Hackers leak data in preparation for Sept. 11 cyber attack
AnonGhost has been hard at work penetrating systems and leaking personal information.
“AnonGhost is Everywhere,” the reportedly pro-Syrian hacker collective posted to Twitter on Saturday.
The hacktivists – said to be based in Spain, Canada and Brazil – have taken credit on Twitter for several attacks within the past week, including leaking 500 Canadian email addresses, accessing Israel police station data, hacking 5,000 Israeli bank accounts and acquiring thousands of Israeli credit cards.
The biggest hit came on Monday, when AnonGhost claims to have leaked personal information on more than 165,000 Israelis by attacking several websites in short order. One breached website, which offered web-hosting services, provided names, phone numbers, emails addresses and passwords.
"Mauritania Attacker," alleged to be the AnonGhost team leader, told news site techworm.in that the reason Israel has been targeted is because of attacks against Palestinian innocents and children.
Some of the other sites breached in the attacks include hashraa.co.il, Yamit 2000 and the website belonging to Avishay Braverman, a member of the Knesset for the Labor Party in Israel, according to a release put out by Israel-based internet security company Maglan and reported on in English by Israeli news site israellhayom.com.
The veracity of the claims by AnonGhost will be tested on Wednesday, a day the collective seems poised to carry out a massive cyber attack and release even more information. AnonGhost has been rallying the cause on Twitter, but further proof of intention was hidden within several of the websites' codes, notably in a threatening image with the date Sept. 11 and the Twitter hash tag #OpIsraelReborn.
In preparation, the FBI issued a notice in the beginning of August stating they are aware that an “Anonymous-affiliated group” may launch a wave of cyber attacks against United States-based and foreign financial institutions.
The attack would support OP USA, a previous campaign against similar institutions that occurred in May. OP USA was officially announced and organized by “Mauritania Attacker,” according to the FBI release (PDF), “who launched OP ISRAEL and is the founder of Mauritania Hacker Team and AnonGhost Team.”
Based on the less-than-successful May iteration of this attack, the FBI seems to be considering this a minimal threat, but still encourages institutions to secure cyber infrastructure.
The Israel Hayom article indicates that Maglan reviewed more than 40,000 compromised records and verified that the information released is genuine. However, the article goes on to say that Maglan identified a number of users whose information was “not up to date and had been changed a long time ago.”
A Maglan representative could not be reached for comment.