Wednesday, November 13, 2024
HomeData BreachAnonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Published on

Malware protection

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites. Hackers focused on the prominent Tor hosting provider since it was giving its services to an expansive number of sites sharing child pornography image.

Freedom Hosting II (FHII) is one of the largest onion web hosting providers – offering free space and bandwidth to anyone who signs up for an account.

The cyber assault was initially spotted by Sarah Jamie Lewis, a security scientist at mascherari.press, who saw the mass destruction during a regular scan of the Tor network.

In the message, the group offers to offer to sell the compromised data back to Freedom Hosting II in return for 0.1 bitcoin, or simply over $100, in spite of the fact that it is indistinct whether the offer is vigorous.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

In the destruction message, the Anonymous hackers likewise left a list of all hacked sites. You can get the full list here.

- Advertisement - SIEM as a Service
Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said to vice they initially compromised off the services on January 30, however just had read access; which means they couldn’t change or delete records, yet simply observe what sites were hosted.

The hacker revealed to Vice that they discovered ten such websites, which had transferred so much substance that it represented almost 50% of the aggregate Freedom Hosting II records.

Opportunity Hosting II offers free web hosting for Dark Web destinations for up to 256MB.The hackers claim to have downloaded 74GB of documents and a database dump of 2.3GB.

Concerning how they professedly did it, the programmer has laid out a moderately straightforward 21 step process.

“This is in fact my first hack ever,” they said in an email sent to vice from the same address posted to the hacked Freedom Hosting II sites. “I just had the right idea.”

So, it begins by making another Freedom Hosting II site or signing into a present one, tweaking a few settings in a configuration file, physically setting a password to reset for a target, turning on root access, and after that logging back in with your new system privileges.

“20. reconnect via ssh as root; 21. enjoy,” the guide reads.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said they had discharged a dump of system documents from Freedom Hosting II, yet not client information.

They would not like to freely distribute this in public of the fact that, as said, it professedly has a high measure of child pornography.

Be that as it may, now with the plenty of Freedom Hosting II child pornography sites close down, the feds won’t have the capacity to use that kind of strategy by any means.

Also Read:

  1. TOR and VPN Anonymous enough for Dark Web.

  2. How To access Deep Anonymous web and know its Secretive and Mysterious activities

  3. Share Files Anonymously using TOR and OnionShare

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

Chrome 131 Released with the Fix for Multiple Vulnerabilities

The Chrome team has officially announced the release of Chrome 131 for Windows, Mac,...

Ivanti Warns of Critical Vulnerabilities in Connect Secure, Policy Secure & Secure Access

Ivanti, the well-known provider of IT asset and service management solutions, has issued critical...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Amazon Confirms Employee Data Breach Via Third-party Vendor

Amazon has confirmed that sensitive employee data was exposed due to a breach at...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data

A threat actor has allegedly scraped 489 million lines of Instagram user data, including...