Customize

Sony beschuldigt Anonymous

Discussion in 'Deutschland' started by Rheinländer, May 4, 2011.

Thread Status:
Not open for further replies.
  1. Rheinländer Member

    http://orf.at/stories/2056561/

    Da will aber jemand sehr verzweifelt eigene Schuld abwälzen... Das merkt auch der ORF und schreibt weiter:

    http://www.play3.de/2011/05/04/psn-anonymous-doch-in-den-hack-involviert/

    Ich lachte.
    • Like Like x 1
  2. Anonymous Member

    erkenntnis +1
  3. Anonymous Member

    http://www.focus.de/digital/compute...-gruppe-hinter-hacker-angriff_aid_624273.html

    Zum Lachen ist das nicht wirklich. Jeder kann irgendwelche Straftaten verüben und sie dann Anonymous zuschieben. Entweder Leute, die sich etwas davon versprechen Anonymous schlecht zu machen, oder Leute, die jemanden auf eine falsche Fährte locken.
  4. Anonymous Member

    es ist sony

    die backen schon mal en rootkit auf eine audio cd.
  5. Anonymous Member

    Mehr:
    http://www.nzz.ch/nachrichten/digit...ous_die_schuld_an_attacken_zu_1.10481950.html

    http://www.welt.de/wirtschaft/article13343845/Hacker-hinterlassen-Sony-kryptische-Botschaft.html

    It's not Shit, it's a Sony.
  6. Anonymous Member

    http://www.spiegel.de/netzwelt/games/0,1518,760762,00.html


  7. Anonymous Member

  8. The3nd Member

    Bei Wikipedia steht es auch schon -.-
  9. Anonymous Member

  10. Anonymous Member

    http://www.thehackernews.com/2011/05/anonymous-response-to-sony-we-didnt-do.html

    Anonymous Response to Sony : We didn't do it as we will never hurt the innocents !
    remote_image20110505-5076-1xkn97r-0.jpg


    Press Release as shown :
    Last month, an unknown party managed to break into Sony's servers and acquired millions of customer records including credit card numbers. Insomuch as that this incident occurred in the midst of Anonymous' OpSony, by which participants engaged in several of our standard information war procedures against the corporation and its executives, Sony and other parties have come to blame Anonymous for the heist. Today, in a letter directed to members of Congress involved in an inquiry into the situation, Sony claimed to have discovered a file on its servers, presumably left by the thieves in question, entitled "Anonymous" and containing a fragment of our slogan, "We are Legion." In response, we would like to raise the following points:
    1. Anonymous has never been known to have engaged in credit card theft.
    2. Many of our corporate and governmental adversaries, on the other hand, have been known to have lied to the public about Anonymous and about their own activities. HBGary, for instance, was caught lying a number of times to the press, to the public, and to Anonymous itself (in this phone call, for instance, ( http://tinyurl.com/...) CEO Aaron Barr makes a number of untrue statements regarding the intent of his "research," claiming for instance that he never tried to sell the information to the FBI when e-mails acquired soon showed that he had been set to do just that; executive Karen Burke was also caught lying to Bloomberg about having not seen an incriminating e-mail that she had in fact replied to just a few days before). The U.S. Chamber of Commerce lied about not having seen the criminal proposal created by them for Team Themis; Palantir lied about not having any idea what their employees were up to; Berico publicly denounced a plan that they had actively engaged in creating; etc. There is no corporation in existence will choose the truth when lies are more convenient.
    3. To the contrary, Anonymous is an ironically transparent movement that allows reporters in to our operating channels to observe us at work and which has been extraordinarily candid with the press when commenting on our own activities, which is why reporters prefer to talk to us for truthful accounts of the situation rather than go to our degenerate enemies to be lied to.
    4. Whoever broke into Sony's servers to steal the credit card info and left a document blaming Anonymous clearly wanted Anonymous to be blamed for the most significant digital theft in history. No one who is actually associated with our movement would do something that would prompt a massive law enforcement response. On the other hand, a group of standard online thieves would have every reason to frame Anonymous in order to put law enforcement off the track. The framing of others for crimes has been a common practice throughout history.
    5. It should be remembered that several federal contractors such as HBGary and Palantir have been caught planning a variety of unethical and potentially criminal conspiracies by which to discredit the enemies of their clients. This is not a theory - this is a fact that has been reported at great length by dozens of journalists with major publications. Insomuch as that our enemies have either engaged in or planned to engage in false flag efforts, it should not be surprising that many of the journalists who have covered us, who know who we are and what motivates us - and who have alternatively seen the monstrous behavior of those large and "respectable" firms that are all too happy to throw aside common decency at the behest of such clients as Bank of America and the U.S. Chamber of Commerce - also have their suspicions that some capable party performed this operation as a means by which to do great damage to Anonymous in the public eye. Those who consider such a prospect to be somehow unlikely are advised to read about what was proposed by Team Themis in their efforts to destroy Wikileaks, and should otherwise take a few minutes to learn about COINTELPRO and other admitted practices by the U.S. intelligence community. The fact is that Anonymous has brought a great deal of discomfort to powerful entities such as Booz Allen Hamilton, Palantir, and much of the federal government; the Justice Department in particular is likely unhappy that our efforts revealed that it was they themselves who recommended the now-discredited "law firm" Hunton & Williams to Bank of America in order that the latter might better be able to fight back against Wikileaks. All of this is now public record, and anyone who finds it laughable that those or other entities may have again engaged in tactics that they are known to have engaged in in the past is not qualified to comment on the situation.
    Anonymous will continue its work in support of transparency and individual liberty; our adversaries will continue their work in support of secrecy and control. The FBI will continue to investigate us for crimes of civil disobediance while continuing to ignore the crimes planned by major corporations with which they are in league.
    Knowledge is Free.
    We are Anonymous.
    We are Legion.
    We do not forget.
    We not forgive.
    Expect us!
    • Like Like x 1
  11. Rheinländer Member

