Internet Anthropologist Think Tank: IRGC cyber section hits back

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Wednesday, June 17, 2009

    IRGC cyber section hits back



    IRGC cyber section hits back
    By Gerald Internet Anthropologist Think Tank
    0617.09
    IRGC, Islamic Revolution Guard Corps, has a cyber division
    estimated funded at $76 million for cyber warfare.

    ( Jeeze my budget is $1,000 a month, out of my own pocket. G.. Donate $12 here)

    Our paradigm Intel indicates Iran's cyber defenses are between a
    rock and a hard place. Their offensive capabilities are for naught.
    They have geared up to fight a Tiger and find themselves
    confronted with thousands of ants.

    As the resistance is an huge group offensive, they have no
    central location to target, just thousands of IPs.
    Only one bot farm involved in dos attack so far.

    So they play whack a mole, knock one down and another
    pops up, they have been closing IPS, and filtering the
    backbone, but there are ways around that.

    They collect any and all Iranian IP's and trace to the
    physical location and arrest owners and take PCs and
    are collecting satellite dishes.

    But the majority ( so far ) of the dos attacks are coming
    from inside Iran. And Iran has some big problems
    with some undersea cables.

    They have moles trying to infiltrate the resistance,
    and are arresting everyone they can connect to it.

    Some of the questioning of the suspects is torture.
    And they are getting names and issuing warrants.

    But the hackers are mobile and in most cases they
    are searching the crowds using photos.

    The cell phones and twitter allow mobile hackers
    which are almost impossible to track and or catch.

    They have input false info into twitter feeds
    to try and isolate the real Iranians from all those
    that have false locations listed.
    Tehran is
    UTC/GMT +4:30 hours
    NOT 3:00 HOURS.

    And they have managed to wipe out all
    the tiny urls used since the start of the
    protests.

    STORY BELOW:

    A URL-shortening service that condenses long Web addresses for use on micro-blogging sites like Twitter was hacked over the weekend, sending millions of users to an unintended destination, a security researcher said today.

    After Cligs, a rival to the better known TinyURL and bit.ly shortening services, was attacked Sunday, more than 2.2 million Web addresses were redirected to Kevin Saban's blog, which appears on the Orange County Register's Web site. Noticing a dramatic upswing in traffic, Saban -- who uses Cligs in his Twitter messages to shorten URLs -- contacted Pierre Far, the creator of Cligs.

    "Quite curious," was how Graham Cluley, a senior technology consultant with security company Sophos, put it. "Our first thought was that it was a spam campaign, that the hack would redirect [users] to a porn site perhaps, but it seems that [Saban] was entirely innocent. Very bizarre."

    Cluley's take was fueled by the assumption that the vast majority of criminal activity on the Internet is based on the profit motive, and here there didn't seem to be one. "Maybe this was a mistake on the part of the hackers," he said. "Maybe they just got the [shortened] URL wrong, and meant to direct users to a different site."

    Cluley's point: "There was one single point of failure here," he said. "They only had to hack one thing, the Cligs service, to affect millions of URLs."

    Early yesterday, Cligs acknowledged the hack, which had exploited a vulnerability in its editing function. "I've identified the hole and disabled all cligs editing for now and I'm restoring the URLs back to their original destination states," said Far, Cligs' creator, in a blog post. "However, the most recent backup is from early May, and so we may have lost all URLs created since then. My daily backups with my host were turned off for some reason, which is another story.

    Far said that the attacker's IP address resolved to a Canadian address.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX


    If the resistance can mount enough dos attacks they could take Iran off the Internet,

    bring the current regime to its knees, closing down phones, TV, ATM, commerce,

    and Military com.

    http://warintel.blogspot.com/2009/06/effects-of-bringing-down-irans-www.html

    And there isn't much Iran can do about it.

    We expect the rest of the world will join in

    on the dos attacks and take Iran's WWW

    down. Methods and analysis here.

    Most will be using the new VPNs.


    Gerald

    Tactical Internet Systems analyst.



    Hezbillahs cyber division is trying to help.

    http://warintel.blogspot.com/2008/06/hezbollahs-cyber-warfare-program.html



    Expect general STRIKE SOON.




    UPDATE: Here’s the latest wrinkle in the online conflict, according the activists’ Twitter streams. The government is filtering text-message traffic, and Secure Socket Layer-protected web sites. That’s making itmuch harder for pro-democracy types to communicate with each other — and with the outside world. In response, the activists are calling for renewed assaults on government web pages. “Iranian gvmt is blocking out all INTERNET/SMS/PHONE - as long as they do this, we cut down THEIR sites,” one Tweets.



    .




    Labels:

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home