Friday, April 25, 2025
HomeData BreachAnonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Published on

SIEM as a Service

Follow Us on Google News

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites. Hackers focused on the prominent Tor hosting provider since it was giving its services to an expansive number of sites sharing child pornography image.

Freedom Hosting II (FHII) is one of the largest onion web hosting providers – offering free space and bandwidth to anyone who signs up for an account.

The cyber assault was initially spotted by Sarah Jamie Lewis, a security scientist at mascherari.press, who saw the mass destruction during a regular scan of the Tor network.

In the message, the group offers to offer to sell the compromised data back to Freedom Hosting II in return for 0.1 bitcoin, or simply over $100, in spite of the fact that it is indistinct whether the offer is vigorous.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

In the destruction message, the Anonymous hackers likewise left a list of all hacked sites. You can get the full list here.

- Advertisement - Google News
Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said to vice they initially compromised off the services on January 30, however just had read access; which means they couldn’t change or delete records, yet simply observe what sites were hosted.

The hacker revealed to Vice that they discovered ten such websites, which had transferred so much substance that it represented almost 50% of the aggregate Freedom Hosting II records.

Opportunity Hosting II offers free web hosting for Dark Web destinations for up to 256MB.The hackers claim to have downloaded 74GB of documents and a database dump of 2.3GB.

Concerning how they professedly did it, the programmer has laid out a moderately straightforward 21 step process.

“This is in fact my first hack ever,” they said in an email sent to vice from the same address posted to the hacked Freedom Hosting II sites. “I just had the right idea.”

So, it begins by making another Freedom Hosting II site or signing into a present one, tweaking a few settings in a configuration file, physically setting a password to reset for a target, turning on root access, and after that logging back in with your new system privileges.

“20. reconnect via ssh as root; 21. enjoy,” the guide reads.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said they had discharged a dump of system documents from Freedom Hosting II, yet not client information.

They would not like to freely distribute this in public of the fact that, as said, it professedly has a high measure of child pornography.

Be that as it may, now with the plenty of Freedom Hosting II child pornography sites close down, the feds won’t have the capacity to use that kind of strategy by any means.

Also Read:

  1. TOR and VPN Anonymous enough for Dark Web.

  2. How To access Deep Anonymous web and know its Secretive and Mysterious activities

  3. Share Files Anonymously using TOR and OnionShare

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where...