Anonymous Hacked Panda Security SitesAdded: Tuesday, March 13th, 2012
Category: Bit Torrent Freedom > The Right To Share
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
The world-known hacker group Anonymous has defaced around two dozen of the websites owned by Panda Security. This is meant to be done in revenge for the security company’s involvement in the arrests of LulzSec members. Although the hackers couldn’t take down Panda’s main website, its subdomains also were very attractive target.
Each one featured a video from YouTube of Anonymous and LulzSec exploits, and what looked like the username and password details of more than a hundred of Panda employees.
Panda’s competitor, the insecurity group Sophos? was first to report the attack. The latter appears to be a response to the company’s blog post about the LulzSec arrests. The post was titled “Where is the Lulz now?” Luis Corrons, the Panda’s employee who wrote the blog post, also tweeted about the incident, revealing that they had their team taking a look into the defacement at the moment. In addition, investigations involving catching criminals were considered fun at the company. However, Luis Corrons denied that his company helped law enforcement arrest the hackers, but admitted that he would have loved to participate in it.
The blog post was taken down after the security outfit realized that it probably wasn’t the best idea to crow about the arrests. The messages left by Anonymous members on the hacked Panda website also accused the outfit of cooperating with law enforcement to arrest Anonymous members.
Regardless of taking down the blog post, the security outfit claimed that the attack in question wasn’t very serious. Panda said in its statement on Facebook that the attack didn’t breach either the company’s internal network or source code; update servers and user information wasn’t accessed. The only data the hackers managed to access was connected with marketing campaigns like landing pages and some obsolete credentials, which included supposed credentials for people that haven’t been working at the company for more than 5 years. In reality, Anonymous members obtained access to some server that was hosted outside the company’s internal network. The server was claimed to be used only for marketing campaigns and Panda Security blogs, so virtually no harm was done to the company.
March 13th,2012Posted by:
Tuesday, March 13th, 2012
|posted by (2012-03-13 14:09:38)|
|next time panda||
Most Popular Stories