    http://www.intern.de/internet-news/...ft-sony-mangelhafte-software-wartung-vor.html

    bXIpkcR_uh626941277286740simpsons-haha.jpg.gif
    • Like Like x 1
  12. Anonymous Member

    ja
    schon verlogen schweine

    aber das ist wohl sony firmenpolitik
  13. anon0004 Member

    Alter, was kümmert uns wenn in china n sack reis umfällt, oder in japan ein kozern wegen seiner unfähigkeit.

    Thier need to make us look bad is greater than our need to look good.

    Alte Mottos die immernoch gelten.
  14. Von mir aus können die auch den Papst verdächtigen, mir latte. Jeder der diese Idee (anon) aktiv unterstützt weiß was sache ist.

    Aber es ist immer leicht einen Sündenbock zufinden, und anon ist der beste Bock den es zur zeit gibt.
  15. Anonymous Member

  16. Anonymous Member

    bock-09-flasche-und-glas.jpg

    Is ja auch Bockbier-Zeit. Prost!
  17. Anonymous Member

  18. Anonymous Member

    http://www.ichspiele.cc/news/psn-au...-kopfgeld-auf-anonymous-auszusetzen-5196.html

    dummgelaufen.jpg
  19. sooleater Member

    ach die kommentare sind sehr unterhaltsam
  20. Anonymous Member

    http://www.gamona.de/games/aktuelles,nach-psn-hack-anonymous-wird-selbst-opfer-ein:news,1932132.html

    Was treiben die da?
  21. Anonymous Member

    • Like Like x 1
  22. Anonymous Member

    http://www.20min.ch/digital/games/story/PSN-Hacker-nutzten-Amazon-Cloud-30904331

    *lol*@amazon.haha
  23. emiden Member

    amazon kann eigtl relativ froh sein, dass alle mit der sony-sache beschäftigt waren, als ihnen unmengen an daten ausm cloud-system irreversibel verloren gegangen sind.
  24. sooleater Member

    in der claud geht doch nix verlohren

    das war skynet
  25. emiden Member

  26. Anonymous Member

    ICH STIMME ZU DIE CLOUD IST SICHER

    da geht nichts verloren, am besten alle geschäftsdaten dort sicher, oder besser gleich ein geschäft damit aufmachen!!!11!

    sowas wie Twitter
    • Like Like x 2
  27. Anonymous Member

    Bild liefert.
  28. Anonymous Member

    wo sie nur diese nmap scans her haben?
  29. This thread needs more English.. About 20% more English
  30. anon0004 Member

    as you wish
    http://sony.broadcastnewsroom.com/articles/viewarticle.jsp?id=1500872

