About Me

My photo
I Am Hamza Subedar in 14th And Doing Software Engineer And Like To Solve Computer and Of Any Gadgets Problem I Like To Tell People That I Can Help To Solve Your Problem Anyways Bolg Me And Get your Problem Solve


Sunday, March 25, 2012

Anonymous Hacked Panda Security Sites

The world-known hacker group Anonymous has defaced around two dozen of the websites owned by Panda Security. This is meant to be done in revenge for the security company’s involvement in the arrests of LulzSec members. Although the hackers couldn’t take down Panda’s main website, its subdomains also were very attractive target.

Each one featured a video from YouTube of Anonymous and LulzSec exploits, and what looked like the username and password details of more than a hundred of Panda employees.

Panda’s competitor, the insecurity group Sophos? was first to report the attack. The latter appears to be a response to the company’s blog post about the LulzSec arrests. The post was titled “Where is the Lulz now?” Luis Corrons, the Panda’s employee who wrote the blog post, also tweeted about the incident, revealing that they had their team taking a look into the defacement at the moment. In addition, investigations involving catching criminals were considered fun at the company. However, Luis Corrons denied that his company helped law enforcement arrest the hackers, but admitted that he would have loved to participate in it.

The blog post was taken down after the security outfit realized that it probably wasn’t the best idea to crow about the arrests. The messages left by Anonymous members on the hacked Panda website also accused the outfit of cooperating with law enforcement to arrest Anonymous members.

Regardless of taking down the blog post, the security outfit claimed that the attack in question wasn’t very serious. Panda said in its statement on Facebook that the attack didn’t breach either the company’s internal network or source code; update servers and user information wasn’t accessed. The only data the hackers managed to access was connected with marketing campaigns like landing pages and some obsolete credentials, which included supposed credentials for people that haven’t been working at the company for more than 5 years. In reality, Anonymous members obtained access to some server that was hosted outside the company’s internal network. The server was claimed to be used only for marketing campaigns and Panda Security blogs, so virtually no harm was done to the company.

No comments:

Post a Comment