Tuesday, November 26, 2024
HomeData BreachAnonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Published on

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites. Hackers focused on the prominent Tor hosting provider since it was giving its services to an expansive number of sites sharing child pornography image.

Freedom Hosting II (FHII) is one of the largest onion web hosting providers – offering free space and bandwidth to anyone who signs up for an account.

The cyber assault was initially spotted by Sarah Jamie Lewis, a security scientist at mascherari.press, who saw the mass destruction during a regular scan of the Tor network.

In the message, the group offers to offer to sell the compromised data back to Freedom Hosting II in return for 0.1 bitcoin, or simply over $100, in spite of the fact that it is indistinct whether the offer is vigorous.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

In the destruction message, the Anonymous hackers likewise left a list of all hacked sites. You can get the full list here.

- Advertisement - SIEM as a Service
Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said to vice they initially compromised off the services on January 30, however just had read access; which means they couldn’t change or delete records, yet simply observe what sites were hosted.

The hacker revealed to Vice that they discovered ten such websites, which had transferred so much substance that it represented almost 50% of the aggregate Freedom Hosting II records.

Opportunity Hosting II offers free web hosting for Dark Web destinations for up to 256MB.The hackers claim to have downloaded 74GB of documents and a database dump of 2.3GB.

Concerning how they professedly did it, the programmer has laid out a moderately straightforward 21 step process.

“This is in fact my first hack ever,” they said in an email sent to vice from the same address posted to the hacked Freedom Hosting II sites. “I just had the right idea.”

So, it begins by making another Freedom Hosting II site or signing into a present one, tweaking a few settings in a configuration file, physically setting a password to reset for a target, turning on root access, and after that logging back in with your new system privileges.

“20. reconnect via ssh as root; 21. enjoy,” the guide reads.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said they had discharged a dump of system documents from Freedom Hosting II, yet not client information.

They would not like to freely distribute this in public of the fact that, as said, it professedly has a high measure of child pornography.

Be that as it may, now with the plenty of Freedom Hosting II child pornography sites close down, the feds won’t have the capacity to use that kind of strategy by any means.

Also Read:

  1. TOR and VPN Anonymous enough for Dark Web.

  2. How To access Deep Anonymous web and know its Secretive and Mysterious activities

  3. Share Files Anonymously using TOR and OnionShare

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has...

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web

A massive data breach has sent shockwaves across the globe, as a database containing...

Chinese Hackers Breached Deep Into US Telecom to Spy on Calls and Texts

In a breach that lawmakers are calling the most serious in U.S. history, Chinese...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...