text
stringlengths 4
429
|
---|
hacking.
|
"After you choose the technology you
|
love, you have to research every system
|
and code everyday!"
|
Charles: "Silence belongs to our
|
world..."
|
Charles
|
"Charles always laughs so brightly when
|
searching for program problems!"
|
KuNgBiM
|
"Only we can feel this kind of happy..."
|
Ronag
|
"Behind every successful design, he
|
always has a slight smile
|
Wicked Rose and NCPH hacking photos
|
WHG (
|
WHG is not a core member of NCPH but a close affiliate of Wicked Rose. WHG appears to be
|
central to development of the NCPH rootkit, aka GinWui. WHG is credited by Wicked Rose as
|
one of the authors of this malicious code. WHG is an experienced malicious code author with
|
the following contact information:
|
E-mail address:
|
QQ Number:
|
Website:
|
Real Name:
|
Location:
|
312016
|
http://cnasm.com
|
May be "Zhao Jibing",
|
Believed to be employed in the Sichuan province of China.
|
WZT is a former member of the NCPH group who was kicked out during the time of zero-day
|
attacks in May 2006. WZT was removed on May 20, 2006. During this time period the zeroday attacks became publicly disclosed, increasing pressure upon the hacking group. It is feasible
|
that WZT may have offended the group in some way related to zero-day attack techniques, strife
|
over hacker for hire deals, or competition for hacker for hire deals.
|
WZT is a former coding expert within the NCPH group and many years experience in hacking.
|
He is responsible for creating multiple tools and regularly giving credit to the infamous Li0n
|
Chinese hacker (founder of Honker Union (HUC) Chinese group. WZT maintains a website at
|
tthacker.cublog.cn.
|
The Jiangsu Connection?
|
WHOIS registrant data for related domains used within attacks and hacker sites reveals a
|
connection with the Jiangsu province of China. One domain, windowsupdates.net, is used in
|
attacks and revolves to an IP address in the Sichuan province. Meanwhile, the registrant
|
"zhaofeng network" is reportedly based out of Jiangsu, not Sichuan. Some of the WHOIS
|
information clearly contains fraudulent information to presumably direct researchers away from
|
the true identity and location of the attacker responsible for registering the hostile domain. The
|
connection to the Jiangsu and Sichuan provinces remains unclear.
|
Concluding Comments
|
Prior to Wicked Rose and NCPH hacker for hire attacks in 2006, Chinese hackers are only
|
known for their patriotic hacking. This disturbing development reveals two critical threats: 1)
|
motives of Chinese hackers are changing 2) Chinese hackers are regularly associated with
|
sophisticated attacks as of 2006.
|
Wicked Rose implicates himself in his early blog entries and website posts in 2006 and prior.
|
An unknown company or entity reportedly paid Wicked Rose for hacking at the rate of 2,000
|
RMB a month, about $250 USD. At this time Wicked Rose gave 200 RMB to NCPH hackers
|
and kept the rest for himself. Once targeted attacks took place the payment increased five-fold to
|
5,000 RMB monthly with $1,000 a month going to NCPH hackers. This is a significant amount
|
of money in China, effectively paying hackers a full-time wage for part-time hacking.
|
Throughout the summer of 2006, while Wicked Rose was not in school, over 35 zero-day
|
attacks, proof-of-concept codes, and attacks against un-patched Microsoft Office vulnerabilities
|
are discovered in the wild. With Wicked Rose claiming responsibility for early attacks and the
|
lead author of both GinWui and the NCPH hacking group, there is little doubt left as to his
|
involvement in attacks to date.
|
By the end of 2006 attacks become increasingly sophisticated. In one instance a popular
|
PowerPoint file distributed during the Christmas holiday season for the last two years prior is
|
used within a socially engineered attack upon one individual within an energy sector US based
|
company. The PowerPoint file is modified to include an exploit that silently installs malicious
|
code. This same individual receives another e-mail containing a Microsoft Word exploit. In this
|
case only one individual within the company is targeted, and with just two messages socially
|
engineered for maximum success. This is a much more targeted and stealthy approach for
|
attacks compared to the earlier attacks performed by the group in the late spring of 2006.
|
NCPH continues to be a significant threat going forth for several reasons.
|
1. Attacks continue to take place in the wild and are very difficult to identify on a targeted
|
basis. Only the most sophisticated networks and system administrators are able to
|
properly protect and capture hostile targeted attack files before an attack takes place.
|
2. NCPH is a serious dedicated hacking group that is methodical and disciplined in their
|
development of new exploits and attacks.
|
3. NCPH is motivated by both the thrill and challenge of hacking and money as a motive.
|
4. Attacks by the group are highly targeted and stealthy, very difficult to detect and remove.
|
Russian Invasion of Georgia
|
Russian Cyberwar on Georgia
|
10 November, 2008
|
Regular updates can be found on the Georgia Update website:
|
www.georgiaupdate.gov.ge
|
INTRODUCTION ..............................................................................................2
|
BACKGROUND ON CYBERWARFARE.......................................................2
|
RUSSIA
|
S ONLINE WAR ON GEORGIA: FIRST STRIKE ..............................3
|
CYBER BLOCKADE.........................................................................................5
|
SITES PROVIDING DDOS ATTACK TOOLS .................................................5
|
PART OF THE INFORMATION WAR .............................................................7
|
RUSSIAN BUSINESS NETWORK......................................................................8
|
THE 27 AUGUST ATTACK...............................................................................9
|
CONCLUSION......................................................................................................10
|
APPENDIX: Articles About Cyberwar on Georgia .........................................11
|
1. INTRODUCTION
|
The Russian invasion of Georgia was preceded by an intensive build up
|
of cyberattacks attempting to disrupt, deface and bring down critical
|
Georgian governmental and civilian online infrastructure. These attacks
|
became a massive assault on the eve of the invasion which resulted in
|
the blocking, re-routing of traffic and control being seized of various
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.