    Internet activists of Anonymous, a worldwide secret organization, provided COMPUTER BILD with logs of scans that they had performed on Sony servers already before the data theft. Anonymous had launched distributed denial-of-services (DDoS) attacks on the Sony servers as a "stress test" to bring down the conglomerate's online services. To this end, they scanned the servers for vulnerabilities. Logs of the scans revealed glaring security holes.
    The logs indicate that Sony was using outdated, and thus insecure, software versions, the weaknesses of which had been documented on the Internet for years. For example, Sony used the OpenSSH 4.4 service to encrypt data communication - a version that permits unauthorized access by attackers. The current version, in which those holes have been closed, is 5.7. Furthermore, some Sony servers were running the obsolete Apache version 2.2.10. The vulnerabilities in that version - which were eliminated in 2008 - permit DDoS and other attacks. The current version is 2.2.17.
    [IMG]
    Anonymous claims that it has nothing to do with the theft of personal information of millions of users. But whoever stole the data, they did not have to overcome any major obstacles in light of the glaring security holes.
    A number of PlayStation Network servers in Europe have been back online since Sunday. Sony promises significantly higher security standards, hopefully with the latest software this time.
    For all the facts and documents, as well as tips on what PlayStation Network users need to do now, please visit http://www.computerbild.de/go/sony-ps3-details.
    Internet activists of Anonymous, a worldwide secret organization, provided COMPUTER BILD with logs of scans that they had performed on Sony servers already before the data theft. Anonymous had launched distributed denial-of-services (DDoS) attacks on the Sony servers as a "stress test" to bring down the conglomerate's online services. To this end, they scanned the servers for vulnerabilities. Logs of the scans revealed glaring security holes.
    The logs indicate that Sony was using outdated, and thus insecure, software versions, the weaknesses of which had been documented on the Internet for years. For example, Sony used the OpenSSH 4.4 service to encrypt data communication - a version that permits unauthorized access by attackers. The current version, in which those holes have been closed, is 5.7. Furthermore, some Sony servers were running the obsolete Apache version 2.2.10. The vulnerabilities in that version - which were eliminated in 2008 - permit DDoS and other attacks. The current version is 2.2.17.
    [IMG]
    Anonymous claims that it has nothing to do with the theft of personal information of millions of users. But whoever stole the data, they did not have to overcome any major obstacles in light of the glaring security holes.
    A number of PlayStation Network servers in Europe have been back online since Sunday. Sony promises significantly higher security standards, hopefully with the latest software this time.
    For all the facts and documents, as well as tips on what PlayStation Network users need to do now, please visit http://www.computerbild.de/go/sony-ps3-details.
  31. Anonymous Member

    in b4 Rage

    Angaben, die man "stark bezweifeln muss", wie die Kollegen von der CBS finden. Die haben nämlich angeblich ein paar Daten von Anonymous zugespielt bekommen, die die Gruppe vor den früheren DDOS-Angriffen per Server-Scan gesammelt hatte. So hätte Sony für die verschlüsselte Übtragung von Daten eine fünf Jahre alte Version von OpenSSH (4.4 - aktuell ist 5.8) verwendet, die mit einigen gut dokumentierten Sicherheitslücken aufwartet. Auch andere Software-Komponenten seien nicht auf dem aktuellen Stand gewesen, heißt es da - weitere Beispiele werden allerdings nicht genannt.

    http://www.4players.de/4players.php...ion_Network|Veraltete_Software_verwendet.html
  32. Anonymous Member

    naja ein uralt apache reicht doch
    von da aus mal die datenbanken abfragen
    und mal umschauen was da noch so rumliegt.

    4players
    i lol´d
    gegen die cumputerbild wettern aus reinen fanboy geheule.

    die kommentare sind wie immer gold wert.
  33. Jamonymous Member

    http://www.heise.de/newsticker/meld...des-Playstation-Network-2-Update-1245433.html

    i lol'd
  34. Jamonymous Member

    http://ps3ego.de/playstation-network/anonymous-bekennt-sich-zum-psn-ausfall/

    hab ich was verpasst? ich dachte das war nen ehemaliger Anon oder irgendwie so? Jemand irgendwelche Infos diesbezüglich?
  35. Anonymous Member

    schau mal aufs datum
  36. Anonymous Member

    PH4N70M Hacking Team -- "The PSN was comprised of multiple forwarding servers. When my team went in, we found an authorization server (Codenamed auth.sony). This server had no encryption, no DDoS protection was in place. No load balancing. This is how the PSN network was taken down. I thought I’d pass that along to you due to the confusion people are having. This gateway was not load balanced and not secured operating through the default port 80. This server, during early operations back in February (when the operation was initiated in a vote in Operation Payback) was also thought to control login to sonys stores and shop networks. (Marketplace) I cannot confirm this. The original planned attack was going to be a LOIC + Slowloris attack. I also heard before I left of a bufferoverflow attack.The key players in PH4N70M (Phantom) include an exploiter (TH0R), Xik, and several others including the operation payback collaborator named Wolfy. The rest of the team will remain hidden for now.The credit card concerns were all because the data was never encrypted when sent"
  37. Anonymous Member

    http://www.big-screen.de/deutsch/pa...5_25_6619_weitere-hackerangriffe-auf-sony.php

    Demnächst wird gemeldet wenn die nicht angegriffen werden.
    • Like Like x 1
  38. Anonymous Member

    10:0 steht es gerade.
  39. Anonymous Member

    http://www.looki.de/playstation_net...angriff_war_unwahrscheinlich_news_n87169.html

    aha. es ist kostenlos, also ist sicherheit egal.
  40. Rheinländer Member

    Watt nix kost dat is auch nix! Alte Weisheit ^^
    • Like Like x 1
Thread Status:
Not open for further replies.

Share This Page

Customize Theme Colors

Close

Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins