2012" /><ref name="forbes2012" /><ref>{{cite web|url=https://www.theregister.co.uk/2012/05/22/whmcs_breach/|title=Titsup WHMCS calls the Feds after credit-card megaleak|last=Leyden|first=John|date=May 22, 2012|accessdate=August 18, 2014}}</ref><ref>{{Cite web|url=https://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml|title=UGNazi Leaks 1.7 GB of Data from WHMCS Servers|last=Kovacs|first=Edward|date=|website=Softpedia News|archive-url=|archive-date=|dead-url=|access-date=September 16, 2018}}</ref> |
||
On June 4, 2012, UGNazi targeted [[4chan]] with a [[DNS hijacking]] attack through a vulnerability in [[CloudFlare]]'s use of [[Google]]'s [[two-factor authentication]] system, redirecting visitors to their UGNazi's Twitter account.<ref>{{cite news|last1=Kumar|first1=Mohit|title=UGNazi hackers attack on CloudFlare via a flaw in Google|url=https://thehackernews.com/2012/06/ugnazi-hackers-attack-on-cloudflare-via.html|accessdate= |
On June 4, 2012, UGNazi targeted [[4chan]] with a [[DNS hijacking]] attack through a vulnerability in [[CloudFlare]]'s use of [[Google]]'s [[two-factor authentication]] system, redirecting visitors to their UGNazi's Twitter account.<ref>{{cite news|last1=Kumar|first1=Mohit|title=UGNazi hackers attack on CloudFlare via a flaw in Google|url=https://thehackernews.com/2012/06/ugnazi-hackers-attack-on-cloudflare-via.html|accessdate=February 2, 2017|date=June 4, 2012}}</ref> UGNazi attacked the non-profit organization [[Wounded Warrior Project]] and released the Project's database on June 6, 2012.<ref>{{cite web|url=http://news.softpedia.com/news/UGNazi-Attacks-Wounded-Warrior-Project-to-Spite-The-Jester-273163.shtml |title=UGNazi Attacks Wounded Warrior Project to Spite The Jester |publisher=News.softpedia.com |date= |accessdate=August 20, 2014}}</ref> On June 8, 2012, UGNazi hacked the website of [[Wawa Inc]] and defaced their webpage with a purported goal of lowering gas prices.<ref>{{cite web|author=|url=https://twitter.com/UG/status/211220216074616833 |title=Twitter / UG: #UGNazi Wawa Hacked!, Gas |publisher=Twitter.com |date=June 8, 2012 |accessdate=August 20, 2014}}</ref><ref>{{cite web|url=http://www.courierpostonline.com/article/20120608/NEWS01/120608009/Wawa-s-website-hacked |title=Wawa's website hacked | Courier-Post |publisher=courierpostonline.com |date=June 8, 2012 |accessdate=August 20, 2014}}</ref><ref>{{cite web|url=http://www.philly.com/philly/news/20120608_Hackers_hit_Wawa_website.html |title=In hack, Wawa web turns Kawaii Hitler |publisher=Philly.com |date=June 10, 2012 |accessdate=August 20, 2014}}</ref> On June 21, 2012, UGNazi claimed they took popular social media website [[Twitter]] down for two hours via a denial of service attack.<ref>{{Cite news|last=Pepitone|first=Julianne|title=Twitter crashes hard, Internet freaks out|date=June 21, 2012|newspaper=CNN|url=http://money.cnn.com/2012/06/21/technology/twitter-down/index.htm|archiveurl=https://web.archive.org/web/20120623062429/http://money.cnn.com/2012/06/21/technology/twitter-down/index.htm|archivedate=June 23, 2012|deadurl=no}}</ref> [[Sam Biddle]] of [[Gizmodo]] disputed the veracity of the claims.<ref>{{cite web|author=Biddle, Sam|date=November 30, 2012|title=The Final Words of a 15-Year-Old Hacker Banned from the Internet|publisher=Gizmodo|url=https://gizmodo.com/5963952/the-final-words-of-a-15-year-old-hacker-banned-from-the-internet|archiveurl=https://web.archive.org/web/20140615185233/http://gizmodo.com/5963952/the-final-words-of-a-15-year-old-hacker-banned-from-the-internet|archivedate=June 15, 2014|deadurl=no}}</ref> |
||
UGNazi hacked into the Twitter accounts of [[Shirley Phelps-Roper]] on December 17, 2012, and Fred Phelps Jr. on December 19, 2012, in protest of their [[Westboro Baptist Church]]'s planned protest following the [[Sandy Hook Elementary School shootings]].<ref>{{cite web|first1=Sam|last1=Biddle|accessdate=2019 |
