Thursday, June 20, 2024

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites. Hackers focused on the prominent Tor hosting provider since it was giving its services to an expansive number of sites sharing child pornography image.

Freedom Hosting II (FHII) is one of the largest onion web hosting providers – offering free space and bandwidth to anyone who signs up for an account.

The cyber assault was initially spotted by Sarah Jamie Lewis, a security scientist at, who saw the mass destruction during a regular scan of the Tor network.

In the message, the group offers to offer to sell the compromised data back to Freedom Hosting II in return for 0.1 bitcoin, or simply over $100, in spite of the fact that it is indistinct whether the offer is vigorous.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

In the destruction message, the Anonymous hackers likewise left a list of all hacked sites. You can get the full list here.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said to vice they initially compromised off the services on January 30, however just had read access; which means they couldn’t change or delete records, yet simply observe what sites were hosted.

The hacker revealed to Vice that they discovered ten such websites, which had transferred so much substance that it represented almost 50% of the aggregate Freedom Hosting II records.

Opportunity Hosting II offers free web hosting for Dark Web destinations for up to 256MB.The hackers claim to have downloaded 74GB of documents and a database dump of 2.3GB.

Concerning how they professedly did it, the programmer has laid out a moderately straightforward 21 step process.

“This is in fact my first hack ever,” they said in an email sent to vice from the same address posted to the hacked Freedom Hosting II sites. “I just had the right idea.”

So, it begins by making another Freedom Hosting II site or signing into a present one, tweaking a few settings in a configuration file, physically setting a password to reset for a target, turning on root access, and after that logging back in with your new system privileges.

“20. reconnect via ssh as root; 21. enjoy,” the guide reads.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said they had discharged a dump of system documents from Freedom Hosting II, yet not client information.

They would not like to freely distribute this in public of the fact that, as said, it professedly has a high measure of child pornography.

Be that as it may, now with the plenty of Freedom Hosting II child pornography sites close down, the feds won’t have the capacity to use that kind of strategy by any means.

Also Read:

  1. TOR and VPN Anonymous enough for Dark Web.

  2. How To access Deep Anonymous web and know its Secretive and Mysterious activities

  3. Share Files Anonymously using TOR and OnionShare


Latest articles

1inch partners with Blockaid to enhance Web3 security through the 1inch Shield

1inch, a leading DeFi aggregator that provides advanced security solutions to users across the...

Hackers Exploit Progressive Web Apps to Steal Passwords

In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs)...

INE Security: Optimizing Teams for AI and Cybersecurity

2024 is rapidly shaping up to be a defining year in generative AI. While...

Threat Actor Claims Breach of Jollibee Fast-Food Gaint

A threat actor has claimed responsibility for breaching the systems of Jollibee Foods Corporation,...

Threat Actors Claiming Breach of Accenture Employee Data

Threat actors have claimed responsibility for a significant data breach involving Accenture, one of...

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers,...

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles