Английская Википедия:Antisec Movement
Шаблон:Short description Шаблон:About
The Anti Security Movement (also written as antisec and anti-sec) is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information. The general thought behind this is that the computer security industry uses full disclosure to profit and develop scare-tactics to convince people into buying their firewalls, anti-virus software and auditing services.
Movement followers have identified as targets of their cause:
- websites such as SecurityFocus, SecuriTeam, Packet Storm, and milw0rm,
- mailing lists like "full-disclosure", "vuln-dev", "vendor-sec" and Bugtraq, and
- public forums and IRC channels.
In 2009, attacks against security communities such as Astalavista[1] and milw0rm,[2] and the popular image-host ImageShack,[3][4] have given the movement worldwide media attention.
History
The start of most public attacks in the name of the anti-security movement started around 1999. The "anti-security movement" as it is understood today was coined by the following document which was initially an index on the anti.security.is website.[5][6][7][8]
~el8
~el8 was one of the first anti-security hacktivist groups. The group waged war on the security industry with their popular assault known as "pr0j3kt m4yh3m". pr0j3kt m4yh3m was announced in the second issue of ~el8. The idea of the project was to eliminate all public outlets of security news and exploits. Some of ~el8's more notable targets included Theo de Raadt, K2, Mixter, Ryan Russel (Blue Boar), Gotfault (also known as INSANITY), Chris McNab (so1o), jobe, Шаблон:Proper name, pm, aempirei, Шаблон:Proper name, lcamtuf, and OpenBSD's CVS repository.
The group published four electronic zines which are available on textfiles.com.[9]
pHC
pHC[10] is an acronym for "Phrack High Council". This group also waged war against the security industry and continued to update their website with news, missions, and hack logs.[11]
Less recent history
Most of the original groups such as ~el8 have grown tired of the anti-security movement and left the scene. New groups started to emerge.
dikline
Шаблон:Proper name kept a website[12] which had an index of websites and people attacked by the group or submitted to them. Some of the more notable Шаблон:Proper name targets were rave, rosiello, unl0ck, nocturnal, r0t0r, silent, gotfault, and skew/tal0n.[13]
More recent history
giest
In August 2008, mails were sent through the full-disclosure mailing list from a person/group known as "giest".
Other targets include mwcollect.org in which the group released a tar.gz containing listens of their honeypot networks.[14][15]
ZF0
ZF0 (Zer0 For Owned) performed numerous attacks in the name of pr0j3kt m4yh3m in 2009. They took targets such as Critical Security, Comodo and various others. They published 5 ezines in total.[16] July 2009, Kevin Mitnick's website was targeted by ZF0, displaying gay pornography with the text "all a board the mantrain."[17]
AntiSec Group
A group known as the "AntiSec Group"[18] enters the scene by attacking groups/communities such as an Astalavista,[1] a security auditing company named SSANZ and the popular image hosting website ImageShack.[3]
Graffiti reading "Antisec"[18] began appearing in San Diego, California in June 2011 and was incorrectly[19] associated with the original Antisec[18] movement. According to CBS8, a local TV affiliate "People living in Mission Beach say the unusual graffiti first appeared last week on the boardwalk." They also reported "...it was quickly painted over, but the stenciled words were back Monday morning." It was later realizedШаблон:By whom to be related to the new Anti-Sec movement started by LulzSec and Anonymous.[20]
On April 30, 2015 the AntiSec Movement reappeared and started Doxing police officers by hacking their databases. On April 30, 2015 they hacked into Madison Police Department and released officers names, address, phone numbers, and other personal data in relation to an Anonymous operation.[21][22]
References
- ↑ 1,0 1,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 3,0 3,1 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ phrack.efnet.ru Шаблон:Webarchive
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ [1] Шаблон:Webarchive
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 18,0 18,1 18,2 Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ #OpRobinson
- ↑ Шаблон:Cite web