UGNazi hacked into the Twitter accounts of [[Shirley Phelps-Roper]] on December 17, 2012, and Fred Phelps Jr. on December 19, 2012, in protest of their [[Westboro Baptist Church]]'s planned protest following the [[Sandy Hook Elementary School shootings]].<ref>{{cite web|first1=Sam|last1=Biddle|accessdate=February 6, 2019|title=Hackers Take Over Westboro Baptist Church Twitter (Updated)|url=https://gizmodo.com/hackers-take-over-westboro-baptist-church-twitter-upda-5969006|website=Gizmodo}}</ref><ref>{{cite web|first1=Sam|last1=Biddle|accessdate=February 6, 2019|title=UGNazi Hackers Seize Another Westboro Baptist Church Hate Account|url=https://gizmodo.com/ugnazi-hackers-seize-another-westboro-baptist-church-ha-5969965|website=Gizmodo}}</ref> |
||
== Arrests and sentencing == |
== Arrests and sentencing == |
||
Mir Islam ("Josh the God") and Eric Taylor ("Cosmo the God") of UGNazi were arrested on June 26, 2012 as a result of Operation Card Shop, a [[Federal Bureau of Investigation]] investigation into [[identity theft]] and [[Carding (fraud)|credit card fraud]]. Islam was apprehended in [[Manhattan]] after allegedly attempting to withdraw money using a stolen ATM card.<ref>{{Cite news|last=Zetter|first=Kim|title=Feds Arrest 24 in Global Carding Ring Bust|url=https://www.wired.com/threatlevel/2012/06/operation-card-shop/|accessdate=July 8, 2012|deadurl=no|newspaper=[[Wired (magazine)|Wired]]|date=June 26, 2012|agency=[[Condé Nast Publications]]|archiveurl=https://www.webcitation.org/690e1ifvl?url=http://www.wired.com/threatlevel/2012/06/operation-card-shop/|archivedate=July 8, 2012}}</ref> On November 7, 2012, Taylor was sentenced in juvenile court in [[Long Beach, California]]. Taylor pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation. The terms of the plea placed him on probation until his 21st birthday, restricted his internet access, and required him to forfeit seized assets.<ref>{{cite news|last=Honan|first=Mat|title=Teenage Hacker ‘Cosmo the God’ Sentenced by California Court|url=https://www.wired.com/gadgetlab/2012/11/hacker-cosmo-the-god-sentenced-by-california-court/|work=Wired|date=November 9, 2012}}</ref><ref>{{Cite web|url=https://www.cnbc.com/2018/04/27/eric-taylor-aka-cosmo-the-god-on-cyber.html|title=A former hacker reveals what he’s learned about cybersecurity|last=Day|first=Andrea|date=|website=CNBC|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{cite news|first1=Mat|last1=Honan|accessdate=2019 |
Mir Islam ("Josh the God") and Eric Taylor ("Cosmo the God") of UGNazi were arrested on June 26, 2012 as a result of Operation Card Shop, a [[Federal Bureau of Investigation]] investigation into [[identity theft]] and [[Carding (fraud)|credit card fraud]]. Islam was apprehended in [[Manhattan]] after allegedly attempting to withdraw money using a stolen ATM card.<ref>{{Cite news|last=Zetter|first=Kim|title=Feds Arrest 24 in Global Carding Ring Bust|url=https://www.wired.com/threatlevel/2012/06/operation-card-shop/|accessdate=July 8, 2012|deadurl=no|newspaper=[[Wired (magazine)|Wired]]|date=June 26, 2012|agency=[[Condé Nast Publications]]|archiveurl=https://www.webcitation.org/690e1ifvl?url=http://www.wired.com/threatlevel/2012/06/operation-card-shop/|archivedate=July 8, 2012}}</ref> On November 7, 2012, Taylor was sentenced in juvenile court in [[Long Beach, California]]. Taylor pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation. The terms of the plea placed him on probation until his 21st birthday, restricted his internet access, and required him to forfeit seized assets.<ref>{{cite news|last=Honan|first=Mat|title=Teenage Hacker ‘Cosmo the God’ Sentenced by California Court|url=https://www.wired.com/gadgetlab/2012/11/hacker-cosmo-the-god-sentenced-by-california-court/|work=Wired|date=November 9, 2012}}</ref><ref>{{Cite web|url=https://www.cnbc.com/2018/04/27/eric-taylor-aka-cosmo-the-god-on-cyber.html|title=A former hacker reveals what he’s learned about cybersecurity|last=Day|first=Andrea|date=|website=CNBC|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{cite news|first1=Mat|last1=Honan|accessdate=February 6, 2019|title=Cosmo, the Hacker 'God' Who Fell to Earth|url=https://www.wired.com/2012/09/cosmo-the-god-who-fell-to-earth/|newspaper=Wired|date=September 11, 2012|issn=1059-1028|via=www.wired.com}}</ref> |
||
In December 2018, Troy Woody ("Osama the God") and Islam of UGNazi were arrested in [[Manila]] on [[murder]] charges related to the death of Tomi Masters, Woody's girlfriend.<ref name="BuzzFeed News">{{cite web|accessdate=2019 |
In December 2018, Troy Woody ("Osama the God") and Islam of UGNazi were arrested in [[Manila]] on [[murder]] charges related to the death of Tomi Masters, Woody's girlfriend.<ref name="BuzzFeed News">{{cite web|accessdate=February 6, 2019|title="Down The Rabbit Hole I Go": How A Young Woman Followed Two Hackers' Lies To Her Death|url=https://www.buzzfeednews.com/article/josephbernstein/tomi-masters-down-the-rabbit-hole-i-go|website=BuzzFeed News|first1=Joseph|last1=Bernstein|first2=Davey|last2=Alba|date=February 5, 2019}}</ref> Woody and Islam dumped a box containing Masters's body in the [[Pasig River]].<ref name="BuzzFeed News" /> Both members of UGNazi confirmed that they handled the box, but individually denied killing Masters.<ref name="BuzzFeed News" /> |
||
==References== |
==References== |
Revision as of 14:17, 6 February 2019
UGNazi (Underground Nazi Hacktivist Group) is a hacker group. The group conducted a series of cyberattacks, including social engineering, data breach, and denial-of-service attacks, on the websites of various organizations in 2012. Two members of UGNazi were arrested in June 2012; one was incarcerated. In December 2018, two members of UGNazi were arrested in connection to a murder in Manila.
Attacks
In January 2012, UGNazi defaced the website of Ultimate Fighting Championship in response to the UFC's support of the Stop Online Piracy Act.[1] On April 24, 2012, UGNazi performed distributed denial-of-service attacks on the websites of the Central Intelligence Agency and the Department of Justice in protest of the Cyber Intelligence Sharing and Protection Act.[2]
In May 2012, after compromising a database belonging to the Washington Military Department, UGNazi leaked sensitive DNS information used by the US state of Washington. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator.[3] UGNazi performed a social engineering attack on web host billing software developer WHMCS.[4] A member of the group called WHMCS' hosting provider, impersonating a senior employee.[5] They gained root access to WHMCS's web server and leaked WHMCS's SQL database, website files, and cPanel configuration. The leaked database contained about 500,000 stored credit card numbers.[4][5][6][7]
On June 4, 2012, UGNazi targeted 4chan with a DNS hijacking attack through a vulnerability in CloudFlare's use of Google's two-factor authentication system, redirecting visitors to their UGNazi's Twitter account.[8] UGNazi attacked the non-profit organization Wounded Warrior Project and released the Project's database on June 6, 2012.[9] On June 8, 2012, UGNazi hacked the website of Wawa Inc and defaced their webpage with a purported goal of lowering gas prices.[10][11][12] On June 21, 2012, UGNazi claimed they took popular social media website Twitter down for two hours via a denial of service attack.[13] Sam Biddle of Gizmodo disputed the veracity of the claims.[14]
UGNazi hacked into the Twitter accounts of Shirley Phelps-Roper on December 17, 2012, and Fred Phelps Jr. on December 19, 2012, in protest of their Westboro Baptist Church's planned protest following the Sandy Hook Elementary School shootings.[15][16]
Arrests and sentencing
Mir Islam ("Josh the God") and Eric Taylor ("Cosmo the God") of UGNazi were arrested on June 26, 2012 as a result of Operation Card Shop, a Federal Bureau of Investigation investigation into identity theft and credit card fraud. Islam was apprehended in Manhattan after allegedly attempting to withdraw money using a stolen ATM card.[17] On November 7, 2012, Taylor was sentenced in juvenile court in Long Beach, California. Taylor pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation. The terms of the plea placed him on probation until his 21st birthday, restricted his internet access, and required him to forfeit seized assets.[18][19][20]
In December 2018, Troy Woody ("Osama the God") and Islam of UGNazi were arrested in Manila on murder charges related to the death of Tomi Masters, Woody's girlfriend.[21] Woody and Islam dumped a box containing Masters's body in the Pasig River.[21] Both members of UGNazi confirmed that they handled the box, but individually denied killing Masters.[21]
References
- ^ "The UFC finally issues a statement about UGNazi, the group that hacked UFC.com". MiddleEasy. Retrieved May 20, 2012.
- ^ Kovacs, Eduard. "UGNazi Hackers Launch DDOS Attacks on CIA, DOJ Sites to Protest CISPA". softpedia. Retrieved February 6, 2019.
- ^ Kovacs, Eduard. "UGNazi Hackers Leak Data from Washington Military Department". Softpedia. Retrieved May 20, 2012.
- ^ a b "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". News.softpedia.com. Retrieved August 20, 2014.
- ^ a b Greenberg, Andy (May 22, 2012). "Hackers Impersonate Web Billing Firm's Staff To Spill 500,000 Users' Passwords And Credit Cards". Forbes.
- ^ Leyden, John (May 22, 2012). "Titsup WHMCS calls the Feds after credit-card megaleak". Retrieved August 18, 2014.
- ^ Kovacs, Edward. "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". Softpedia News. Retrieved September 16, 2018.
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ Kumar, Mohit (June 4, 2012). "UGNazi hackers attack on CloudFlare via a flaw in Google". Retrieved February 2, 2017.
- ^ "UGNazi Attacks Wounded Warrior Project to Spite The Jester". News.softpedia.com. Retrieved August 20, 2014.
- ^ "Twitter / UG: #UGNazi Wawa Hacked!, Gas". Twitter.com. June 8, 2012. Retrieved August 20, 2014.
- ^ "Wawa's website hacked | Courier-Post". courierpostonline.com. June 8, 2012. Retrieved August 20, 2014.
- ^ "In hack, Wawa web turns Kawaii Hitler". Philly.com. June 10, 2012. Retrieved August 20, 2014.
- ^ Pepitone, Julianne (June 21, 2012). "Twitter crashes hard, Internet freaks out". CNN. Archived from the original on June 23, 2012.
{{cite news}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help) - ^ Biddle, Sam (November 30, 2012). "The Final Words of a 15-Year-Old Hacker Banned from the Internet". Gizmodo. Archived from the original on June 15, 2014.
{{cite web}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help) - ^ Biddle, Sam. "Hackers Take Over Westboro Baptist Church Twitter (Updated)". Gizmodo. Retrieved February 6, 2019.
- ^ Biddle, Sam. "UGNazi Hackers Seize Another Westboro Baptist Church Hate Account". Gizmodo. Retrieved February 6, 2019.
- ^ Zetter, Kim (June 26, 2012). "Feds Arrest 24 in Global Carding Ring Bust". Wired. Condé Nast Publications. Archived from the original on July 8, 2012. Retrieved July 8, 2012.
{{cite news}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help) - ^ Honan, Mat (November 9, 2012). "Teenage Hacker 'Cosmo the God' Sentenced by California Court". Wired.
- ^ Day, Andrea. "A former hacker reveals what he's learned about cybersecurity". CNBC.
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ Honan, Mat (September 11, 2012). "Cosmo, the Hacker 'God' Who Fell to Earth". Wired. ISSN 1059-1028. Retrieved February 6, 2019 – via www.wired.com.
- ^ a b c Bernstein, Joseph; Alba, Davey (February 5, 2019). ""Down The Rabbit Hole I Go": How A Young Woman Followed Two Hackers' Lies To Her Death". BuzzFeed News. Retrieved February 6, 2019.