National Informatics Centre (NIC INDIA) got hacked by Anonymous (India). Purpose of this defacement is just to awake the Government of India . Anonymous now start Operation India against corruption. Anonymous are world famous activist and always fight against Injustice.
Defaced Site : http://informatics.nic.in/oldnewsonline/abc.html
Just today Morning the Anonymous Core team announce the about operation India on there official Twitter:
At the moment defaced page is not available anymore and also the sub-domain ‘informatics.nic.in’ has a ‘Under Maintenance’ message.
In addition to preventing the virus definition update, the Trojan redirects the user to fake banking websites.
A new malware created in Brazil is trying to prevent the Internet browsers from accessing the websites of various Anti-Virus companies and redirects the Internet users to fake banking websites, even when typing the correct address. In addition to that, the code was written to prevent the Antivirus software to download updates.
Fabio Assolini, analyst at Kaspersky Lab explains that the virus uses a technique called Man in the Browser (MitB). This type of infection works by changing/modifying the key “AutoConfigURL” in the Windows registry, making the browser to use the URL as a proxy (intermediate) in its web connection.
If the infected user attempts to access a Web site to download some antivirus software or its updates, then he’ll see the following message: “Service Temporarily Unavailable, try again later …”.
The viral code provides a list of servers used by Anti-Virus companies to distribute their virus definition updates to users. The intention is clear: stop trying to download antivirus updates and remain un-detected,” explains the analyst.
The malware changes the settings of Firefox and registers itself at windows startup. It also updates the malicious proxies in the system incase it is removed by the hosting services. “Thus, the criminal tries to ensure that the victim remain infected as long as possible.”
Uriminzokkiri, a North Korea propaganda site, early this week blamed “South Korea’s extreme right-wingers” for a cyber attack that disrupted its website last weekend. The China-based site claimed the hackers were trying to stop its “influence from spreading.”
“They should stop acting recklessly and think carefully about a grave consequence that could be caused by their mean acts,” it warned.
On January 8, the day widely believed to be Kim Jong Eun’s birthday, pictures and messages that derided the Kim dynasty, were posted by hackers on the website as well as the related Twitter account. Meanwhile, a video clip making fun of the younger Kim was posted on YouTube.
Dcinside.com, a Seoul-based internet website, claimed responsibility.
“Some of our users did that in retaliation for a DDOS (denial of service) attack on our site on January 6,” said Kim Yoo-sik, who runs the site. “It is unclear whether it was done by North Korea or a group of North Korea sympathizers inside South Korea.”
Right after the attack disabled his site for 30 minutes, he posted a statement on the front page that said “Jong Il, Jong Eun, Come out, Let’s fight!” in order to show “a strong willingness not to back down at least in cyber world.”
The site, with daily visitors of 1.3-1.5 million, started in 1999 as a small web forum for digital camera users, but now has more than 1,400 boards for free discussion on various topics from North Korea, politics, and entertainment.
Mr. Kim said he sees a change towards North Korea among site users. “Since the Yeongpyeong attack, people have become more fearful but also furious about what happened. They wanted to show their feelings through this cyber attack” (on the North Korea site), he said.
The North Korea site denied the accusation that it attacked dcinside.com, saying that while South Korean site was misleading public opinion, Uriminzokkiri is not a “childish” group that “invades other’s websites or does hacking for fun.”
Meanwhile, the four Tweets posted by hackers from the South Korean site are strangely still available at the time of writing. One of them says “Let’s kill senile Kim Jong Il and tyrannical offspring pig Kim Jong Eun with one stroke of our sword, so that we can eat rice and meat soup and live as happily as people in the South.”
- Wall Street Journal
MarkMonitor, author of the study drew a connection between file-sharing and piracy that raised the hackles of those named, one of which threatened retaliation through defamation action.
North America and Western Europe were fingered as the host locations for 67 percent of the largest digital piracy sites, based on traffic data from Alexa.com.
The largest three file-sharing sites – RapidShare, Megavideo and megaupload.com – each generated more than 13 million daily visits on average, collectively generating more than 21 billion visits a year.
MarkMonitor acknowledged sites had takedown processes for disputed content but said they didn’t go far enough.
The Swiss site last week won its action against a German court ruling that it took insufficient measures to stop the distribution of Atari’s Alone in the Dark PC game.
And RapidShare disputed MarkMonitor’s classifying it as a digital piracy site: “This defamation of RapidShare as a digital piracy site is absurd and we reserve the right to take legal action against MarkMonitor”.
“RapidShare is a legitimate company that offers its customers fast, simple and secure storage and management of large amounts of data via our servers,” it said.
Video community Megavideo’s terms of service prohibited users from submitting material that is “subject to third party proprietary rights … unless you are the owner of such rights or have permission from their rightful owner”.
Megavideo was owned by Hong Kong company Megaupload, a file-sharing and hosting service that is the 68th most visited site in the world, according to Alexa.
Alexa ranked file-sharing site Pirate Bay 89th most trafficked in the world. Last year, three Pirate Bay founders were sentenced to four to 10 months in prison for copyright infringement.
MarkMonitor said it used patented technology to identify suspected counterfeit or piracy sites, before filtering those results and examining by hand more than 600 results to determine classification.