Showing posts with label Phishing Site. Show all posts
Showing posts with label Phishing Site. Show all posts

Monday, February 13, 2012

A Message to all The Peoples of Bangladesh by Mr. S1CK aka EHK

Hello All Bangladeshis!
Greetings,
This is we. Now the time comes, Its the time to Pay Back my dear warriors! Get ready for the Attack. No one is bigger then you. You are the King of Your Kingdom. No instruction required. Just be known about hiding your Internet Protocol [IP]. Wear a mask by using a new IP. No body will find you. Use TOR, HSS whatever you would like to but be safe. Never forget that we are by born Warriors. Attack India as much as you can.

The things you have to do:

1. Who ever is using LOIC like me, please be sure that you have protected your self before you do something. So here I have come with a solution to hide your Internet Protocol (IP) Address please use this. How to use it you will find everything in this post. Share it and Download it, use it and Use LOIC to BANG Indian website's. Any One of them!



2. Download LOIC (Low Orbit Ion Cannon) [If you don't have it!]

We want to make a history. What we can do and what we can perform its depends on out capabilities. Keep your expectation high.

We will attack website through DDoS. Lets know what is it?

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.
One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.
When the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack.

Keep your Shield on. Attack on Indian Sites. Its an Operation. I am naming it Operation Cyber India #OpCyberIndia.


Hack them by Phishing, Key Logging, DDoS, Own their sites etc ways of Hacking.

I am with you guys and always will be.

Thank you.
aka.




We are Anonymous,
We are Legion,
We do not Forgive,
We do not Forget,
Expect us.

United by One,
Divided by Zero.

[Its not a Message by Anonymous! Its a Message by Mr. S1CK]

Source: Mr.S1CK

Monday, October 24, 2011

Phishing Site Hacked to Warn About Phishing Sites

Sometimes hackers aren't as big and bad as they're made out to be. Sometimes they just want to help make the Web a safer place for everyone. That benevolent spirit is on display on a phishing site that was recently hacked to teach gullible Internet users about the dangers of — you guessed it — phishing sites.
A hacker modified a phishing website to teach people about phishing scams. Credit: Dreamstime
Researchers at the security firm GFI Labs found an email used to lure people to a phishing site, www.canal-i.com. The message attempts to scare unsuspecting readers by telling them they have exceeded the storage limit on their inbox, and says, "You will not be able to send or receive new mail until you upgrade your email. Click below link and fill the form to upgrade your account." When clicked, that link directs users to a Web page that asks for their username, email address and password.

For one hacker — he or she has not been identified — this was not just an ordinary phishing scam, but also a chance to teach others. The white-hat hacker — "white hat" refers to hackers who exploit security bugs to improve security —  stripped the phishing page of its malicious content and replaced it with a stern educational message about the perils lurking in the online world.

"There is no such thing as a central Email service update," the website was manipulated to read. "A stupid criminal created this to steal your email account. I have modified it to educate you about online crime. He does not like that but that is too damn bad. You can submit this form to see a helpful video about phishing. Stop letting stupid criminals like this one hijack your account. Have a great day."

The altered phishing page included a "Submit Form" button at the bottom, the same way the original fraudulent page did, except this button redirected users to an instructional video about phishing scams. (The canal-i website currently shows an "under construction" message.)

As a general rule, any unsolicited emails that ask you to download software to fix a problem or restore any kind of service should not be trusted. Emails that appear to come from a bank or financial institution such as the Federal Deposit Insurance Corporation (FDIC) should also be handled with a heavy dose of skepticism; online crooks know that people are likely to fall for scams when they fear their personal finances may be in trouble. If you suspect such an email is out for your personal details, delete it and contact your bank directly. Running up-to-date anti-virus and anti-malware software on your computer will also help detect phishing sites and malicious emails as threats.

Source: Internet