Monsegur also provided information on vulnerabilities in certain critical infrastructure, including at a U. Assistant U. Attorney James Pastore is in charge of the prosecution.
Daniel Christiansen. Biju Tilak. All Resources. White Papers. The D. Strategy for API Security. Combatting Cybercrime. Top Canadian Cyber Threats Expected in Leveraging New Technologies in Fraud Investigations. Zero Trust Strategies for The Faces of Fraud Survey. Geo-Targeted Events. RSA Conference. Infosecurity Europe. See More ». InfoSec Europe Compendium. Improving IoT Risk Management.
Reinventing Application Security. Job Board. Post a Job. ISMG Network. United States. United Kingdom. Logo of LulzSec, the hacktivist group Hector Monsegur helped form. You might also be interested in …. Achieve Machine Learning Results Faster. Definitive Guide to Complete Network Visibility. Around the Network. Tackling Growing Pandemic Cyberthreats in Healthcare. Please fill out the following fields All fields required :. Continue to site ». Operation Success! The simplest one goes like this: Of course, Sabu used anonymization networks to hide his identity and make source tracing impossible.
Network anonymization would have been a basic precaution for the most-wanted cybercriminal at the time. There are several methods for anonymizing traffic. Using hacked computers elsewhere on the Internet is another way to anonymize network traffic, and Sabu claimed to use them to hide his activities. He also claimed to use The Onion Router Tor network. The Tor network consists of thousands of relay nodes all across the Internet, randomly relaying connections from clients through the Tor network and back out again.
This list is closely monitored and is included in most threat intelligence. Many organizations disallow traffic from Tor exit nodes unless they have a good reason and there are few to allow it. But, back to Sabu. According to one story, Sabu forgot to activate his Tor link a single time, 4 and logged into a server using his real IP address.
Because he was the most-wanted cybercriminal at the time, his servers were almost certainly being watched by law enforcement. According to the story, the authorities traced his real IP address, and Sabu was quickly and quietly detained. He was born in New York city, but raised in Puerto Rico. The Puerto Rican island of Viecques, which was once used by the United States Navy for live fire training exercises, was one of his first interests as a hacktivist in Perhaps growing up near a bombing range was enough to inspire Monsegur to a life of Internet hacktivism.
Or perhaps he just did it for the Lulz, after all. Monsegur had been implicated in, or bragged about, dozens of illegal, high-profile hacks, not to mention multiple DDoS attacks. LulzSec hacker helps FBI stop attacks. Hacker admits to pilfering Stratfor. Former Lulzsec hacker on motivations. Jail sentences for Lulzsec hackers.
Image source, AP.
0コメント