Wednesday, March 26, 2025
HomeData BreachAnonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

Published on

SIEM as a Service

Follow Us on Google News

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites. Hackers focused on the prominent Tor hosting provider since it was giving its services to an expansive number of sites sharing child pornography image.

Freedom Hosting II (FHII) is one of the largest onion web hosting providers – offering free space and bandwidth to anyone who signs up for an account.

The cyber assault was initially spotted by Sarah Jamie Lewis, a security scientist at mascherari.press, who saw the mass destruction during a regular scan of the Tor network.

In the message, the group offers to offer to sell the compromised data back to Freedom Hosting II in return for 0.1 bitcoin, or simply over $100, in spite of the fact that it is indistinct whether the offer is vigorous.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

In the destruction message, the Anonymous hackers likewise left a list of all hacked sites. You can get the full list here.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said to vice they initially compromised off the services on January 30, however just had read access; which means they couldn’t change or delete records, yet simply observe what sites were hosted.

The hacker revealed to Vice that they discovered ten such websites, which had transferred so much substance that it represented almost 50% of the aggregate Freedom Hosting II records.

Opportunity Hosting II offers free web hosting for Dark Web destinations for up to 256MB.The hackers claim to have downloaded 74GB of documents and a database dump of 2.3GB.

Concerning how they professedly did it, the programmer has laid out a moderately straightforward 21 step process.

“This is in fact my first hack ever,” they said in an email sent to vice from the same address posted to the hacked Freedom Hosting II sites. “I just had the right idea.”

So, it begins by making another Freedom Hosting II site or signing into a present one, tweaking a few settings in a configuration file, physically setting a password to reset for a target, turning on root access, and after that logging back in with your new system privileges.

“20. reconnect via ssh as root; 21. enjoy,” the guide reads.

Anonymous hacker breached Freedom Hosting II and taken down 10,613 .onion sites

The hacker said they had discharged a dump of system documents from Freedom Hosting II, yet not client information.

They would not like to freely distribute this in public of the fact that, as said, it professedly has a high measure of child pornography.

Be that as it may, now with the plenty of Freedom Hosting II child pornography sites close down, the feds won’t have the capacity to use that kind of strategy by any means.

Also Read:

  1. TOR and VPN Anonymous enough for Dark Web.

  2. How To access Deep Anonymous web and know its Secretive and Mysterious activities

  3. Share Files Anonymously using TOR and OnionShare

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day...

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows...

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed

A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under...

China’s Baidu Compromised in Data Leak, Affecting Users

Chinese tech giant Baidu has faced severe scrutiny after allegations emerged that a top...

Infosys to Pay $17.5M in Settlement for 2023 Data Breach

Infosys, a leading IT services company, has announced that it has reached an agreement...